Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Oggq2dY6kx.exe

Overview

General Information

Sample name:Oggq2dY6kx.exe
renamed because original name is a hash value
Original sample name:E3E636DDED2B38EA6FC5710D467C29E9.exe
Analysis ID:1579276
MD5:e3e636dded2b38ea6fc5710d467c29e9
SHA1:682ac24c96964ebc941e107d2ed1cb1619433508
SHA256:37a6ebef45b4c6b9a635fb2c1152bdef53db3c6d749824c84d8cfe1e79d6df4d
Tags:AZORultexeuser-abuse_ch
Infos:

Detection

Azorult
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Azorult
Yara detected Azorult Info Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Oggq2dY6kx.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\Oggq2dY6kx.exe" MD5: E3E636DDED2B38EA6FC5710D467C29E9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AzorultAZORult is a credential and payment card information stealer. Among other things, version 2 added support for .bit-domains. It has been observed in conjunction with Chthonic as well as being dropped by Ramnit.
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.azorult
{"C2 url": "http://195.245.112.115/index.php"}
SourceRuleDescriptionAuthorStrings
Oggq2dY6kx.exeJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
    Oggq2dY6kx.exeJoeSecurity_Azorult_1Yara detected AzorultJoe Security
      Oggq2dY6kx.exeWindows_Trojan_Azorult_38fce9eaunknownunknown
      • 0x19850:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
      • 0xcb78:$a2: %APPDATA%\.purple\accounts.xml
      • 0xd2c0:$a3: %TEMP%\curbuf.dat
      • 0x195d4:$a4: PasswordsList.txt
      • 0x145d8:$a5: Software\Valve\Steam
      Oggq2dY6kx.exeAzorult_1Azorult Payloadkevoreilly
      • 0x17c78:$code1: C7 07 3C 00 00 00 8D 45 80 89 47 04 C7 47 08 20 00 00 00 8D 85 80 FE FF FF 89 47 10 C7 47 14 00 01 00 00 8D 85 00 FE FF FF 89 47 1C C7 47 20 80 00 00 00 8D 85 80 FD FF FF 89 47 24 C7 47 28 80 ...
      • 0x120ac:$string1: SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch")
      Oggq2dY6kx.exeAzorultdetect Azorult in memoryJPCERT/CC Incident Response Group
      • 0x17a18:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
      • 0x18078:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
      • 0x19760:$v2: http://ip-api.com/json
      • 0x183d2:$v3: C6 07 1E C6 47 01 15 C6 47 02 34
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
        00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
          00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Azorult_38fce9eaunknownunknown
          • 0x19450:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
          • 0xc778:$a2: %APPDATA%\.purple\accounts.xml
          • 0xcec0:$a3: %TEMP%\curbuf.dat
          • 0x191d4:$a4: PasswordsList.txt
          • 0x141d8:$a5: Software\Valve\Steam
          00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmpAzorultdetect Azorult in memoryJPCERT/CC Incident Response Group
          • 0x17618:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
          • 0x17c78:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
          • 0x19360:$v2: http://ip-api.com/json
          • 0x17fd2:$v3: C6 07 1E C6 47 01 15 C6 47 02 34
          00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Oggq2dY6kx.exe.400000.0.unpackJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
              0.2.Oggq2dY6kx.exe.400000.0.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
                0.2.Oggq2dY6kx.exe.400000.0.unpackWindows_Trojan_Azorult_38fce9eaunknownunknown
                • 0x19850:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
                • 0xcb78:$a2: %APPDATA%\.purple\accounts.xml
                • 0xd2c0:$a3: %TEMP%\curbuf.dat
                • 0x195d4:$a4: PasswordsList.txt
                • 0x145d8:$a5: Software\Valve\Steam
                0.2.Oggq2dY6kx.exe.400000.0.unpackAzorult_1Azorult Payloadkevoreilly
                • 0x17c78:$code1: C7 07 3C 00 00 00 8D 45 80 89 47 04 C7 47 08 20 00 00 00 8D 85 80 FE FF FF 89 47 10 C7 47 14 00 01 00 00 8D 85 00 FE FF FF 89 47 1C C7 47 20 80 00 00 00 8D 85 80 FD FF FF 89 47 24 C7 47 28 80 ...
                • 0x120ac:$string1: SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch")
                0.2.Oggq2dY6kx.exe.400000.0.unpackAzorultdetect Azorult in memoryJPCERT/CC Incident Response Group
                • 0x17a18:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                • 0x18078:$v1: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                • 0x19760:$v2: http://ip-api.com/json
                • 0x183d2:$v3: C6 07 1E C6 47 01 15 C6 47 02 34
                Click to see the 5 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-21T12:07:02.118563+010020294671Malware Command and Control Activity Detected192.168.2.449730104.21.52.21980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-21T12:07:02.118563+010028102761Malware Command and Control Activity Detected192.168.2.449730104.21.52.21980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Oggq2dY6kx.exeAvira: detected
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpackMalware Configuration Extractor: Azorult {"C2 url": "http://195.245.112.115/index.php"}
                Source: Oggq2dY6kx.exeReversingLabs: Detection: 95%
                Source: Oggq2dY6kx.exeVirustotal: Detection: 87%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                Source: Oggq2dY6kx.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004094C4 CryptUnprotectData,LocalFree,0_2_004094C4
                Source: Oggq2dY6kx.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: unknownHTTPS traffic detected: 104.21.52.219:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041303C FindFirstFileW,FindNextFileW,FindClose,0_2_0041303C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004111C4 FindFirstFileW,FindNextFileW,FindClose,0_2_004111C4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041158C FindFirstFileW,FindNextFileW,FindClose,0_2_0041158C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00411590 FindFirstFileW,FindNextFileW,FindClose,0_2_00411590
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D9C FindFirstFileW,FindNextFileW,FindClose,0_2_00412D9C

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2029467 - Severity 1 - ET MALWARE Win32/AZORult V3.3 Client Checkin M14 : 192.168.2.4:49730 -> 104.21.52.219:80
                Source: Network trafficSuricata IDS: 2810276 - Severity 1 - ETPRO MALWARE AZORult CnC Beacon M1 : 192.168.2.4:49730 -> 104.21.52.219:80
                Source: Malware configuration extractorURLs: http://195.245.112.115/index.php
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: global trafficHTTP traffic detected: GET /index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Cache-Control: no-cacheHost: inglesxyz.shopConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: inglesxyz.shopContent-Length: 107Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 8b 30 66 8b 30 6c eb 42 70 9d 36 70 9d 32 70 9d 30 70 9d 30 70 9c 47 13 8b 30 66 ef 26 66 9b 40 70 9d 30 13 8b 30 61 Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;10f0lBp6p2p0p0pG0f&f@p00a
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Cache-Control: no-cacheHost: inglesxyz.shopConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: inglesxyz.shop
                Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: inglesxyz.shopContent-Length: 107Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 8b 30 66 8b 30 6c eb 42 70 9d 36 70 9d 32 70 9d 30 70 9d 30 70 9c 47 13 8b 30 66 ef 26 66 9b 40 70 9d 30 13 8b 30 61 Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;10f0lBp6p2p0p0pG0f&f@p00a
                Source: Oggq2dY6kx.exe, 00000000.00000003.1701448593.0000000002130000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://195.245.112.115/index.php
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmp, Oggq2dY6kx.exe, 00000000.00000002.1701669567.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://inglesxyz.shop/index.php
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://inglesxyz.shop/index.php6N
                Source: Oggq2dY6kx.exeString found in binary or memory: http://ip-api.com/json
                Source: Oggq2dY6kx.exeString found in binary or memory: https://dotbit.me/a/
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop//Yz
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/M
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/g
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/index.php
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/index.php2Tf
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://inglesxyz.shop/index.phpll
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownHTTPS traffic detected: 104.21.52.219:443 -> 192.168.2.4:49731 version: TLS 1.2

                System Summary

                barindex
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: Azorult Payload Author: kevoreilly
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
                Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
                Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: String function: 00403B98 appears 44 times
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: String function: 00404E64 appears 33 times
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: String function: 00404E3C appears 87 times
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: String function: 004062D8 appears 34 times
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: String function: 004034E4 appears 36 times
                Source: Oggq2dY6kx.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
                Source: Oggq2dY6kx.exe, type: SAMPLEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
                Source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
                Source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
                Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
                Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
                Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@1/1
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040A4A4 CoCreateInstance,0_2_0040A4A4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeMutant created: \Sessions\1\BaseNamedObjects\AFA7A44E6-9414907A-8AD8678F-39EA5133-F3A5C3F4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Oggq2dY6kx.exeReversingLabs: Detection: 95%
                Source: Oggq2dY6kx.exeVirustotal: Detection: 87%
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: crtdll.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040D86E push 0040D89Ch; ret 0_2_0040D894
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040D870 push 0040D89Ch; ret 0_2_0040D894
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004140C0 push 004140ECh; ret 0_2_004140E4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004108C8 push 004108F4h; ret 0_2_004108EC
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040B0F7 push 0040B124h; ret 0_2_0040B11C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040B0F8 push 0040B124h; ret 0_2_0040B11C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00408080 push 004080B8h; ret 0_2_004080B0
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00408158 push 00408196h; ret 0_2_0040818E
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00408970 push 004089E4h; ret 0_2_004089DC
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00408994 push 004089E4h; ret 0_2_004089DC
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004089AC push 004089E4h; ret 0_2_004089DC
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00415208 push 0041528Ch; ret 0_2_00415284
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040CA0C push 0040CA3Ch; ret 0_2_0040CA34
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040CA10 push 0040CA3Ch; ret 0_2_0040CA34
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00417AEC push 00417B18h; ret 0_2_00417B10
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00404BC0 push 00404C11h; ret 0_2_00404C09
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040D3C0 push 0040D3ECh; ret 0_2_0040D3E4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040A3E4 push 0040A410h; ret 0_2_0040A408
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040C390 push 0040C3C0h; ret 0_2_0040C3B8
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040C394 push 0040C3C0h; ret 0_2_0040C3B8
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040A3AC push 0040A3D8h; ret 0_2_0040A3D0
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040DC44 push 0040DCA3h; ret 0_2_0040DC9B
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040DC0C push 0040DC38h; ret 0_2_0040DC30
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041B417 push ecx; iretd 0_2_0041B427
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040B41E push 0040B44Ch; ret 0_2_0040B444
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040B420 push 0040B44Ch; ret 0_2_0040B444
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0040A438 push 0040A464h; ret 0_2_0040A45C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041A4F4 push 0041A51Ah; ret 0_2_0041A512
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00414C80 push 00414CACh; ret 0_2_00414CA4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00409488 push 004094B8h; ret 0_2_004094B0
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041A4AC push 0041A4E8h; ret 0_2_0041A4E0
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041303C FindFirstFileW,FindNextFileW,FindClose,0_2_0041303C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004111C4 FindFirstFileW,FindNextFileW,FindClose,0_2_004111C4
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_0041158C FindFirstFileW,FindNextFileW,FindClose,0_2_0041158C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00411590 FindFirstFileW,FindNextFileW,FindClose,0_2_00411590
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00412D9C FindFirstFileW,FindNextFileW,FindClose,0_2_00412D9C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00416740 GetSystemInfo,0_2_00416740
                Source: Oggq2dY6kx.exe, 00000000.00000002.1701669567.000000000066D000.00000004.00000020.00020000.00000000.sdmp, Oggq2dY6kx.exe, 00000000.00000002.1701669567.000000000060E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00407A34 mov eax, dword ptr fs:[00000030h]0_2_00407A34
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: GetLocaleInfoA,0_2_00404B4C
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_004065CC GetUserNameW,0_2_004065CC
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeCode function: 0_2_00404C15 GetCommandLineA,GetVersion,GetVersion,GetThreadLocale,GetThreadLocale,GetCurrentThreadId,0_2_00404C15
                Source: C:\Users\user\Desktop\Oggq2dY6kx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Oggq2dY6kx.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Oggq2dY6kx.exe PID: 7256, type: MEMORYSTR
                Source: Yara matchFile source: Oggq2dY6kx.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.Oggq2dY6kx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Oggq2dY6kx.exe PID: 7256, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                OS Credential Dumping1
                Security Software Discovery
                Remote ServicesData from Local System11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                Obfuscated Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                DLL Side-Loading
                Security Account Manager1
                System Owner/User Discovery
                SMB/Windows Admin SharesData from Network Shared Drive3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
                File and Directory Discovery
                Distributed Component Object ModelInput Capture114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets14
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Oggq2dY6kx.exe96%ReversingLabsWin32.Infostealer.CoinStealer
                Oggq2dY6kx.exe88%VirustotalBrowse
                Oggq2dY6kx.exe100%AviraTR/Crypt.XPACK.Gen
                Oggq2dY6kx.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                inglesxyz.shop
                104.21.52.219
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://inglesxyz.shop/index.phptrue
                    unknown
                    https://inglesxyz.shop/index.phptrue
                      unknown
                      http://195.245.112.115/index.phptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://inglesxyz.shop//YzOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://inglesxyz.shop/index.php2TfOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://inglesxyz.shop/index.phpllOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://inglesxyz.shop/MOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://inglesxyz.shop/Oggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://inglesxyz.shop/index.php6NOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://ip-api.com/jsonOggq2dY6kx.exefalse
                                      high
                                      https://inglesxyz.shop/gOggq2dY6kx.exe, 00000000.00000002.1701669567.0000000000651000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://dotbit.me/a/Oggq2dY6kx.exefalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.21.52.219
                                          inglesxyz.shopUnited States
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1579276
                                          Start date and time:2024-12-21 12:06:09 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 1m 58s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:1
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Oggq2dY6kx.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:E3E636DDED2B38EA6FC5710D467C29E9.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.winEXE@1/0@1/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 22
                                          • Number of non-executed functions: 53
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Stop behavior analysis, all processes terminated
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          No simulations
                                          No context
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUS6G8OR42xrB.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                          • 104.21.2.8
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                          • 172.67.180.113
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                          • 104.21.91.209
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                          • 172.67.180.113
                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 104.21.21.99
                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                          • 172.67.197.170
                                          https://gADK.quantumdhub.ru/HX8hiLPadaz1N7WrltpPjHg34q_2C98ig/Get hashmaliciousUnknownBrowse
                                          • 104.18.95.41
                                          file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, XWormBrowse
                                          • 104.21.21.99
                                          B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                          • 104.26.0.5
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                          • 104.21.52.219
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                          • 104.21.52.219
                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                          • 104.21.52.219
                                          Setup.msiGet hashmaliciousUnknownBrowse
                                          • 104.21.52.219
                                          q9bzWO2X1r.msiGet hashmaliciousUnknownBrowse
                                          • 104.21.52.219
                                          doc00290320092.jseGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.21.52.219
                                          Fortexternal.exeGet hashmaliciousUnknownBrowse
                                          • 104.21.52.219
                                          676556be12ac3.vbsGet hashmaliciousMint StealerBrowse
                                          • 104.21.52.219
                                          PKO_0019289289544_PDF_#U2463#U2466#U2465#U2462#U2461#U2466#U2464#U2462.htaGet hashmaliciousMint StealerBrowse
                                          • 104.21.52.219
                                          ktyihkdfesf.exeGet hashmaliciousVidarBrowse
                                          • 104.21.52.219
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.303597203842279
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.81%
                                          • Windows Screen Saver (13104/52) 0.13%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          File name:Oggq2dY6kx.exe
                                          File size:114'688 bytes
                                          MD5:e3e636dded2b38ea6fc5710d467c29e9
                                          SHA1:682ac24c96964ebc941e107d2ed1cb1619433508
                                          SHA256:37a6ebef45b4c6b9a635fb2c1152bdef53db3c6d749824c84d8cfe1e79d6df4d
                                          SHA512:aed777a27d9507de8583ad68ae807f26abd7bb538651ea6b54ed1b896e81a2285a134a5852661377b98cf85f2197f5cabc3e634036cec9183c8cad7325995c73
                                          SSDEEP:3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeheWginBq:faZ1tme+1winw
                                          TLSH:A5B3196EF7C19277D02408BDCD45A1B9907975302E391822F7E64F6CD8F96C2AA6C2C7
                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0x41a684
                                          Entrypoint Section:CODE
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                          DLL Characteristics:
                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:6d1f2b41411eacafcf447fc002d8cb00
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          add esp, FFFFFFF0h
                                          mov eax, 0041A51Ch
                                          call 00007F6230C941D1h
                                          mov eax, 0041A6ACh
                                          call 00007F6230CA85CFh
                                          call 00007F6230C928B6h
                                          add bh, bh
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1d0000x79e.idata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000x135c.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          CODE0x10000x196b00x1980036cb28728042ffae219a1946fa4be687False0.5062327665441176data6.185523493326931IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          DATA0x1b0000x66c0x800e9650bf22ef923968a1214ea2fbd8ce9False0.716796875data6.268942670866809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          BSS0x1c0000x8c50x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .idata0x1d0000x79e0x800556c360ee726e003c5e1f6a038e97572False0.4248046875data4.584408491713284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .reloc0x1e0000x135c0x140047e0321680a57d86584b7d24879d5e1dFalse0.7943359375data6.670961239193358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                          DLLImport
                                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, GetThreadLocale, GetStartupInfoA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                          user32.dllGetKeyboardType, MessageBoxA, CharNextA
                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                          kernel32.dllGetModuleHandleA
                                          advapi32.dllRegOpenKeyExA, RegEnumKeyA, FreeSid
                                          kernel32.dllWriteFile, Sleep, LocalFree, LoadLibraryExW, LoadLibraryA, GlobalUnlock, GlobalLock, GetTickCount, GetSystemInfo, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetFileAttributesW, GetCurrentProcessId, GetCurrentProcess, FreeLibrary, FindNextFileW, FindFirstFileW, FindClose, ExitProcess, DeleteFileW, CreateDirectoryW, CopyFileW
                                          gdi32.dllSelectObject, DeleteObject, DeleteDC, CreateCompatibleDC, CreateCompatibleBitmap, BitBlt
                                          user32.dllReleaseDC, GetSystemMetrics, GetDC, CharToOemBuffA
                                          ole32.dllOleInitialize, CoCreateInstance
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-21T12:07:02.118563+01002029467ET MALWARE Win32/AZORult V3.3 Client Checkin M141192.168.2.449730104.21.52.21980TCP
                                          2024-12-21T12:07:02.118563+01002810276ETPRO MALWARE AZORult CnC Beacon M11192.168.2.449730104.21.52.21980TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 21, 2024 12:07:00.884154081 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:01.003731966 CET8049730104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:01.003817081 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:01.003994942 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:01.123589039 CET8049730104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:02.118379116 CET8049730104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:02.118515968 CET8049730104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:02.118562937 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.118562937 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.120595932 CET4973080192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.120958090 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.121011972 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:02.121083021 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.132453918 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:02.132482052 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:02.240120888 CET8049730104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.354096889 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.354228973 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.411226988 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.411248922 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.411644936 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.411705971 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.415302992 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.455374956 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.790167093 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.790236950 CET44349731104.21.52.219192.168.2.4
                                          Dec 21, 2024 12:07:03.790256023 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.790296078 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.791241884 CET49731443192.168.2.4104.21.52.219
                                          Dec 21, 2024 12:07:03.791268110 CET44349731104.21.52.219192.168.2.4
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 21, 2024 12:07:00.566895962 CET5798653192.168.2.41.1.1.1
                                          Dec 21, 2024 12:07:00.878288031 CET53579861.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 21, 2024 12:07:00.566895962 CET192.168.2.41.1.1.10x30dfStandard query (0)inglesxyz.shopA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 21, 2024 12:07:00.878288031 CET1.1.1.1192.168.2.40x30dfNo error (0)inglesxyz.shop104.21.52.219A (IP address)IN (0x0001)false
                                          Dec 21, 2024 12:07:00.878288031 CET1.1.1.1192.168.2.40x30dfNo error (0)inglesxyz.shop172.67.204.92A (IP address)IN (0x0001)false
                                          • inglesxyz.shop
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449730104.21.52.219807256C:\Users\user\Desktop\Oggq2dY6kx.exe
                                          TimestampBytes transferredDirectionData
                                          Dec 21, 2024 12:07:01.003994942 CET268OUTPOST /index.php HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                                          Host: inglesxyz.shop
                                          Content-Length: 107
                                          Cache-Control: no-cache
                                          Data Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 8b 30 66 8b 30 6c eb 42 70 9d 36 70 9d 32 70 9d 30 70 9d 30 70 9c 47 13 8b 30 66 ef 26 66 9b 40 70 9d 30 13 8b 30 61
                                          Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;10f0lBp6p2p0p0pG0f&f@p00a
                                          Dec 21, 2024 12:07:02.118379116 CET1031INHTTP/1.1 301 Moved Permanently
                                          Date: Sat, 21 Dec 2024 11:07:01 GMT
                                          Content-Type: text/html
                                          Content-Length: 167
                                          Connection: close
                                          Cache-Control: max-age=3600
                                          Expires: Sat, 21 Dec 2024 12:07:01 GMT
                                          Location: https://inglesxyz.shop/index.php
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nU5RZ2M7YKUsUPoOCAilWgRNsDaMg%2F6%2FnqGT1VLaNTyZ3tW3cq18ixdGjw6RDJ%2FYCQh%2FlZ0kbpdD0N0JkvkqRGQEbGbazLYU62%2FTzYJ1hokBVCnmPXeW%2FIcdg16zhxABgg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 8f5767f918167287-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          server-timing: cfL4;desc="?proto=TCP&rtt=1986&min_rtt=1986&rtt_var=993&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=268&delivery_rate=0&cwnd=189&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                          Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>cloudflare</center></body></html>


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449731104.21.52.2194437256C:\Users\user\Desktop\Oggq2dY6kx.exe
                                          TimestampBytes transferredDirectionData
                                          2024-12-21 11:07:03 UTC163OUTGET /index.php HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                                          Cache-Control: no-cache
                                          Host: inglesxyz.shop
                                          Connection: Keep-Alive
                                          2024-12-21 11:07:03 UTC958INHTTP/1.1 530
                                          Date: Sat, 21 Dec 2024 11:07:03 GMT
                                          Content-Type: text/plain; charset=UTF-8
                                          Content-Length: 16
                                          Connection: close
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6roEGItuqWO7Gg%2BrsIoA9v%2B0tuwKtJ9h4h3Woh6DEIMfs7%2FjMFQP%2BpvgaD4ldclxhPY4DENJ5NS25IlM3Y57PhfEtxYbd9m6UB17oAQJvYSj1dGHWkHbQ3M%2FkERhgB%2BK4Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          X-Frame-Options: SAMEORIGIN
                                          Referrer-Policy: same-origin
                                          Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                          Server: cloudflare
                                          CF-RAY: 8f576803abae42ac-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          server-timing: cfL4;desc="?proto=TCP&rtt=1572&min_rtt=1565&rtt_var=601&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=777&delivery_rate=1800246&cwnd=215&unsent_bytes=0&cid=ea6cbf0c48b39fd3&ts=451&x=0"
                                          2024-12-21 11:07:03 UTC16INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 33 33
                                          Data Ascii: error code: 1033


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:06:06:59
                                          Start date:21/12/2024
                                          Path:C:\Users\user\Desktop\Oggq2dY6kx.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Oggq2dY6kx.exe"
                                          Imagebase:0x400000
                                          File size:114'688 bytes
                                          MD5 hash:E3E636DDED2B38EA6FC5710D467C29E9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                          • Rule: Azorult, Description: detect Azorult in memory, Source: 00000000.00000000.1668122599.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                          • Rule: Azorult, Description: detect Azorult in memory, Source: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.5%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:2.2%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:10
                                            execution_graph 18026 41a684 18033 404d00 GetModuleHandleA 18026->18033 18028 41a694 18035 419108 18028->18035 18034 404d33 18033->18034 18034->18028 18036 419110 18035->18036 18309 4034e4 18036->18309 18042 419155 18318 407d24 18042->18318 18048 41917e 18049 419189 CreateMutexA 18048->18049 18050 4191a3 18049->18050 18051 419f30 18050->18051 18053 4034e4 7 API calls 18050->18053 18052 4034e4 7 API calls 18051->18052 18054 419f48 18052->18054 18061 4191b6 18053->18061 18918 403b98 18054->18918 18057 4191e4 18386 418f9c 18057->18386 18060 4034e4 7 API calls 18063 419f63 18060->18063 18061->18057 18064 403798 7 API calls 18061->18064 18514 4036cc 18061->18514 18066 403b98 SysFreeString 18063->18066 18064->18061 18065 406c4c 19 API calls 18068 4191f7 18065->18068 18067 419f73 18066->18067 18922 403508 18067->18922 18397 406810 18068->18397 18076 419219 18432 4176d8 18076->18432 18077 403508 7 API calls 18079 419f9e 18077->18079 18081 403b80 SysFreeString 18079->18081 18084 419fa9 18081->18084 18086 403508 7 API calls 18084->18086 18085 4176d8 7 API calls 18090 41924c 18085->18090 18087 419fb9 18086->18087 18088 403b80 SysFreeString 18087->18088 18089 419fc4 18088->18089 18091 403508 7 API calls 18089->18091 18090->18051 18095 419272 18090->18095 18092 419fd4 18091->18092 18093 403b80 SysFreeString 18092->18093 18094 419fdf 18093->18094 18096 403508 7 API calls 18094->18096 18517 407428 18095->18517 18098 419fef 18096->18098 18100 403b80 SysFreeString 18098->18100 18102 419ffa 18100->18102 18104 403508 7 API calls 18102->18104 18106 41a00a 18104->18106 18105 407428 7 API calls 18107 4192b2 18105->18107 18108 403b80 SysFreeString 18106->18108 18538 406ae4 18107->18538 18111 41a015 18108->18111 18113 403508 7 API calls 18111->18113 18115 41a025 18113->18115 18117 403b80 SysFreeString 18115->18117 18116 407428 7 API calls 18118 4192e9 18116->18118 18119 41a030 18117->18119 18120 406984 7 API calls 18118->18120 18121 403508 7 API calls 18119->18121 18122 4192fa 18120->18122 18123 41a040 18121->18123 18560 4080c4 18122->18560 18125 403b80 SysFreeString 18123->18125 18126 41a04b 18125->18126 18128 403508 7 API calls 18126->18128 18130 41a05b 18128->18130 18131 403b98 SysFreeString 18130->18131 18132 41a06b 18131->18132 18133 4034e4 7 API calls 18132->18133 18134 41a076 18133->18134 18135 403b98 SysFreeString 18134->18135 18137 41a086 18135->18137 18136 419909 18828 417290 18136->18828 18139 4034e4 7 API calls 18137->18139 18141 41a091 18139->18141 18143 403b98 SysFreeString 18141->18143 18145 41a0a1 18143->18145 18147 4034e4 7 API calls 18145->18147 18150 41a0ac 18147->18150 18154 403b98 SysFreeString 18150->18154 18155 41a0bc 18154->18155 18161 4034e4 7 API calls 18155->18161 18156 40357c 7 API calls 18252 41930d 18156->18252 18158 40795c 12 API calls 18158->18252 18165 41a0c7 18161->18165 18170 403b98 SysFreeString 18165->18170 18167 40dce8 8 API calls 18167->18252 18172 41a0d7 18170->18172 18177 403508 7 API calls 18172->18177 18175 419451 GetSystemMetrics GetSystemMetrics 18768 4178b4 18175->18768 18181 41a0e7 18177->18181 18180 418688 45 API calls 18180->18252 18929 404224 18181->18929 18185 41a0fa 18186 403508 7 API calls 18185->18186 18188 41a107 18186->18188 18187 407428 7 API calls 18187->18252 18190 4034e4 7 API calls 18188->18190 18192 41a10f 18190->18192 18194 4034e4 7 API calls 18192->18194 18197 41a117 18194->18197 18198 403508 7 API calls 18197->18198 18199 41a124 18198->18199 18201 403508 7 API calls 18199->18201 18203 41a131 18201->18203 18205 4034e4 7 API calls 18203->18205 18207 41a139 18205->18207 18299 4033f4 18207->18299 18210 403850 7 API calls 18210->18252 18218 4034e4 7 API calls 18218->18252 18223 4070bc 8 API calls 18223->18252 18237 407048 9 API calls 18237->18252 18250 4037dc 7 API calls 18250->18252 18252->18051 18252->18136 18252->18156 18252->18158 18252->18167 18252->18175 18252->18180 18252->18187 18252->18210 18252->18218 18252->18223 18252->18237 18252->18250 18256 414408 33 API calls 18252->18256 18654 40d7f0 18252->18654 18675 4053d8 18252->18675 18679 414028 18252->18679 18688 408120 18252->18688 18691 405528 18252->18691 18696 414098 18252->18696 18699 415ea8 18252->18699 18708 4050c8 18252->18708 18716 414cb8 18252->18716 18736 414f40 18252->18736 18781 406fdc 18252->18781 18787 403c98 18252->18787 18803 403d58 18252->18803 18809 40781c 18252->18809 18256->18252 18301 40340d 18299->18301 18300 40342c 22259 403368 18300->22259 18301->18300 18304 40343d 18301->18304 18303 403436 18303->18304 18305 403478 FreeLibrary 18304->18305 18307 40347e 18304->18307 18305->18307 18306 4034b3 18307->18306 18308 4034ab ExitProcess 18307->18308 18310 403505 18309->18310 18311 4034ea 18309->18311 18313 40357c 18310->18313 18311->18310 18954 402550 18311->18954 18315 403580 18313->18315 18314 4035a4 18317 40561c 63 API calls 18314->18317 18315->18314 18316 402550 7 API calls 18315->18316 18316->18314 18317->18042 18968 403538 18318->18968 18322 407d3d 18323 407d4d 18322->18323 18324 403538 7 API calls 18322->18324 18325 407b78 2 API calls 18323->18325 18324->18323 18326 407d57 18325->18326 18327 407d67 18326->18327 18328 403538 7 API calls 18326->18328 18329 407b78 2 API calls 18327->18329 18328->18327 18330 407d71 18329->18330 18331 407d81 18330->18331 18332 403538 7 API calls 18330->18332 18979 407c58 18331->18979 18332->18331 18334 407d86 18335 407d96 18334->18335 18336 403538 7 API calls 18334->18336 18337 406c4c 18335->18337 18336->18335 18338 406c54 18337->18338 18338->18338 18339 406c76 18338->18339 18340 406c88 18338->18340 18341 403538 7 API calls 18339->18341 18994 406e70 18340->18994 18343 406c83 18341->18343 18345 403508 7 API calls 18343->18345 18344 406c90 18999 406bb4 18344->18999 18347 406d78 18345->18347 18349 403b98 SysFreeString 18347->18349 18348 406ca3 19002 4065cc GetUserNameW 18348->19002 18350 406d85 18349->18350 18352 403508 7 API calls 18350->18352 18353 406d92 18352->18353 18372 403798 18353->18372 18354 406cb6 19008 406610 18354->19008 18356 406cc9 19015 406258 18356->19015 18359 406258 7 API calls 18360 406cf2 18359->18360 18361 406258 7 API calls 18360->18361 18362 406d05 18361->18362 18363 406258 7 API calls 18362->18363 18364 406d18 18363->18364 18365 403850 7 API calls 18364->18365 18366 406d39 18365->18366 18367 406258 7 API calls 18366->18367 18368 406d44 18367->18368 18369 403850 7 API calls 18368->18369 18370 406d54 18369->18370 18371 403538 7 API calls 18370->18371 18371->18343 18373 4037db 18372->18373 18374 40379c 18372->18374 18373->18048 18375 4037a6 18374->18375 18379 403538 18374->18379 18376 4037d0 18375->18376 18377 4037b9 18375->18377 18380 403ac0 7 API calls 18376->18380 19078 403ac0 18377->19078 18382 4035a8 7 API calls 18379->18382 18383 40354c 18379->18383 18385 4037be 18380->18385 18381 40357a 18381->18048 18382->18383 18383->18381 18384 402550 7 API calls 18383->18384 18384->18381 18385->18048 18387 418fb5 18386->18387 18388 4034e4 7 API calls 18387->18388 18389 418fd0 18388->18389 18390 4190d9 18389->18390 18395 4036cc 7 API calls 18389->18395 18396 403798 7 API calls 18389->18396 18391 4034e4 7 API calls 18390->18391 18392 4190ee 18391->18392 18393 4034e4 7 API calls 18392->18393 18394 4190f6 18393->18394 18394->18065 18395->18389 18396->18389 18398 406829 18397->18398 18399 4034e4 7 API calls 18398->18399 18405 40683e 18399->18405 18400 4068ae 18401 403508 7 API calls 18400->18401 18402 4068c8 18401->18402 18404 4034e4 7 API calls 18402->18404 18403 4036cc 7 API calls 18403->18405 18407 4068d0 18404->18407 18405->18400 18405->18403 18406 4067e8 7 API calls 18405->18406 18408 403798 7 API calls 18405->18408 18409 403850 7 API calls 18405->18409 18406->18405 18410 4037dc 18407->18410 18408->18405 18409->18405 18411 4037e0 18410->18411 18420 403798 18410->18420 18412 403538 18411->18412 18413 4037f0 18411->18413 18414 4037fe 18411->18414 18411->18420 18417 4035a8 7 API calls 18412->18417 18421 40354c 18412->18421 18416 403538 7 API calls 18413->18416 18418 4035a8 7 API calls 18414->18418 18415 40357a 18415->18076 18416->18420 18417->18421 18428 403811 18418->18428 18419 4037db 18419->18076 18420->18412 18420->18419 18422 4037a6 18420->18422 18421->18415 18423 402550 7 API calls 18421->18423 18424 4037d0 18422->18424 18425 4037b9 18422->18425 18423->18415 18427 403ac0 7 API calls 18424->18427 18426 403ac0 7 API calls 18425->18426 18429 4037be 18426->18429 18427->18429 18430 403538 7 API calls 18428->18430 18429->18076 18431 40383d 18430->18431 18431->18076 18434 4176f1 18432->18434 18433 417759 18436 4034e4 7 API calls 18433->18436 18434->18433 19084 4039e8 18434->19084 18437 41776e 18436->18437 18438 418688 18437->18438 18439 418691 18438->18439 18440 4186e7 18439->18440 18442 40357c 7 API calls 18439->18442 18441 4034e4 7 API calls 18440->18441 18443 4186ef 18441->18443 18442->18440 18444 40357c 7 API calls 18443->18444 18445 4186fa 18444->18445 18446 40357c 7 API calls 18445->18446 18447 41870b 18446->18447 18448 4039e8 7 API calls 18447->18448 18449 418713 GetModuleHandleA 18448->18449 18450 41872f 18449->18450 18451 41871f 18449->18451 18453 418733 18450->18453 18454 41874f 18450->18454 18452 4039e8 7 API calls 18451->18452 18456 418727 LoadLibraryA 18452->18456 18457 4039e8 7 API calls 18453->18457 18455 4039e8 7 API calls 18454->18455 18458 418757 GetProcAddress 18455->18458 18456->18450 18459 41873b 18457->18459 18461 4039e8 7 API calls 18458->18461 18460 4039e8 7 API calls 18459->18460 18462 418747 LoadLibraryA 18460->18462 18463 41876c GetProcAddress 18461->18463 18462->18454 18464 4039e8 7 API calls 18463->18464 18465 418781 GetProcAddress 18464->18465 18466 4039e8 7 API calls 18465->18466 18467 418796 GetProcAddress 18466->18467 18468 4039e8 7 API calls 18467->18468 18469 4187ab GetProcAddress 18468->18469 18470 4039e8 7 API calls 18469->18470 18471 4187c0 GetProcAddress 18470->18471 18472 4039e8 7 API calls 18471->18472 18473 4187d5 GetProcAddress 18472->18473 18474 4039e8 7 API calls 18473->18474 18475 4187e9 GetProcAddress 18474->18475 18476 4039e8 7 API calls 18475->18476 18477 418800 GetProcAddress 18476->18477 18478 41881c 18477->18478 18479 4188f2 InternetCrackUrlA 18478->18479 18480 418901 18479->18480 19090 4039f0 18480->19090 18482 418977 InternetOpenA 18484 4189a4 InternetConnectA 18482->18484 18483 418922 18483->18482 18485 4037dc 7 API calls 18483->18485 18489 418ad6 18484->18489 18492 4189d4 18484->18492 18486 41895b 18485->18486 19097 417f6c 18486->19097 18491 418b28 18489->18491 18496 418ae5 18489->18496 18490 418969 18490->18482 18493 403538 7 API calls 18491->18493 18494 418a1c HttpOpenRequestA 18492->18494 18495 418b33 18493->18495 18497 418ad0 InternetCloseHandle 18494->18497 18503 418a31 18494->18503 18498 4034e4 7 API calls 18495->18498 19118 418124 18496->19118 18497->18489 18499 418b3b 18498->18499 18501 403508 7 API calls 18499->18501 18502 418b58 18501->18502 18504 403508 7 API calls 18502->18504 18505 418a66 HttpSendRequestA 18503->18505 18506 418b65 18504->18506 18505->18497 18511 418a79 18505->18511 18507 403508 7 API calls 18506->18507 18508 418b72 18507->18508 18509 403508 7 API calls 18508->18509 18510 418b7f 18509->18510 18510->18085 18511->18497 18512 4035d4 7 API calls 18511->18512 18513 403798 7 API calls 18511->18513 18512->18511 18513->18511 18515 4035d4 7 API calls 18514->18515 18516 4036d9 18515->18516 18516->18061 18518 407444 18517->18518 18519 4034e4 7 API calls 18518->18519 18523 407469 18519->18523 18520 4074d3 18521 403508 7 API calls 18520->18521 18522 4074ed 18521->18522 18527 406984 18522->18527 18523->18520 18524 4039f0 7 API calls 18523->18524 18525 4074b1 18524->18525 18525->18520 18526 4039f0 7 API calls 18525->18526 18526->18520 18528 4069a3 18527->18528 18529 4034e4 7 API calls 18528->18529 18530 4069b9 18529->18530 18531 406a64 18530->18531 18536 4036cc 7 API calls 18530->18536 18537 403798 7 API calls 18530->18537 18532 403508 7 API calls 18531->18532 18533 406a7e 18532->18533 18534 4034e4 7 API calls 18533->18534 18535 406a86 18534->18535 18535->18105 18536->18530 18537->18530 18539 406b00 18538->18539 18540 40357c 7 API calls 18539->18540 18543 406b1b 18540->18543 18541 406b6b 18542 403538 7 API calls 18541->18542 18544 406b76 18542->18544 18543->18541 18545 4039e8 7 API calls 18543->18545 18546 4034e4 7 API calls 18544->18546 18545->18543 18547 406b8b 18546->18547 18548 4034e4 7 API calls 18547->18548 18549 406b93 18548->18549 18550 40795c 18549->18550 18551 4047a8 12 API calls 18550->18551 18552 40797e 18551->18552 18553 4079df 18552->18553 18555 4047a8 12 API calls 18552->18555 18557 4039f0 7 API calls 18552->18557 18554 4047a8 12 API calls 18553->18554 18556 4079fa 18554->18556 18555->18552 18558 4039f0 7 API calls 18556->18558 18557->18552 18559 407a20 18558->18559 18559->18116 18561 4080d3 18560->18561 18562 40795c 12 API calls 18561->18562 18563 4080f3 18562->18563 18564 4034e4 7 API calls 18563->18564 18565 408108 18564->18565 18566 408328 18565->18566 18567 408330 18566->18567 18568 406c4c 19 API calls 18567->18568 18569 40836d 18568->18569 18570 406258 7 API calls 18569->18570 18571 408378 18570->18571 18572 406258 7 API calls 18571->18572 18573 408383 18572->18573 18574 403e1c 3 API calls 18573->18574 18575 4083a8 18574->18575 19297 4062d8 18575->19297 18578 403bbc 3 API calls 18579 4083bd 18578->18579 18580 4083c6 CreateDirectoryW 18579->18580 19302 4081a0 18580->19302 18582 4083d6 19321 403db8 18582->19321 18587 408444 18595 408466 18587->18595 19332 4040b0 18587->19332 18588 403e1c 3 API calls 18589 408416 18588->18589 18590 4062d8 3 API calls 18589->18590 18592 408421 18590->18592 18591 403e1c 3 API calls 18599 408495 18591->18599 18594 403bbc 3 API calls 18592->18594 18596 40842b 18594->18596 18595->18591 18597 408434 CreateDirectoryW 18596->18597 18598 4081a0 17 API calls 18597->18598 18598->18587 18600 403db8 3 API calls 18599->18600 18601 4084db 18600->18601 18602 4084e3 LoadLibraryExW 18601->18602 18603 4084f4 18602->18603 18605 4086c4 18602->18605 18604 408120 7 API calls 18603->18604 18606 408501 18604->18606 18607 403508 7 API calls 18605->18607 18609 408509 GetProcAddress 18606->18609 18608 408751 18607->18608 18610 403b98 SysFreeString 18608->18610 18611 408120 7 API calls 18609->18611 18612 40875e 18610->18612 18613 408524 18611->18613 18614 403508 7 API calls 18612->18614 18616 40852c GetProcAddress 18613->18616 18615 40876b 18614->18615 18617 403b98 SysFreeString 18615->18617 18618 408120 7 API calls 18616->18618 18619 408778 18617->18619 18620 408547 18618->18620 18621 4034e4 7 API calls 18619->18621 18623 40854f GetProcAddress 18620->18623 18622 408780 18621->18622 18622->18252 18624 408120 7 API calls 18623->18624 18625 40856a 18624->18625 18626 408572 GetProcAddress 18625->18626 18627 408120 7 API calls 18626->18627 18628 40858d 18627->18628 18629 408595 GetProcAddress 18628->18629 18630 408120 7 API calls 18629->18630 18631 4085b0 18630->18631 18632 4085b8 GetProcAddress 18631->18632 18633 408120 7 API calls 18632->18633 18634 4085d3 18633->18634 18635 4085db GetProcAddress 18634->18635 18636 408120 7 API calls 18635->18636 18637 4085f6 18636->18637 18638 4085fe GetProcAddress 18637->18638 18639 408120 7 API calls 18638->18639 18640 408619 18639->18640 18641 408621 GetProcAddress 18640->18641 18642 408120 7 API calls 18641->18642 18643 40863c 18642->18643 18644 408644 GetProcAddress 18643->18644 18645 408120 7 API calls 18644->18645 18646 40865f 18645->18646 18647 408667 GetProcAddress 18646->18647 18648 408120 7 API calls 18647->18648 18649 408682 18648->18649 18650 40868a GetProcAddress 18649->18650 18651 408120 7 API calls 18650->18651 18652 4086a5 18651->18652 18653 4086ad GetProcAddress 18652->18653 18653->18605 19348 409208 18654->19348 18677 4053e8 18675->18677 18676 4054b7 18676->18252 18677->18676 18678 403850 7 API calls 18677->18678 18678->18677 20404 40f944 18679->20404 18682 408120 7 API calls 18689 408136 18688->18689 18690 403538 7 API calls 18688->18690 18689->18252 18690->18689 18692 4034e4 7 API calls 18691->18692 18693 405534 18692->18693 18694 405567 18693->18694 18695 403850 7 API calls 18693->18695 18694->18252 18695->18693 21324 4132e0 18696->21324 18700 4040f4 SysAllocStringLen 18699->18700 18701 415eb7 18700->18701 21642 415610 18701->21642 18709 4050de 18708->18709 21974 40503c 18709->21974 18712 403850 7 API calls 18713 405114 18712->18713 18714 403508 7 API calls 18713->18714 18715 40512e 18714->18715 18715->18252 18717 4040f4 SysAllocStringLen 18716->18717 18718 414d03 18717->18718 18719 4062d8 3 API calls 18718->18719 18720 414d24 18719->18720 18721 403db8 3 API calls 18720->18721 18722 414d38 18721->18722 18723 4076b0 2 API calls 18722->18723 18724 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 18722->18724 18725 414e45 18722->18725 18728 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 18722->18728 18731 40ddb0 16 API calls 18722->18731 18723->18722 18724->18722 18726 403b98 SysFreeString 18725->18726 18727 414e6c 18726->18727 18729 4034e4 7 API calls 18727->18729 18728->18722 18730 414e77 18729->18730 18732 403b98 SysFreeString 18730->18732 18731->18722 18733 414e87 18732->18733 18734 403b98 SysFreeString 18733->18734 18735 414e94 18734->18735 18735->18252 18737 414f48 18736->18737 18738 4040f4 SysAllocStringLen 18737->18738 18739 414f5e 18738->18739 18740 407500 8 API calls 18739->18740 18741 414f92 18740->18741 21982 4070bc 18741->21982 18743 414fab 18744 403db8 3 API calls 18743->18744 18747 414fcd 18744->18747 18745 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 18745->18747 18746 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 18746->18747 18747->18745 18747->18746 18748 40ddb0 16 API calls 18747->18748 18749 415078 18747->18749 18748->18747 18750 403db8 3 API calls 18749->18750 18753 415096 18750->18753 18751 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 18751->18753 18752 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 18752->18753 18753->18751 18753->18752 18754 40ddb0 16 API calls 18753->18754 18755 415141 18753->18755 18754->18753 18756 403b98 SysFreeString 18755->18756 18757 415168 18756->18757 18758 4034e4 7 API calls 18757->18758 18759 415173 18758->18759 18760 403b98 SysFreeString 18759->18760 18761 415183 18760->18761 18762 4034e4 7 API calls 18761->18762 18763 41518e 18762->18763 18764 403b98 SysFreeString 18763->18764 18765 41519e 18764->18765 18766 403b98 SysFreeString 18765->18766 18767 4151ab 18766->18767 18767->18252 18769 417ac5 18768->18769 18770 4178e9 18768->18770 18769->18252 18770->18769 18771 417992 73A1A570 73A24C40 73A24C00 SelectObject 73A24D40 18770->18771 18772 404900 18771->18772 18773 4179e3 CreateStreamOnHGlobal 18772->18773 18774 4179fb 18773->18774 22002 4177e0 18774->22002 18778 4035d4 7 API calls 18779 417a94 GlobalUnlock DeleteObject DeleteDC 73A1A480 18778->18779 18779->18769 18782 40700b 18781->18782 18783 403bbc 3 API calls 18782->18783 18784 407023 18783->18784 18785 403b80 SysFreeString 18784->18785 18786 407038 18785->18786 18786->18252 18794 403be8 18787->18794 18788 403c01 18791 403b80 SysFreeString 18788->18791 18789 403c0a 18790 403c3d 18789->18790 22008 403624 MultiByteToWideChar 18789->22008 18795 4040b0 3 API calls 18790->18795 18793 403c08 18791->18793 18793->18252 18794->18788 18794->18789 18796 403c48 18795->18796 22009 403624 MultiByteToWideChar 18796->22009 18797 403c28 18797->18790 18799 403c2e 18797->18799 18801 403c74 4 API calls 18799->18801 18800 403c56 18800->18793 18802 4040b0 3 API calls 18800->18802 18801->18793 18802->18793 18805 403d69 18803->18805 18804 403db1 18804->18252 18805->18804 18806 403b58 2 API calls 18805->18806 18807 403d83 18806->18807 18808 403b70 SysFreeString 18807->18808 18808->18804 18810 4040f4 SysAllocStringLen 18809->18810 18811 407833 18810->18811 18812 403bbc 3 API calls 18811->18812 18813 40784b 18812->18813 18814 4070bc 8 API calls 18813->18814 18815 407860 18814->18815 18816 403bbc 3 API calls 18815->18816 18817 40786a 18816->18817 18818 4070bc 8 API calls 18817->18818 18819 40787f 18818->18819 18820 403bbc 3 API calls 18819->18820 18821 407889 18820->18821 18822 4070bc 8 API calls 18821->18822 18823 40789b 18822->18823 18824 403bbc 3 API calls 18823->18824 18825 4078a5 18824->18825 18826 403b98 SysFreeString 18825->18826 18827 4078bf 18826->18827 18827->18252 18829 417298 18828->18829 18829->18829 18830 406c4c 19 API calls 18829->18830 18831 4172bd 18830->18831 18832 403850 7 API calls 18831->18832 18833 4172d1 18832->18833 22010 416f88 GetModuleFileNameA 18833->22010 18835 4172e2 18836 403850 7 API calls 18835->18836 18837 4172f6 18836->18837 22012 407a4c 18837->22012 18840 403850 7 API calls 18841 41731a 18840->18841 22034 4066c0 18841->22034 18844 406bb4 8 API calls 18845 417340 18844->18845 18846 403e1c 3 API calls 18845->18846 18847 417355 18846->18847 18848 4037dc 7 API calls 18847->18848 18849 41736e 18848->18849 18850 406610 5 API calls 18849->18850 18851 417384 18850->18851 18852 4065cc 6 API calls 18851->18852 18853 417394 18852->18853 18854 403e1c 3 API calls 18853->18854 18855 4173ae 18854->18855 18856 4037dc 7 API calls 18855->18856 18857 4173c7 18856->18857 18858 4173d2 GetSystemMetrics 18857->18858 18859 406fdc 4 API calls 18858->18859 18860 4173e4 GetSystemMetrics 18859->18860 18861 406fdc 4 API calls 18860->18861 18862 4173fb 18861->18862 18863 403e1c 3 API calls 18862->18863 18864 417410 18863->18864 22041 416fb8 18864->22041 18867 403850 7 API calls 18868 41743d 18867->18868 22048 417198 18868->22048 18919 403b9e 18918->18919 18920 403ba4 SysFreeString 18919->18920 18921 403bb6 18919->18921 18920->18919 18921->18060 18924 40350e 18922->18924 18923 403534 18926 403b80 18923->18926 18924->18923 18925 402550 7 API calls 18924->18925 18925->18924 18927 403b94 18926->18927 18928 403b86 SysFreeString 18926->18928 18927->18077 18928->18927 18930 40422d 18929->18930 18950 404262 18929->18950 18931 404242 18930->18931 18932 404267 18930->18932 18933 404284 18931->18933 18934 404246 18931->18934 18935 404278 18932->18935 18936 40426e 18932->18936 18937 404292 18933->18937 18938 40428b 18933->18938 18939 40424a 18934->18939 18940 40429b 18934->18940 18942 403508 7 API calls 18935->18942 18941 4034e4 7 API calls 18936->18941 18944 403b98 SysFreeString 18937->18944 18943 403b80 SysFreeString 18938->18943 18945 4042aa 18939->18945 18946 40424e 18939->18946 18940->18950 22250 40420c 18940->22250 18941->18950 18942->18950 18943->18950 18944->18950 18945->18950 18951 404224 9 API calls 18945->18951 18948 404252 18946->18948 18949 4042c8 18946->18949 18948->18950 18953 4047b4 9 API calls 18948->18953 18949->18950 22255 4041d8 18949->22255 18950->18185 18951->18945 18953->18948 18955 402555 18954->18955 18957 402568 18954->18957 18955->18957 18958 402614 18955->18958 18957->18310 18959 4025cc 18958->18959 18962 4025c0 18959->18962 18965 4034cc 18962->18965 18966 4033f4 7 API calls 18965->18966 18967 4025cb 18966->18967 18967->18957 18969 40353c 18968->18969 18972 40354c 18968->18972 18969->18972 18985 4035a8 18969->18985 18970 40357a 18974 407b78 18970->18974 18972->18970 18973 402550 7 API calls 18972->18973 18973->18970 18975 407bb7 18974->18975 18976 407c08 CheckTokenMembership 18975->18976 18977 407c1f FreeSid 18975->18977 18976->18977 18977->18322 18980 407c9e 18979->18980 18981 407ca4 LookupAccountSidA CheckTokenMembership 18980->18981 18982 407d1d 18980->18982 18983 407cf2 FreeSid 18981->18983 18982->18334 18983->18334 18986 4035d0 18985->18986 18987 4035ac 18985->18987 18986->18972 18990 402530 18987->18990 18991 402535 18990->18991 18993 402548 18990->18993 18992 402614 7 API calls 18991->18992 18991->18993 18992->18993 18993->18972 18995 403b80 SysFreeString 18994->18995 18996 406e7f 18995->18996 19025 406dac 18996->19025 19053 407500 18999->19053 19003 406601 19002->19003 19004 4065ef 19002->19004 19006 4065ff 19003->19006 19007 403b80 SysFreeString 19003->19007 19005 403d10 4 API calls 19004->19005 19005->19006 19006->18354 19007->19006 19009 40662f 19008->19009 19010 406633 19009->19010 19011 406645 19009->19011 19012 403d10 4 API calls 19010->19012 19013 403b80 SysFreeString 19011->19013 19014 406643 19012->19014 19013->19014 19014->18356 19016 40626a 19015->19016 19065 4061e0 19016->19065 19020 40628c 19021 4062a8 19020->19021 19022 4037dc 7 API calls 19020->19022 19023 4034e4 7 API calls 19021->19023 19022->19020 19024 4062bd 19023->19024 19024->18359 19026 406dc6 19025->19026 19027 4040f4 SysAllocStringLen 19025->19027 19037 4040f4 19026->19037 19027->19026 19029 406dce 19030 406dff RegOpenKeyExW 19029->19030 19041 403d3c 19030->19041 19034 406e44 19035 403b98 SysFreeString 19034->19035 19036 406e5e 19035->19036 19036->18344 19038 4040fa SysAllocStringLen 19037->19038 19040 404110 19037->19040 19039 403b50 19038->19039 19038->19040 19039->19037 19040->19029 19042 403d40 RegQueryValueExW 19041->19042 19043 403d10 19042->19043 19044 403c74 19043->19044 19045 403b80 19044->19045 19046 403c7c SysAllocStringLen 19044->19046 19048 403b94 19045->19048 19049 403b86 SysFreeString 19045->19049 19047 403c8c SysFreeString 19046->19047 19050 403b50 19046->19050 19047->19034 19048->19034 19049->19048 19051 404110 19050->19051 19052 4040fa SysAllocStringLen 19050->19052 19051->19034 19052->19050 19052->19051 19054 4040f4 SysAllocStringLen 19053->19054 19055 40751a 19054->19055 19056 4040f4 SysAllocStringLen 19055->19056 19057 407522 19056->19057 19058 407579 RegOpenKeyExW 19057->19058 19059 407546 19057->19059 19058->19059 19060 40759d RegQueryValueExW 19059->19060 19061 403d10 4 API calls 19060->19061 19062 4075be 19061->19062 19063 403b98 SysFreeString 19062->19063 19064 406bce 19063->19064 19064->18348 19066 4061f1 19065->19066 19067 4034e4 7 API calls 19066->19067 19068 406249 19067->19068 19069 4067e8 19068->19069 19070 4067ed 19069->19070 19073 4035d4 19070->19073 19074 4035a8 7 API calls 19073->19074 19075 4035e4 19074->19075 19076 4034e4 7 API calls 19075->19076 19077 4035fc 19076->19077 19077->19020 19079 403acd 19078->19079 19083 403afd 19078->19083 19081 4035a8 7 API calls 19079->19081 19082 403ad9 19079->19082 19080 4034e4 7 API calls 19080->19082 19081->19083 19082->18385 19083->19080 19085 40399c 19084->19085 19086 4039d7 19085->19086 19087 4035a8 7 API calls 19085->19087 19086->18434 19088 4039b3 19087->19088 19088->19086 19089 402550 7 API calls 19088->19089 19089->19086 19091 403a22 19090->19091 19093 4039f5 19090->19093 19092 4034e4 7 API calls 19091->19092 19096 403a18 19092->19096 19093->19091 19094 403a09 19093->19094 19095 4035d4 7 API calls 19094->19095 19095->19096 19096->18483 19098 417f8b 19097->19098 19099 4034e4 7 API calls 19098->19099 19100 417fa1 19099->19100 19175 4047a8 19100->19175 19102 418088 19104 4180b1 19102->19104 19105 41808c 19102->19105 19103 417fbc 19103->19102 19178 417e80 19103->19178 19188 417dcc 19104->19188 19108 4037dc 7 API calls 19105->19108 19109 4180a0 19108->19109 19111 418688 45 API calls 19109->19111 19110 4180af 19112 4034e4 7 API calls 19110->19112 19111->19110 19113 4180d0 19112->19113 19201 4047b4 19113->19201 19116 4034e4 7 API calls 19117 4180e6 19116->19117 19117->18490 19119 41816c 19118->19119 19120 40357c 7 API calls 19119->19120 19121 4181a7 19120->19121 19122 4039e8 7 API calls 19121->19122 19123 4181af GetModuleHandleA 19122->19123 19124 4181cb 19123->19124 19125 4181bb 19123->19125 19127 4039e8 7 API calls 19124->19127 19126 4039e8 7 API calls 19125->19126 19128 4181c3 LoadLibraryA 19126->19128 19129 4181d3 GetProcAddress 19127->19129 19128->19124 19130 4039e8 7 API calls 19129->19130 19131 4181ea GetProcAddress 19130->19131 19132 4039e8 7 API calls 19131->19132 19133 418201 GetProcAddress 19132->19133 19134 4039e8 7 API calls 19133->19134 19135 418218 GetProcAddress 19134->19135 19136 4039e8 7 API calls 19135->19136 19137 41822f GetProcAddress 19136->19137 19138 4039e8 7 API calls 19137->19138 19139 418246 GetProcAddress 19138->19139 19140 4039e8 7 API calls 19139->19140 19141 41825d GetProcAddress 19140->19141 19142 4039e8 7 API calls 19141->19142 19143 418274 GetProcAddress 19142->19143 19144 4184e2 19143->19144 19151 41828b 19143->19151 19145 403b98 SysFreeString 19144->19145 19146 4184ff 19145->19146 19147 4034e4 7 API calls 19146->19147 19148 41850a 19147->19148 19149 403b98 SysFreeString 19148->19149 19150 41851a 19149->19150 19152 403508 7 API calls 19150->19152 19151->19144 19153 4034e4 7 API calls 19151->19153 19154 418527 19152->19154 19157 4182fb 19153->19157 19155 403508 7 API calls 19154->19155 19156 418534 19155->19156 19156->18491 19157->19144 19158 403850 7 API calls 19157->19158 19159 4183ce 19158->19159 19160 417d60 4 API calls 19159->19160 19161 4183f8 19160->19161 19162 403e1c 3 API calls 19161->19162 19163 418427 19162->19163 19164 4039e8 7 API calls 19163->19164 19165 418448 19164->19165 19166 4034e4 7 API calls 19165->19166 19169 418458 19166->19169 19167 4034e4 7 API calls 19167->19169 19168 4035d4 7 API calls 19168->19169 19169->19167 19169->19168 19170 403798 7 API calls 19169->19170 19171 4184a8 19169->19171 19170->19169 19172 4039f0 7 API calls 19171->19172 19173 4184d7 19172->19173 19174 403538 7 API calls 19173->19174 19174->19144 19207 40461c 19175->19207 19179 417e97 LoadLibraryA GetProcAddress 19178->19179 19274 403980 19178->19274 19181 417ec2 19179->19181 19187 417edd 19179->19187 19182 402530 7 API calls 19181->19182 19184 417ed1 19182->19184 19183 4034e4 7 API calls 19186 417f21 19183->19186 19185 402530 7 API calls 19184->19185 19185->19187 19186->19103 19187->19183 19276 417d60 19188->19276 19191 417d60 4 API calls 19192 417e0d 19191->19192 19193 417d60 4 API calls 19192->19193 19194 417e22 19193->19194 19195 417d60 4 API calls 19194->19195 19196 417e37 19195->19196 19282 403e1c 19196->19282 19202 4047ba 19201->19202 19206 4047ec 19201->19206 19203 4047e4 19202->19203 19205 404224 9 API calls 19202->19205 19202->19206 19204 402550 7 API calls 19203->19204 19204->19206 19205->19203 19206->19116 19208 40463b 19207->19208 19212 404655 19207->19212 19209 404646 19208->19209 19210 402614 7 API calls 19208->19210 19221 404614 19209->19221 19210->19209 19214 40469f 19212->19214 19215 402614 7 API calls 19212->19215 19213 404650 19213->19103 19216 402530 7 API calls 19214->19216 19218 4046ac 19214->19218 19215->19214 19217 4046eb 19216->19217 19217->19218 19224 4045fc 19217->19224 19218->19213 19220 40461c 12 API calls 19218->19220 19220->19218 19222 4047b4 9 API calls 19221->19222 19223 404619 19222->19223 19223->19213 19227 404444 19224->19227 19226 404607 19226->19218 19228 404459 19227->19228 19244 40447f 19227->19244 19230 4044a1 19228->19230 19231 40445e 19228->19231 19229 403538 7 API calls 19229->19244 19240 40449c 19230->19240 19246 403bbc 19230->19246 19233 404463 19231->19233 19237 4044b5 19231->19237 19235 404468 19233->19235 19236 4044c9 19233->19236 19238 4044ea 19235->19238 19239 40446d 19235->19239 19236->19240 19241 404444 12 API calls 19236->19241 19237->19240 19256 404310 19237->19256 19238->19240 19261 404328 19238->19261 19239->19240 19243 40451b 19239->19243 19239->19244 19240->19226 19241->19236 19243->19240 19270 4047f0 19243->19270 19244->19229 19244->19240 19247 403b80 19246->19247 19248 403bc4 19246->19248 19249 403b94 19247->19249 19250 403b86 SysFreeString 19247->19250 19248->19247 19251 403bcf SysReAllocStringLen 19248->19251 19249->19230 19250->19249 19252 403b50 19251->19252 19253 403bdf 19251->19253 19254 404110 19252->19254 19255 4040fa SysAllocStringLen 19252->19255 19253->19230 19254->19230 19255->19252 19255->19254 19257 404320 19256->19257 19258 404319 19256->19258 19259 402614 7 API calls 19257->19259 19258->19237 19260 404327 19259->19260 19260->19237 19265 404342 19261->19265 19262 403538 7 API calls 19262->19265 19263 403bbc 3 API calls 19263->19265 19264 404310 7 API calls 19264->19265 19265->19262 19265->19263 19265->19264 19266 40442e 19265->19266 19267 404444 12 API calls 19265->19267 19268 404328 12 API calls 19265->19268 19269 4047f0 9 API calls 19265->19269 19266->19238 19267->19265 19268->19265 19269->19265 19272 4047f7 19270->19272 19271 404811 19271->19243 19272->19271 19273 4047b4 9 API calls 19272->19273 19273->19271 19275 403984 19274->19275 19275->19179 19277 417d8f 19276->19277 19278 403bbc 3 API calls 19277->19278 19279 417da7 19278->19279 19280 403b80 SysFreeString 19279->19280 19281 417dbc 19280->19281 19281->19191 19283 403e24 19282->19283 19288 403b58 19283->19288 19285 403e39 19294 403b70 19285->19294 19289 403b6c 19288->19289 19290 403b5c SysAllocStringLen 19288->19290 19289->19285 19290->19289 19291 403b50 19290->19291 19292 404110 19291->19292 19293 4040fa SysAllocStringLen 19291->19293 19292->19285 19293->19291 19293->19292 19295 403b76 SysFreeString 19294->19295 19296 403b7c 19294->19296 19295->19296 19298 4040b0 3 API calls 19297->19298 19299 4062ea 19298->19299 19300 4040b0 3 API calls 19299->19300 19301 406315 19300->19301 19301->18578 19303 4040f4 SysAllocStringLen 19302->19303 19304 4081bc 19303->19304 19305 40795c 12 API calls 19304->19305 19318 4081e2 19305->19318 19306 4082a3 19307 403b98 SysFreeString 19306->19307 19308 4082bd 19307->19308 19309 403508 7 API calls 19308->19309 19310 4082ca 19309->19310 19311 4047b4 9 API calls 19310->19311 19312 4082d8 19311->19312 19313 4034e4 7 API calls 19312->19313 19314 4082e0 19313->19314 19315 403b80 SysFreeString 19314->19315 19316 4082e8 19315->19316 19316->18582 19317 4039f0 7 API calls 19317->19318 19318->19306 19318->19317 19319 403e1c 3 API calls 19318->19319 19338 4072a0 19318->19338 19319->19318 19322 403dcf 19321->19322 19323 403e15 19322->19323 19324 403b58 2 API calls 19322->19324 19327 4076b0 19323->19327 19325 403dec 19324->19325 19326 403b70 SysFreeString 19325->19326 19326->19323 19328 4040f4 SysAllocStringLen 19327->19328 19329 4076c0 19328->19329 19330 403b80 SysFreeString 19329->19330 19331 4076fb 19330->19331 19331->18587 19331->18588 19333 4040bd 19332->19333 19336 4040c4 19332->19336 19334 403b58 2 API calls 19333->19334 19334->19336 19335 403b70 SysFreeString 19337 4040ed 19335->19337 19336->19335 19337->18595 19339 4040f4 SysAllocStringLen 19338->19339 19340 4072b5 19339->19340 19341 4039e8 7 API calls 19340->19341 19342 407305 WriteFile 19341->19342 19343 407316 19342->19343 19344 4034e4 7 API calls 19343->19344 19345 40732b 19344->19345 19346 403b80 SysFreeString 19345->19346 19347 407333 19346->19347 19347->19318 19349 409210 19348->19349 19349->19349 19350 4093b3 19349->19350 19351 408120 7 API calls 19349->19351 19352 403b98 SysFreeString 19350->19352 19353 409249 19351->19353 19354 4093cd 19352->19354 19357 4062d8 3 API calls 19353->19357 19355 403508 7 API calls 19354->19355 19356 4093da 19355->19356 19358 403b98 SysFreeString 19356->19358 19359 409265 19357->19359 19360 4093e7 19358->19360 19738 408d44 19359->19738 19362 403508 7 API calls 19360->19362 19364 4093f4 19362->19364 19366 403b98 SysFreeString 19364->19366 19365 408120 7 API calls 19367 409289 19365->19367 19368 409401 19366->19368 19371 4062d8 3 API calls 19367->19371 19369 403508 7 API calls 19368->19369 19370 40940e 19369->19370 19372 403b98 SysFreeString 19370->19372 19373 4092a5 19371->19373 19374 40941b 19372->19374 19375 408d44 20 API calls 19373->19375 19376 403508 7 API calls 19374->19376 19377 4092b3 19375->19377 19378 409428 19376->19378 19379 408120 7 API calls 19377->19379 19380 403b98 SysFreeString 19378->19380 19381 4092c9 19379->19381 19382 409435 19380->19382 19385 4062d8 3 API calls 19381->19385 19383 403508 7 API calls 19382->19383 19384 409442 19383->19384 19386 403b98 SysFreeString 19384->19386 19387 4092e5 19385->19387 19388 40944f 19386->19388 19389 408d44 20 API calls 19387->19389 19390 403508 7 API calls 19388->19390 19391 4092f3 19389->19391 19392 40945c 19390->19392 19393 408120 7 API calls 19391->19393 19410 409ab0 19392->19410 19394 409309 19393->19394 19395 4062d8 3 API calls 19394->19395 19396 409325 19395->19396 19397 408d44 20 API calls 19396->19397 19398 409333 19397->19398 19399 408120 7 API calls 19398->19399 19400 409349 19399->19400 19401 4062d8 3 API calls 19400->19401 19402 409365 19401->19402 19403 408d44 20 API calls 19402->19403 19404 409373 19403->19404 19405 408120 7 API calls 19404->19405 19406 409389 19405->19406 19407 4062d8 3 API calls 19406->19407 19408 4093a5 19407->19408 19409 408d44 20 API calls 19408->19409 19409->19350 19415 409ab8 19410->19415 19411 40a373 19412 403b98 SysFreeString 19411->19412 19413 40a390 19412->19413 19414 403b98 SysFreeString 19413->19414 19416 40a39d 19414->19416 19415->19411 19417 4062d8 3 API calls 19415->19417 19544 40b3ec 19416->19544 19418 409b04 19417->19418 19850 4098a0 19418->19850 19420 409b10 19421 4062d8 3 API calls 19420->19421 19422 409b39 19421->19422 19423 4098a0 24 API calls 19422->19423 19424 409b45 19423->19424 19425 4062d8 3 API calls 19424->19425 19426 409b6e 19425->19426 19427 4098a0 24 API calls 19426->19427 19428 409b7a 19427->19428 19429 4062d8 3 API calls 19428->19429 19430 409ba3 19429->19430 19431 4098a0 24 API calls 19430->19431 19432 409baf 19431->19432 19433 4062d8 3 API calls 19432->19433 19434 409bd8 19433->19434 19435 4098a0 24 API calls 19434->19435 19436 409be4 19435->19436 19437 4062d8 3 API calls 19436->19437 19438 409c0d 19437->19438 19439 4098a0 24 API calls 19438->19439 19440 409c19 19439->19440 19441 4062d8 3 API calls 19440->19441 19442 409c42 19441->19442 19443 4098a0 24 API calls 19442->19443 19444 409c4e 19443->19444 19445 4062d8 3 API calls 19444->19445 19545 40b405 19544->19545 19960 40b15c 19544->19960 19547 40aec4 19545->19547 19548 40357c 7 API calls 19547->19548 19549 40aefb 19548->19549 19997 40ae30 19549->19997 19551 40b073 19552 403508 7 API calls 19551->19552 19553 40b0a1 19552->19553 19558 40bd9c 19553->19558 19554 4039f0 7 API calls 19556 40af06 19554->19556 19555 403a30 7 API calls 19555->19556 19556->19551 19556->19554 19556->19555 19557 405210 12 API calls 19556->19557 19557->19556 19559 40bdc2 19558->19559 20143 40b4f0 19559->20143 19739 408d4d 19738->19739 19739->19739 19740 4040f4 SysAllocStringLen 19739->19740 19741 408d69 19740->19741 19742 4047a8 12 API calls 19741->19742 19743 408d9c 19742->19743 19744 403db8 3 API calls 19743->19744 19770 408dbd 19744->19770 19745 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 19745->19770 19746 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 19746->19770 19747 409102 19748 403508 7 API calls 19747->19748 19750 409191 19748->19750 19751 403b98 SysFreeString 19750->19751 19752 4091a1 19751->19752 19753 4034e4 7 API calls 19752->19753 19754 4091a9 19753->19754 19755 4047b4 9 API calls 19754->19755 19756 4091b7 19755->19756 19757 403508 7 API calls 19756->19757 19758 4091c4 19757->19758 19759 4034e4 7 API calls 19758->19759 19760 4091cc 19759->19760 19761 403b80 SysFreeString 19760->19761 19762 4091d4 19761->19762 19763 4034e4 7 API calls 19762->19763 19764 4091dc 19763->19764 19764->19365 19765 4034e4 7 API calls 19765->19770 19766 403798 7 API calls 19766->19770 19767 406984 7 API calls 19767->19770 19768 4039e8 7 API calls 19768->19770 19769 4036cc 7 API calls 19769->19770 19770->19745 19770->19746 19770->19747 19770->19765 19770->19766 19770->19767 19770->19768 19770->19769 19772 408a44 19770->19772 19802 405210 19770->19802 19773 408a4c 19772->19773 19773->19773 19774 4040f4 SysAllocStringLen 19773->19774 19775 408a62 19774->19775 19776 4047a8 12 API calls 19775->19776 19777 408a84 19776->19777 19824 407168 19777->19824 19779 408a92 19780 408120 7 API calls 19779->19780 19781 408aa8 19780->19781 19782 403850 7 API calls 19781->19782 19783 408abd 19782->19783 19784 407428 7 API calls 19783->19784 19785 408acd 19784->19785 19786 40357c 7 API calls 19785->19786 19789 408ad8 19786->19789 19787 403850 7 API calls 19787->19789 19788 408cbd 19790 403508 7 API calls 19788->19790 19789->19787 19789->19788 19793 408120 7 API calls 19789->19793 19795 407428 7 API calls 19789->19795 19796 4039f0 7 API calls 19789->19796 19797 403798 7 API calls 19789->19797 19799 4037dc 7 API calls 19789->19799 19800 4047a8 12 API calls 19789->19800 19801 403538 7 API calls 19789->19801 19839 403a30 19789->19839 19791 408cd7 19790->19791 19792 403b80 SysFreeString 19791->19792 19794 408cdf 19792->19794 19793->19789 19794->19770 19795->19789 19796->19789 19797->19789 19799->19789 19800->19789 19801->19789 19803 40522a 19802->19803 19804 4047a8 12 API calls 19803->19804 19813 40539f 19803->19813 19805 4052fe 19804->19805 19806 403538 7 API calls 19805->19806 19807 405319 19806->19807 19808 403538 7 API calls 19807->19808 19809 405331 19808->19809 19810 403538 7 API calls 19809->19810 19811 405349 19810->19811 19812 403538 7 API calls 19811->19812 19814 405361 19812->19814 19815 403508 7 API calls 19813->19815 19817 403538 7 API calls 19814->19817 19816 4053b9 19815->19816 19818 403508 7 API calls 19816->19818 19820 405379 19817->19820 19819 4053c6 19818->19819 19819->19770 19821 403538 7 API calls 19820->19821 19822 405391 19821->19822 19823 4050c8 7 API calls 19822->19823 19823->19813 19825 4040f4 SysAllocStringLen 19824->19825 19826 407182 19825->19826 19827 4034e4 7 API calls 19826->19827 19828 407198 19827->19828 19829 4034e4 7 API calls 19828->19829 19831 4071a0 19829->19831 19830 407200 19832 403ac0 7 API calls 19830->19832 19831->19830 19833 407275 19831->19833 19837 40721f 19832->19837 19834 4034e4 7 API calls 19833->19834 19835 40728a 19834->19835 19836 403b80 SysFreeString 19835->19836 19838 407292 19836->19838 19837->19779 19838->19779 19844 4039e0 19839->19844 19841 403a3e 19842 403a74 19841->19842 19843 403ac0 7 API calls 19841->19843 19842->19789 19843->19842 19845 40399c 19844->19845 19846 4035a8 7 API calls 19845->19846 19847 4039d7 19845->19847 19848 4039b3 19846->19848 19847->19841 19848->19847 19849 402550 7 API calls 19848->19849 19849->19847 19851 4098f4 19850->19851 19852 4040f4 SysAllocStringLen 19850->19852 19853 4040f4 SysAllocStringLen 19851->19853 19852->19851 19854 4098fc 19853->19854 19855 403b80 SysFreeString 19854->19855 19856 409917 19855->19856 19857 403db8 3 API calls 19856->19857 19858 40992b 19857->19858 19859 4076b0 2 API calls 19858->19859 19860 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 19858->19860 19861 409a49 19858->19861 19867 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 19858->19867 19868 4095a4 19858->19868 19859->19858 19860->19858 19862 403b98 SysFreeString 19861->19862 19863 409a70 19862->19863 19864 403b98 SysFreeString 19863->19864 19866 409a7d 19864->19866 19866->19420 19867->19858 19869 4095ad 19868->19869 19869->19869 19870 4040f4 SysAllocStringLen 19869->19870 19871 4095c9 19870->19871 19872 4040f4 SysAllocStringLen 19871->19872 19873 4095d1 19872->19873 19874 4040f4 SysAllocStringLen 19873->19874 19875 4095d9 19874->19875 19876 4034e4 7 API calls 19875->19876 19877 4095ef 19876->19877 19878 406fdc 4 API calls 19877->19878 19879 409600 19878->19879 19915 406f1c 19879->19915 19882 403e1c 3 API calls 19883 409620 19882->19883 19884 40781c 8 API calls 19883->19884 19943 4027b4 QueryPerformanceCounter 19915->19943 19917 406f40 19918 406fdc 4 API calls 19917->19918 19919 406f7b 19918->19919 19920 406fdc 4 API calls 19919->19920 19921 406f88 19920->19921 19922 406fdc 4 API calls 19921->19922 19923 406f95 19922->19923 19924 406fdc 4 API calls 19923->19924 19925 406fa3 19924->19925 19926 403e1c 3 API calls 19925->19926 19927 406fb3 19926->19927 19928 403b98 SysFreeString 19927->19928 19929 406fcd 19928->19929 19929->19882 19944 4027c1 19943->19944 19945 4027cc GetTickCount 19943->19945 19944->19917 19945->19917 19961 40b164 19960->19961 19961->19961 19962 408120 7 API calls 19961->19962 19963 40b18a 19962->19963 19964 408120 7 API calls 19963->19964 19965 40b1a0 19964->19965 19966 40b1a8 LoadLibraryA GetProcAddress 19965->19966 19967 40b1c7 19966->19967 19968 408120 7 API calls 19967->19968 19969 40b1fb 19968->19969 19970 40b203 LoadLibraryA 19969->19970 19971 40b213 19970->19971 19972 40b36e 19970->19972 19973 408120 7 API calls 19971->19973 19974 403508 7 API calls 19972->19974 19975 40b220 19973->19975 19976 40b388 19974->19976 19978 40b228 GetProcAddress 19975->19978 19977 403b98 SysFreeString 19976->19977 19979 40b395 19977->19979 19980 408120 7 API calls 19978->19980 19981 403508 7 API calls 19979->19981 19982 40b23e 19980->19982 19983 40b3a2 19981->19983 19985 40b246 GetProcAddress 19982->19985 19984 403508 7 API calls 19983->19984 19986 40b3af 19984->19986 19987 408120 7 API calls 19985->19987 19989 404224 9 API calls 19986->19989 19988 40b25c 19987->19988 19991 40b264 GetProcAddress 19988->19991 19990 40b3c2 19989->19990 19990->19545 19995 40b27f 19991->19995 19992 4047b4 9 API calls 19992->19995 19993 40370c 8 API calls 19993->19995 19994 408120 7 API calls 19994->19995 19995->19972 19995->19992 19995->19993 19995->19994 19996 405210 12 API calls 19995->19996 19996->19995 19998 40ae42 19997->19998 19999 4034e4 7 API calls 19998->19999 20000 40ae57 19999->20000 20007 40ad80 20000->20007 20003 40ae6a 20005 4034e4 7 API calls 20003->20005 20006 40ae7f 20005->20006 20006->19556 20008 40adad 20007->20008 20009 407500 8 API calls 20008->20009 20010 40adbf 20009->20010 20011 403b98 SysFreeString 20010->20011 20012 40ae03 20011->20012 20013 4034e4 7 API calls 20012->20013 20014 40ae0b 20013->20014 20014->20003 20015 40acb8 20014->20015 20016 40accf 20015->20016 20017 4034e4 7 API calls 20016->20017 20018 40ace4 20017->20018 20029 40a4dc OleInitialize 20018->20029 20020 40acec 20042 40aa84 20020->20042 20030 4047a8 12 API calls 20029->20030 20031 40a51d 20030->20031 20066 40a4a4 20031->20066 20033 40a52d 20034 4047a8 12 API calls 20033->20034 20035 40a603 20033->20035 20039 4039f0 7 API calls 20033->20039 20040 402530 7 API calls 20033->20040 20070 40370c 20033->20070 20086 404538 20033->20086 20034->20033 20037 4034e4 7 API calls 20035->20037 20038 40a620 20037->20038 20038->20020 20039->20033 20040->20033 20043 40aaae 20042->20043 20044 4034e4 7 API calls 20043->20044 20090 404900 20066->20090 20069 40a4c6 20069->20033 20079 403640 20070->20079 20071 403662 20073 403695 20071->20073 20092 403604 WideCharToMultiByte 20071->20092 20072 403659 20074 4034e4 7 API calls 20072->20074 20076 403ac0 7 API calls 20073->20076 20077 403660 20074->20077 20080 4036a2 20076->20080 20077->20033 20078 403680 20078->20073 20081 403686 20078->20081 20079->20071 20079->20072 20093 403604 WideCharToMultiByte 20080->20093 20083 4035d4 7 API calls 20081->20083 20083->20077 20087 404548 20086->20087 20094 403624 MultiByteToWideChar 20087->20094 20089 40455c 20089->20033 20091 404906 CoCreateInstance 20090->20091 20091->20069 20092->20078 20094->20089 20144 40b4f8 20143->20144 20144->20144 20145 4040f4 SysAllocStringLen 20144->20145 20146 40b50d 20145->20146 20147 408120 7 API calls 20146->20147 20148 40b541 20147->20148 20149 40357c 7 API calls 20148->20149 20150 40b552 20149->20150 20151 408120 7 API calls 20150->20151 20152 40b562 20151->20152 20405 40f94c 20404->20405 20406 4062d8 3 API calls 20405->20406 20407 40f997 20406->20407 20744 40f6ac 20407->20744 20409 40f9b0 20410 4062d8 3 API calls 20409->20410 20411 40f9d9 20410->20411 20412 40f6ac 21 API calls 20411->20412 20413 40f9f2 20412->20413 20414 4062d8 3 API calls 20413->20414 20415 40fa1b 20414->20415 20416 40f6ac 21 API calls 20415->20416 20417 40fa34 20416->20417 20418 4062d8 3 API calls 20417->20418 20419 40fa5d 20418->20419 20420 40f6ac 21 API calls 20419->20420 20421 40fa76 20420->20421 20422 4062d8 3 API calls 20421->20422 20423 40fa9f 20422->20423 20424 40f6ac 21 API calls 20423->20424 20425 40fab8 20424->20425 20426 4062d8 3 API calls 20425->20426 20427 40fae1 20426->20427 20428 40f6ac 21 API calls 20427->20428 20429 40fafa 20428->20429 20430 4062d8 3 API calls 20429->20430 20431 40fb23 20430->20431 20432 40f6ac 21 API calls 20431->20432 20435 40fb3c 20432->20435 20433 410884 20434 403b98 SysFreeString 20433->20434 20436 4108a1 20434->20436 20435->20433 20439 4062d8 3 API calls 20435->20439 20437 403b98 SysFreeString 20436->20437 20438 4108b1 20437->20438 20440 4034e4 7 API calls 20438->20440 20441 40fb75 20439->20441 20442 4108b9 20440->20442 20788 40ee00 20441->20788 20442->18682 20745 40f6b5 20744->20745 20745->20745 20746 4040f4 SysAllocStringLen 20745->20746 20747 40f6d4 20746->20747 20748 4040f4 SysAllocStringLen 20747->20748 20749 40f6dc 20748->20749 20750 4040f4 SysAllocStringLen 20749->20750 20751 40f6e4 20750->20751 20752 403db8 3 API calls 20751->20752 20756 40f712 20752->20756 20753 403d10 4 API calls 20753->20756 20754 403e1c 3 API calls 20754->20756 20756->20753 20756->20754 20757 403798 7 API calls 20756->20757 20758 40f783 20756->20758 20853 40f440 20756->20853 20757->20756 20759 403e1c 3 API calls 20758->20759 20761 40f7ab 20759->20761 20760 403d10 4 API calls 20760->20761 20761->20760 20762 403e1c 3 API calls 20761->20762 20763 40f440 13 API calls 20761->20763 20764 403798 7 API calls 20761->20764 20765 40f81c 20761->20765 20762->20761 20763->20761 20764->20761 20766 40f870 20765->20766 20767 403e1c 3 API calls 20765->20767 20769 403b80 SysFreeString 20766->20769 20768 40f851 20767->20768 20878 40dce8 20768->20878 20770 40f888 20769->20770 20771 4034e4 7 API calls 20770->20771 20772 40f893 20771->20772 20774 403b98 SysFreeString 20772->20774 20775 40f8a3 20774->20775 20776 4034e4 7 API calls 20775->20776 20777 40f8ae 20776->20777 20778 403b98 SysFreeString 20777->20778 20779 40f8be 20778->20779 20780 4034e4 7 API calls 20779->20780 20781 40f8c9 20780->20781 20782 403b80 SysFreeString 20781->20782 20783 40f8d4 20782->20783 20784 4034e4 7 API calls 20783->20784 20785 40f8dc 20784->20785 20786 403b98 SysFreeString 20785->20786 20787 40f8e9 20786->20787 20787->20409 20789 40ee09 20788->20789 20789->20789 20790 4040f4 SysAllocStringLen 20789->20790 20791 40ee28 20790->20791 20792 4040f4 SysAllocStringLen 20791->20792 20793 40ee30 20792->20793 20854 40f448 20853->20854 20854->20854 20855 4040f4 SysAllocStringLen 20854->20855 20856 40f460 20855->20856 20857 4034e4 7 API calls 20856->20857 20858 40f476 20857->20858 20859 407168 9 API calls 20858->20859 20860 40f481 20859->20860 20861 40795c 12 API calls 20860->20861 20862 40f491 20861->20862 20863 40f5fd 20862->20863 20874 40357c 7 API calls 20862->20874 20875 4039f0 7 API calls 20862->20875 20876 403850 7 API calls 20862->20876 20886 405148 20862->20886 20864 403538 7 API calls 20863->20864 20865 40f608 20864->20865 20866 4047b4 9 API calls 20865->20866 20867 40f616 20866->20867 20868 403508 7 API calls 20867->20868 20869 40f630 20868->20869 20870 4047b4 9 API calls 20869->20870 20871 40f63e 20870->20871 20872 403b80 SysFreeString 20871->20872 20873 40f646 20872->20873 20873->20756 20874->20862 20875->20862 20876->20862 20882 40dd01 20878->20882 20879 40dd48 20880 403508 7 API calls 20879->20880 20881 40dda2 20880->20881 20881->20766 20882->20879 20896 40dca8 20882->20896 20887 40515a 20886->20887 20888 4051ed 20887->20888 20891 4047a8 12 API calls 20887->20891 20889 4034e4 7 API calls 20888->20889 20890 405202 20889->20890 20890->20862 20892 4051c6 20891->20892 20893 403538 7 API calls 20892->20893 20894 4051e5 20893->20894 20895 4050c8 7 API calls 20894->20895 20895->20888 20897 4034e4 7 API calls 20896->20897 20899 40dcb6 20897->20899 20898 40dce2 20903 40d9ac 20898->20903 20899->20898 20900 403ac0 7 API calls 20899->20900 20901 40dccc 20900->20901 20902 40dcdc CharToOemBuffA 20901->20902 20902->20898 20904 40d9d0 20903->20904 20905 40357c 7 API calls 20904->20905 20906 40d9f1 20905->20906 20907 40357c 7 API calls 20906->20907 20908 40d9fc 20907->20908 20909 403ac0 7 API calls 20908->20909 20910 40da1b 20909->20910 20911 403ac0 7 API calls 20910->20911 20912 40da25 20911->20912 20913 4039e8 7 API calls 20912->20913 20914 40da2d 20913->20914 20915 4035d4 7 API calls 20914->20915 20916 40daed 20915->20916 20917 403850 7 API calls 20916->20917 20918 40db06 20917->20918 20919 4034e4 7 API calls 20918->20919 20920 40db0e 20919->20920 20921 4035d4 7 API calls 20920->20921 20922 40db1e 20921->20922 20923 403850 7 API calls 20922->20923 20924 40db34 20923->20924 20925 4034e4 7 API calls 20924->20925 20926 40db3c 20925->20926 20927 403508 7 API calls 20926->20927 20928 40db59 20927->20928 20928->20879 21326 4132e8 21324->21326 21325 413faa 21327 403b98 SysFreeString 21325->21327 21326->21325 21330 4062d8 3 API calls 21326->21330 21328 413fc7 21327->21328 21329 403b98 SysFreeString 21328->21329 21331 413fd7 21329->21331 21332 413343 21330->21332 21333 4034e4 7 API calls 21331->21333 21480 412d9c 21332->21480 21334 413fdf 21333->21334 21334->18252 21336 41335c 21337 4062d8 3 API calls 21336->21337 21338 413387 21337->21338 21339 412d9c 29 API calls 21338->21339 21340 4133a0 21339->21340 21341 4062d8 3 API calls 21340->21341 21342 4133cb 21341->21342 21343 412d9c 29 API calls 21342->21343 21344 4133e4 21343->21344 21345 4062d8 3 API calls 21344->21345 21346 41340f 21345->21346 21347 412d9c 29 API calls 21346->21347 21348 413428 21347->21348 21349 4062d8 3 API calls 21348->21349 21350 413453 21349->21350 21351 412d9c 29 API calls 21350->21351 21352 41346c 21351->21352 21353 4062d8 3 API calls 21352->21353 21354 413497 21353->21354 21355 412d9c 29 API calls 21354->21355 21356 4134b0 21355->21356 21357 4062d8 3 API calls 21356->21357 21358 4134db 21357->21358 21359 412d9c 29 API calls 21358->21359 21360 4134f4 21359->21360 21361 4062d8 3 API calls 21360->21361 21362 41351f 21361->21362 21363 412d9c 29 API calls 21362->21363 21364 41353e 21363->21364 21365 4062d8 3 API calls 21364->21365 21366 413578 21365->21366 21367 412d9c 29 API calls 21366->21367 21368 41359a 21367->21368 21369 4062d8 3 API calls 21368->21369 21370 4135d4 21369->21370 21371 412d9c 29 API calls 21370->21371 21372 4135f6 21371->21372 21373 4062d8 3 API calls 21372->21373 21374 413630 21373->21374 21481 412da5 21480->21481 21481->21481 21482 4040f4 SysAllocStringLen 21481->21482 21483 412dc4 21482->21483 21484 4040f4 SysAllocStringLen 21483->21484 21485 412dcc 21484->21485 21486 4040f4 SysAllocStringLen 21485->21486 21487 412dd4 21486->21487 21488 403db8 3 API calls 21487->21488 21489 412dfc 21488->21489 21490 412e07 FindFirstFileW 21489->21490 21491 412e10 21490->21491 21492 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 21491->21492 21493 4076b0 2 API calls 21491->21493 21494 412f5e FindNextFileW 21491->21494 21505 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 21491->21505 21511 40dce8 8 API calls 21491->21511 21544 4129a4 21491->21544 21492->21491 21493->21491 21494->21491 21495 412f76 FindClose 21494->21495 21496 412f8c 21495->21496 21497 403b98 SysFreeString 21496->21497 21498 412f9c 21497->21498 21499 4034e4 7 API calls 21498->21499 21501 412fa7 21499->21501 21502 403b98 SysFreeString 21501->21502 21503 412fb7 21502->21503 21504 4034e4 7 API calls 21503->21504 21506 412fc2 21504->21506 21505->21491 21507 403b98 SysFreeString 21506->21507 21508 412fd2 21507->21508 21509 403b98 SysFreeString 21508->21509 21510 412fdf 21509->21510 21510->21336 21511->21491 21545 4129ac 21544->21545 21545->21545 21546 4040f4 SysAllocStringLen 21545->21546 21547 4129c4 21546->21547 21548 403b80 SysFreeString 21547->21548 21549 4129da GetTickCount 21548->21549 21550 406fdc 4 API calls 21549->21550 21551 4129f5 21550->21551 21552 406f1c 10 API calls 21551->21552 21553 412a00 21552->21553 21554 403e1c 3 API calls 21553->21554 21555 412a15 21554->21555 21556 40781c 8 API calls 21555->21556 21557 412a20 21556->21557 21558 4062d8 3 API calls 21557->21558 21559 412a2d 21558->21559 21560 403e1c 3 API calls 21559->21560 21561 412a45 21560->21561 21562 40781c 8 API calls 21561->21562 21563 412a50 21562->21563 21564 412a63 CopyFileW 21563->21564 21565 412a74 21564->21565 21566 404afc 8 API calls 21565->21566 21567 412a7f 21566->21567 21568 4076b0 2 API calls 21567->21568 21591 412a92 21568->21591 21569 412a96 21570 403b98 SysFreeString 21569->21570 21571 412c24 21570->21571 21572 4034e4 7 API calls 21571->21572 21573 412c2c 21572->21573 21574 403b98 SysFreeString 21573->21574 21575 412c39 21574->21575 21576 403508 7 API calls 21575->21576 21577 412c46 21576->21577 21579 403b98 SysFreeString 21577->21579 21578 412bc1 21580 403bbc 3 API calls 21578->21580 21581 412c53 21579->21581 21582 412bfc 21580->21582 21583 4034e4 7 API calls 21581->21583 21585 412c04 DeleteFileW 21582->21585 21584 412c5b 21583->21584 21586 403b98 SysFreeString 21584->21586 21585->21569 21587 412c68 21586->21587 21589 403b80 SysFreeString 21587->21589 21588 4034e4 7 API calls 21588->21591 21590 412c70 21589->21590 21590->21491 21591->21569 21591->21578 21591->21588 21592 403e1c 3 API calls 21591->21592 21592->21591 21643 415618 21642->21643 21643->21643 21644 4040f4 SysAllocStringLen 21643->21644 21645 41562d 21644->21645 21646 4062d8 3 API calls 21645->21646 21647 41564e 21646->21647 21648 4047a8 12 API calls 21647->21648 21649 415663 21648->21649 21650 403bbc 3 API calls 21649->21650 21651 415684 21650->21651 21652 403bbc 3 API calls 21651->21652 21653 4156a5 21652->21653 21654 403bbc 3 API calls 21653->21654 21655 4156c6 21654->21655 21656 403bbc 3 API calls 21655->21656 21657 4156e7 21656->21657 21658 403bbc 3 API calls 21657->21658 21659 415708 21658->21659 21660 403bbc 3 API calls 21659->21660 21661 415729 21660->21661 21662 403db8 3 API calls 21661->21662 21674 41573d 21662->21674 21663 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 21663->21674 21664 4076b0 2 API calls 21664->21674 21665 41587b 21666 407500 8 API calls 21665->21666 21667 4158c6 21666->21667 21668 415a02 21667->21668 21669 4076b0 2 API calls 21667->21669 21670 4047a8 12 API calls 21668->21670 21672 4158df 21669->21672 21673 415a1e 21670->21673 21671 403d10 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 21671->21674 21672->21668 21822 40770c 21672->21822 21678 403bbc 3 API calls 21673->21678 21674->21663 21674->21664 21674->21665 21674->21671 21797 40ddb0 21674->21797 21680 415a3f 21678->21680 21679 403e1c 3 API calls 21681 415913 21679->21681 21682 403bbc 3 API calls 21680->21682 21683 40ddb0 16 API calls 21681->21683 21684 415a60 21682->21684 21685 415932 21683->21685 21688 403bbc 3 API calls 21684->21688 21686 40770c 6 API calls 21685->21686 21687 415948 21686->21687 21689 403e1c 3 API calls 21687->21689 21690 415a81 21688->21690 21691 415963 21689->21691 21692 403bbc 3 API calls 21690->21692 21693 403db8 3 API calls 21691->21693 21694 415aa2 21692->21694 21695 41598e 21693->21695 21698 403bbc 3 API calls 21694->21698 21696 40ddb0 16 API calls 21695->21696 21697 41599a 21696->21697 21699 40770c 6 API calls 21697->21699 21740 415ac3 21698->21740 21700 4159b0 21699->21700 21701 403e1c 3 API calls 21700->21701 21702 4159cb 21701->21702 21708 403db8 3 API calls 21702->21708 21703 415cad 21704 403b80 SysFreeString 21703->21704 21705 415cc5 21704->21705 21707 4034e4 7 API calls 21705->21707 21706 403db8 3 API calls 21706->21740 21709 415cd0 21707->21709 21710 4159f6 21708->21710 21712 403b98 SysFreeString 21709->21712 21713 40ddb0 16 API calls 21710->21713 21711 407500 8 API calls 21711->21740 21714 415ce0 21712->21714 21713->21668 21715 4034e4 7 API calls 21714->21715 21716 415ceb 21715->21716 21717 403b98 SysFreeString 21716->21717 21718 415cfb 21717->21718 21719 4034e4 7 API calls 21718->21719 21720 415d06 21719->21720 21721 403b98 SysFreeString 21720->21721 21722 415d16 21721->21722 21723 4034e4 7 API calls 21722->21723 21724 415d21 21723->21724 21726 403b98 SysFreeString 21724->21726 21725 4076b0 SysFreeString SysAllocStringLen 21725->21740 21727 415d31 21726->21727 21729 4034e4 7 API calls 21727->21729 21728 403e1c SysAllocStringLen SysAllocStringLen SysFreeString 21728->21740 21730 415d3c 21729->21730 21731 403b98 SysFreeString 21730->21731 21732 415d4c 21731->21732 21733 4034e4 7 API calls 21732->21733 21735 415d57 21733->21735 21734 40ddb0 16 API calls 21734->21740 21736 403b98 SysFreeString 21735->21736 21737 415d67 21736->21737 21738 4034e4 7 API calls 21737->21738 21739 415d72 21738->21739 21741 403b98 SysFreeString 21739->21741 21740->21703 21740->21706 21740->21711 21740->21725 21740->21728 21740->21734 21798 4040f4 SysAllocStringLen 21797->21798 21799 40ddc9 21798->21799 21800 40de7f 21799->21800 21801 407168 9 API calls 21799->21801 21802 403b98 SysFreeString 21800->21802 21805 40de0b 21801->21805 21803 40de99 21802->21803 21804 403508 7 API calls 21803->21804 21807 40dea6 21804->21807 21806 40de59 21805->21806 21809 4062d8 3 API calls 21805->21809 21808 40dce8 8 API calls 21806->21808 21810 403b80 SysFreeString 21807->21810 21811 40de64 21808->21811 21815 40de26 21809->21815 21812 40deae 21810->21812 21813 4062d8 3 API calls 21811->21813 21812->21674 21814 40de71 21813->21814 21816 40de79 DeleteFileW 21814->21816 21817 40de37 CopyFileW 21815->21817 21816->21800 21817->21806 21818 40de41 21817->21818 21819 4062d8 3 API calls 21818->21819 21820 40de4e 21819->21820 21821 407168 9 API calls 21820->21821 21821->21806 21823 4040f4 SysAllocStringLen 21822->21823 21824 40771f 21823->21824 21825 403b80 SysFreeString 21824->21825 21828 407734 21825->21828 21826 40776d 21827 403b80 SysFreeString 21826->21827 21829 407789 21827->21829 21828->21826 21830 403ee8 4 API calls 21828->21830 21829->21679 21830->21826 21975 405050 21974->21975 21976 403538 7 API calls 21975->21976 21981 405068 21976->21981 21977 4050a5 21978 4034e4 7 API calls 21977->21978 21979 4050ba 21978->21979 21979->18712 21980 4039e8 7 API calls 21980->21981 21981->21977 21981->21980 21983 4040f4 SysAllocStringLen 21982->21983 21984 4070d4 21983->21984 21985 4040f4 SysAllocStringLen 21984->21985 21986 4070dc 21985->21986 21987 4040f4 SysAllocStringLen 21986->21987 21994 4070e4 21987->21994 21988 407131 21989 403bbc 3 API calls 21988->21989 21990 40713c 21989->21990 21991 403b98 SysFreeString 21990->21991 21992 407156 21991->21992 21992->18743 21993 403f34 3 API calls 21993->21994 21994->21988 21994->21993 21996 403fc4 21994->21996 21998 403fdc 21996->21998 21997 404057 21997->21994 21998->21997 21999 403b58 2 API calls 21998->21999 22000 404007 21999->22000 22001 403b70 SysFreeString 22000->22001 22001->21997 22003 41781a 22002->22003 22004 4047a8 12 API calls 22003->22004 22007 417837 22003->22007 22004->22007 22005 4047b4 9 API calls 22006 4178a2 GetHGlobalFromStream GlobalLock 22005->22006 22006->18778 22007->22005 22008->18797 22009->18800 22011 416faf 22010->22011 22011->18835 22013 403538 7 API calls 22012->22013 22014 407a75 22013->22014 22015 407a93 22014->22015 22016 407a84 22014->22016 22018 40357c 7 API calls 22015->22018 22017 40357c 7 API calls 22016->22017 22019 407a91 22017->22019 22018->22019 22213 407a34 GetPEB 22019->22213 22021 407aa5 22022 406fdc 4 API calls 22021->22022 22023 407acd 22022->22023 22024 406fdc 4 API calls 22023->22024 22025 407adf 22024->22025 22026 403e1c 3 API calls 22025->22026 22028 407aef 22026->22028 22027 407b0b 22030 403b98 SysFreeString 22027->22030 22028->22027 22029 403798 7 API calls 22028->22029 22029->22027 22031 407b25 22030->22031 22032 4034e4 7 API calls 22031->22032 22033 407b2d 22032->22033 22033->18840 22035 403bbc 3 API calls 22034->22035 22036 4066cf 22035->22036 22214 406654 GetModuleHandleA GetProcAddress 22036->22214 22039 4066e4 22039->18844 22040 403bbc 3 API calls 22040->22039 22045 416ff1 22041->22045 22042 41705d 22043 403508 7 API calls 22042->22043 22044 41707a 22043->22044 22044->18867 22045->22042 22047 403850 7 API calls 22045->22047 22217 406318 22045->22217 22047->22045 22049 4171a0 22048->22049 22049->22049 22050 406fdc 4 API calls 22049->22050 22051 4171d2 22050->22051 22213->22021 22215 406676 GetCurrentProcess 22214->22215 22216 40667f 22214->22216 22215->22216 22216->22039 22216->22040 22218 40632c 22217->22218 22219 403538 7 API calls 22218->22219 22221 406344 22219->22221 22220 406381 22222 4034e4 7 API calls 22220->22222 22221->22220 22223 4039e8 7 API calls 22221->22223 22224 406396 22222->22224 22223->22221 22224->22045 22251 404215 22250->22251 22252 40421c 22250->22252 22251->18940 22253 402614 7 API calls 22252->22253 22254 404223 22253->22254 22254->18940 22257 4041ea 22255->22257 22256 404224 9 API calls 22256->22257 22257->22256 22258 404203 22257->22258 22258->18949 22260 4033c9 22259->22260 22262 403372 GetStdHandle WriteFile GetStdHandle WriteFile 22259->22262 22263 4033d2 MessageBoxA 22260->22263 22264 4033e5 22260->22264 22262->18303 22263->22264 22264->18303 22265 417b1a 22266 417b29 20 API calls 22265->22266 22267 417c2d 22265->22267 22266->22267 22268 401f5c 22269 401f70 22268->22269 22270 401f79 22268->22270 22286 401870 RtlInitializeCriticalSection 22269->22286 22273 401fa2 RtlEnterCriticalSection 22270->22273 22274 401fac 22270->22274 22275 401f81 22270->22275 22273->22274 22274->22275 22280 401e68 22274->22280 22278 4020d7 22279 4020cd RtlLeaveCriticalSection 22279->22278 22283 401e78 22280->22283 22281 401ea4 22285 401ec8 22281->22285 22298 401c7c 22281->22298 22283->22281 22283->22285 22293 401ddc 22283->22293 22285->22278 22285->22279 22287 401894 RtlEnterCriticalSection 22286->22287 22288 40189e 22286->22288 22287->22288 22289 4018bc LocalAlloc 22288->22289 22290 4018d6 22289->22290 22291 401925 22290->22291 22292 40191b RtlLeaveCriticalSection 22290->22292 22291->22270 22291->22275 22292->22291 22302 401630 22293->22302 22297 401df9 22297->22283 22299 401cd1 22298->22299 22300 401c9a 22298->22300 22299->22300 22371 401bcc 22299->22371 22300->22285 22306 40164c 22302->22306 22303 401656 22327 40151c 22303->22327 22306->22303 22307 4016b3 22306->22307 22309 4016a7 22306->22309 22319 401388 22306->22319 22331 401284 22306->22331 22307->22297 22312 401d50 22307->22312 22335 401464 22309->22335 22310 401662 22310->22307 22345 401d04 22312->22345 22315 401284 LocalAlloc 22316 401d74 22315->22316 22317 401d7c 22316->22317 22349 401aa8 22316->22349 22317->22297 22320 401397 VirtualAlloc 22319->22320 22322 4013c4 22320->22322 22323 4013e7 22320->22323 22339 40123c 22322->22339 22323->22306 22326 4013d4 VirtualFree 22326->22323 22328 401562 22327->22328 22329 40157e VirtualAlloc 22328->22329 22330 401592 22328->22330 22329->22328 22329->22330 22330->22310 22332 4012a0 22331->22332 22333 40123c LocalAlloc 22332->22333 22334 4012e6 22333->22334 22334->22306 22336 401493 22335->22336 22337 4014ec 22336->22337 22338 4014c0 VirtualFree 22336->22338 22337->22307 22338->22336 22342 4011e4 22339->22342 22343 4011f0 LocalAlloc 22342->22343 22344 401202 22342->22344 22343->22344 22344->22323 22344->22326 22346 401d0d 22345->22346 22348 401d16 22345->22348 22346->22348 22354 401ad8 22346->22354 22348->22315 22350 401ab6 22349->22350 22352 401ac5 22349->22352 22351 401c7c 9 API calls 22350->22351 22353 401ac3 22351->22353 22352->22317 22353->22317 22357 4020ec 22354->22357 22356 401af9 22356->22348 22358 40210a 22357->22358 22359 402105 22357->22359 22361 40213b RtlEnterCriticalSection 22358->22361 22363 402145 22358->22363 22365 40210e 22358->22365 22360 401870 4 API calls 22359->22360 22360->22358 22361->22363 22362 402151 22366 402273 RtlLeaveCriticalSection 22362->22366 22367 40227d 22362->22367 22363->22362 22364 4021d4 22363->22364 22369 402200 22363->22369 22364->22365 22368 401d04 7 API calls 22364->22368 22365->22356 22366->22367 22367->22356 22368->22365 22369->22362 22370 401c7c 7 API calls 22369->22370 22370->22362 22373 401be2 22371->22373 22372 401c6a 22372->22300 22373->22372 22374 401c21 22373->22374 22375 401c0d 22373->22375 22377 4017e4 3 API calls 22374->22377 22384 4017e4 22375->22384 22378 401c1f 22377->22378 22378->22372 22379 401aa8 9 API calls 22378->22379 22380 401c45 22379->22380 22381 401c5f 22380->22381 22394 401afc 22380->22394 22399 4012f4 22381->22399 22385 40180a 22384->22385 22393 401863 22384->22393 22403 4015b0 22385->22403 22388 401284 LocalAlloc 22389 401827 22388->22389 22390 40183e 22389->22390 22391 401464 VirtualFree 22389->22391 22392 4012f4 LocalAlloc 22390->22392 22390->22393 22391->22390 22392->22393 22393->22378 22395 401b01 22394->22395 22397 401b0f 22394->22397 22396 401ad8 9 API calls 22395->22396 22398 401b0e 22396->22398 22397->22381 22398->22381 22400 4012ff 22399->22400 22401 40131a 22400->22401 22402 40123c LocalAlloc 22400->22402 22401->22372 22402->22401 22406 4015e7 22403->22406 22404 401627 22404->22388 22405 401601 VirtualFree 22405->22406 22406->22404 22406->22405 22407 40370c 22416 403640 22407->22416 22408 403662 22410 403695 22408->22410 22423 403604 WideCharToMultiByte 22408->22423 22409 403659 22411 4034e4 7 API calls 22409->22411 22413 403ac0 7 API calls 22410->22413 22414 403660 22411->22414 22417 4036a2 22413->22417 22415 403680 22415->22410 22418 403686 22415->22418 22416->22408 22416->22409 22424 403604 WideCharToMultiByte 22417->22424 22420 4035d4 7 API calls 22418->22420 22420->22414 22421 4036b0 22422 403ac0 7 API calls 22421->22422 22422->22414 22423->22415 22424->22421 22425 40955e 22426 409583 22425->22426 22427 409569 LoadLibraryA GetProcAddress 22425->22427 22427->22426

                                            Control-flow Graph

                                            APIs
                                            • LoadLibraryA.KERNEL32(crtdll.dll,wcscmp), ref: 00417B33
                                            • GetProcAddress.KERNEL32(00000000,crtdll.dll), ref: 00417B39
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B4D
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B53
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B67
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B6D
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B81
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B87
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B9B
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BA1
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll), ref: 00417BB5
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BBB
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll), ref: 00417BCF
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BD5
                                            • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll), ref: 00417BE9
                                            • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BEF
                                            • LoadLibraryA.KERNEL32(ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll), ref: 00417C03
                                            • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 00417C09
                                            • LoadLibraryA.KERNEL32(ole32.dll,GetHGlobalFromStream,00000000,ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll), ref: 00417C1D
                                            • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 00417C23
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: CreateStreamOnHGlobal$GdipCreateBitmapFromHBITMAP$GdipDisposeImage$GdipGetImageEncoders$GdipGetImageEncodersSize$GdipSaveImageToStream$Gdiplus.dll$GdiplusShutdown$GdiplusStartup$GetHGlobalFromStream$crtdll.dll$ole32.dll$wcscmp
                                            • API String ID: 2574300362-2815069134
                                            • Opcode ID: e6ff4e77b6af1514c1edbe4635b7f249009bf5d1aab2232b2624014b7c9938ce
                                            • Instruction ID: 8590a6e993e3993f4c60c6cfae4e59332f73d92cf5cac50a27a19d2551d8218b
                                            • Opcode Fuzzy Hash: e6ff4e77b6af1514c1edbe4635b7f249009bf5d1aab2232b2624014b7c9938ce
                                            • Instruction Fuzzy Hash: 3911D0F17C430069DA0177B2DD8BAE635B4BBC1B4A730447B7104722D2E97C888196DD
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 58214342b4f3c8a20619e49f8e08e79c98509e7b8ce26f5489de1e6ad425744d
                                            • Instruction ID: 82fb6e080fc5b909ee9ff94d6b2e2f71dc3c30d6621c9439b15b03eb027989ab
                                            • Opcode Fuzzy Hash: 58214342b4f3c8a20619e49f8e08e79c98509e7b8ce26f5489de1e6ad425744d
                                            • Instruction Fuzzy Hash: 10E086712042025BD310EB58DC81A9A76D89B84315F00483EBC45D73D2EE3DDE589756

                                            Control-flow Graph

                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00419155), ref: 0040562D
                                            • GetProcAddress.KERNEL32(00000000,ExpandEnvironmentStringsW), ref: 0040563C
                                            • GetProcAddress.KERNEL32(00000000,GetComputerNameW), ref: 0040564E
                                            • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatus), ref: 00405660
                                            • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00405672
                                            • GetProcAddress.KERNEL32(00000000,GetFileSize), ref: 00405684
                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00405696
                                            • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 004056A8
                                            • GetProcAddress.KERNEL32(00000000,GetFileAttributesW), ref: 004056BA
                                            • GetProcAddress.KERNEL32(00000000,CreateMutexA), ref: 004056CC
                                            • GetProcAddress.KERNEL32(00000000,ReleaseMutex), ref: 004056DE
                                            • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 004056F0
                                            • GetProcAddress.KERNEL32(00000000,GetCurrentDirectoryW), ref: 00405702
                                            • GetProcAddress.KERNEL32(00000000,SetEnvironmentVariableW), ref: 00405714
                                            • GetProcAddress.KERNEL32(00000000,GetEnvironmentVariableW), ref: 00405726
                                            • GetProcAddress.KERNEL32(00000000,SetCurrentDirectoryW), ref: 00405738
                                            • GetProcAddress.KERNEL32(00000000,FindFirstFileW), ref: 0040574A
                                            • GetProcAddress.KERNEL32(00000000,FindNextFileW), ref: 0040575C
                                            • GetProcAddress.KERNEL32(00000000,LocalFree), ref: 0040576E
                                            • GetProcAddress.KERNEL32(00000000,GetTickCount), ref: 00405780
                                            • GetProcAddress.KERNEL32(00000000,CopyFileW), ref: 00405792
                                            • GetProcAddress.KERNEL32(00000000,FindClose), ref: 004057A4
                                            • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 004057B6
                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 004057C8
                                            • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 004057DA
                                            • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 004057EC
                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameW), ref: 004057FE
                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00405810
                                            • GetProcAddress.KERNEL32(00000000,GetLocaleInfoA), ref: 00405822
                                            • GetProcAddress.KERNEL32(00000000,GetLocalTime), ref: 00405834
                                            • GetProcAddress.KERNEL32(00000000,GetTimeZoneInformation), ref: 00405846
                                            • GetProcAddress.KERNEL32(00000000,RemoveDirectoryW), ref: 00405858
                                            • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040586A
                                            • GetProcAddress.KERNEL32(00000000,GetLogicalDriveStringsA), ref: 0040587C
                                            • GetProcAddress.KERNEL32(00000000,GetDriveTypeA), ref: 0040588E
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessW), ref: 004058A0
                                            • LoadLibraryA.KERNEL32(advapi32.dll,00000000,CreateProcessW,00000000,GetDriveTypeA,00000000,GetLogicalDriveStringsA,00000000,DeleteFileW,00000000,RemoveDirectoryW,00000000,GetTimeZoneInformation,00000000,GetLocalTime,00000000), ref: 004058AF
                                            • GetProcAddress.KERNEL32(00000000,GetUserNameW), ref: 004058BE
                                            • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 004058D0
                                            • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 004058E2
                                            • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 004058F4
                                            • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 00405906
                                            • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 00405918
                                            • GetProcAddress.KERNEL32(00000000,LookupAccountSidA), ref: 0040592A
                                            • GetProcAddress.KERNEL32(00000000,CreateProcessAsUserW), ref: 0040593C
                                            • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 0040594E
                                            • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 00405960
                                            • GetProcAddress.KERNEL32(00000000,RegEnumKeyW), ref: 00405972
                                            • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 00405984
                                            • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 00405996
                                            • GetProcAddress.KERNEL32(00000000,CryptCreateHash), ref: 004059A8
                                            • GetProcAddress.KERNEL32(00000000,CryptHashData), ref: 004059BA
                                            • GetProcAddress.KERNEL32(00000000,CryptGetHashParam), ref: 004059CC
                                            • GetProcAddress.KERNEL32(00000000,CryptDestroyHash), ref: 004059DE
                                            • GetProcAddress.KERNEL32(00000000,CryptReleaseContext), ref: 004059F0
                                            • LoadLibraryA.KERNEL32(user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData,00000000,CryptCreateHash,00000000,CryptAcquireContextA,00000000,RegEnumValueW,00000000), ref: 004059FF
                                            • GetProcAddress.KERNEL32(75BD0000,EnumDisplayDevicesW), ref: 00405A14
                                            • GetProcAddress.KERNEL32(75BD0000,wvsprintfA), ref: 00405A29
                                            • GetProcAddress.KERNEL32(75BD0000,GetKeyboardLayoutList), ref: 00405A3E
                                            • LoadLibraryA.KERNEL32(shell32.dll,75BD0000,GetKeyboardLayoutList,75BD0000,wvsprintfA,75BD0000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData), ref: 00405A4D
                                            • GetProcAddress.KERNEL32(75DA0000,ShellExecuteExW), ref: 00405A62
                                            • LoadLibraryA.KERNEL32(ntdll.dll,75DA0000,ShellExecuteExW,shell32.dll,75BD0000,GetKeyboardLayoutList,75BD0000,wvsprintfA,75BD0000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000), ref: 00405A71
                                            • GetProcAddress.KERNEL32(76E90000,RtlComputeCrc32), ref: 00405A86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: AllocateAndInitializeSid$CheckTokenMembership$CloseHandle$CopyFileW$CreateFileW$CreateMutexA$CreateProcessAsUserW$CreateProcessW$CreateToolhelp32Snapshot$CryptAcquireContextA$CryptCreateHash$CryptDestroyHash$CryptGetHashParam$CryptHashData$CryptReleaseContext$DeleteFileW$EnumDisplayDevicesW$ExpandEnvironmentStringsW$FindClose$FindFirstFileW$FindNextFileW$GetComputerNameW$GetCurrentDirectoryW$GetDriveTypeA$GetEnvironmentVariableW$GetFileAttributesW$GetFileSize$GetKeyboardLayoutList$GetLastError$GetLocalTime$GetLocaleInfoA$GetLogicalDriveStringsA$GetModuleFileNameW$GetTickCount$GetTimeZoneInformation$GetUserNameW$GlobalMemoryStatus$GlobalMemoryStatusEx$LocalFree$LookupAccountSidA$Process32FirstW$Process32NextW$ReadFile$RegCloseKey$RegCreateKeyExW$RegEnumKeyW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExW$ReleaseMutex$RemoveDirectoryW$RtlComputeCrc32$SetCurrentDirectoryW$SetDllDirectoryW$SetEnvironmentVariableW$ShellExecuteExW$advapi32.dll$kernel32.dll$ntdll.dll$shell32.dll$user32.dll$wvsprintfA
                                            • API String ID: 2238633743-617434850
                                            • Opcode ID: ed6a8e92284a318c94f0322e28525f172068a9e89f8e16d42c814494dd58fb50
                                            • Instruction ID: cfd24dbd3a5623e96a1366eeff91a6eabf16f5ed4c2f56b33555d19b2fe062a0
                                            • Opcode Fuzzy Hash: ed6a8e92284a318c94f0322e28525f172068a9e89f8e16d42c814494dd58fb50
                                            • Instruction Fuzzy Hash: AEC174B1A80710ABDB01EFA5DC8AA6A37A8FB45705360953BB544FF2D1D678DC018F9C

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 4 419108-41910b 5 419110-419115 4->5 5->5 6 419117-4191a8 call 403980 call 4034e4 call 40357c call 40561c call 407d24 call 406c4c call 403798 call 403990 CreateMutexA 5->6 24 419f30-41a139 call 4034e4 call 403b98 call 4034e4 call 403b98 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 403508 call 404224 call 403508 call 4034e4 * 2 call 403508 * 2 call 4034e4 6->24 25 4191ae-4191bb call 4034e4 6->25 31 4191c0-4191c3 25->31 33 4191c5-4191e2 call 4036cc call 403798 31->33 34 4191e4-419237 call 418f9c call 406c4c call 406810 call 4037dc call 4176d8 call 418688 31->34 33->31 33->34 61 41923c-419259 call 4176d8 call 403790 34->61 61->24 71 41925f-41926c call 4038dc 61->71 71->24 78 419272-419321 call 407428 call 406984 call 407428 call 406ae4 call 40795c call 407428 call 406984 call 4080c4 call 408328 call 40dc44 call 4045ec 71->78 124 419327-419328 78->124 125 419909-419c2e call 417290 call 403850 call 40dce8 call 406c4c call 406810 call 407a4c call 406810 call 406bb4 call 40377c call 406810 call 4066c0 call 40377c call 406810 call 406610 call 40377c call 406810 call 4065cc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 * 2 call 407d24 call 406810 call 403850 call 403798 call 4063a4 call 40653c call 40dee4 call 403850 78->125 126 41932a-419338 call 403790 124->126 401 419c30-419c54 call 403850 call 403798 125->401 402 419c59-419ca1 call 4176d8 call 418688 call 4050c8 call 403790 125->402 135 419901-419903 126->135 136 41933e-419340 126->136 135->125 135->126 139 419492-41949b 136->139 140 419346-419350 136->140 146 4194a1-4194d0 call 40795c call 40357c call 403a78 139->146 147 419825-41982e 139->147 143 419372-41937c 140->143 144 419352-41936d call 40d7f0 call 4053d8 call 40dce8 140->144 152 4193b1-4193bb 143->152 153 41937e-4193ac call 414028 call 408120 call 405528 call 40dce8 143->153 144->143 206 419742-419820 call 403d2c * 2 call 407048 call 4038dc * 2 call 403850 call 403d2c * 2 call 4037dc call 403d2c call 414408 146->206 207 4194d6-419503 call 407428 146->207 149 419830-419846 call 403850 147->149 150 41984b-419854 147->150 149->150 150->135 160 41985a-41987d call 40795c call 4038dc 150->160 161 4193c2-4193cc 152->161 162 4193bd call 414098 152->162 153->152 211 4198f1-4198fc call 40dce8 160->211 212 41987f-4198ef call 418688 call 407428 * 2 call 403850 call 40dce8 160->212 171 4193ec-4193f6 161->171 172 4193ce-4193e0 call 415ea8 161->172 162->161 181 419402-41940c 171->181 182 4193f8-4193fd call 414cb8 171->182 172->171 202 4193e2-4193e7 call 4050c8 172->202 185 41942f-419439 181->185 186 41940e-41942a call 414408 181->186 182->181 197 419445-41944f 185->197 198 41943b-419440 call 414f40 185->198 186->185 209 419451-41947d GetSystemMetrics * 2 call 4178b4 call 40dce8 197->209 210 419482-41948c 197->210 198->197 202->171 206->147 207->24 241 419509-41950f 207->241 209->210 210->139 222 41948e 210->222 211->135 212->135 222->139 247 419734-419737 241->247 251 419514-41954a call 406fdc call 40377c call 403a78 247->251 252 41973d 247->252 289 419731 251->289 290 419550-41972c call 403c98 call 403850 call 403d2c * 2 call 4070bc call 40377c call 4034e4 call 403850 call 403d2c call 4070bc call 403d58 call 40377c call 403d2c call 40781c call 40377c call 403d2c * 2 call 407048 call 4038dc * 2 call 4037dc call 403d2c * 2 call 4037dc call 403d2c call 414408 251->290 252->147 289->247 290->289 401->402 415 419db1-419dd1 call 4087dc call 407d24 call 4038dc 402->415 416 419ca7-419cc4 call 40795c call 4045ec 402->416 429 419dd3-419de0 call 4038dc 415->429 430 419dec-419df9 call 4038dc 415->430 416->415 425 419cca-419ccb 416->425 428 419ccd-419d03 call 4047a8 call 40795c call 4045ec 425->428 447 419da9-419dab 428->447 448 419d09-419d18 call 4038dc 428->448 429->430 439 419de2-419de7 call 407dd4 429->439 430->24 440 419dff-419e03 430->440 439->24 440->24 443 419e09-419f2b call 4028e0 call 4062d8 call 403d3c call 4062d8 call 402754 call 403d2c call 40770c call 403e1c call 403d3c call 402754 call 403d2c call 407798 call 403d3c ExitProcess 440->443 447->415 447->428 448->447 455 419d1e-419d42 call 40795c call 4045ec 448->455 465 419d85-419d89 455->465 466 419d44-419d45 455->466 465->447 467 419d8b-419da4 call 4038dc call 418cf4 465->467 469 419d4c-419d7d call 406318 call 403a78 466->469 467->447 469->465 481 419d7f-419d83 469->481 481->465 481->469
                                            APIs
                                            • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00419195
                                              • Part of subcall function 00408328: CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                                              • Part of subcall function 00408328: CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                                            • GetSystemMetrics.USER32(00000001), ref: 00419460
                                            • GetSystemMetrics.USER32(00000000), ref: 00419468
                                            • ExitProcess.KERNEL32(00000000), ref: 00419F2B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Create$DirectoryMetricsSystem$ExitMutexProcess
                                            • String ID: "countryCode":"$"query":"$%DSK_$%appdata%\Telegram Desktop\tdata\$%comspec%$/c %WINDIR%\system32\timeout.exe 3 & del "$0_@$<$</c>$</d>$</n>$<c>$<d>$<n>$Coins$D877F783D5*,map*$Files\$GET$PasswordsList.txt$Skype$Steam$System.txt$Telegram$exit$http://ip-api.com/json$image/jpeg$ip.txt$scr.jpg
                                            • API String ID: 447519224-805684967
                                            • Opcode ID: 393cdfa5e90172c38ce23b04994494a061c28785eddfdfed88361b285a484fb5
                                            • Instruction ID: 8e865d1d98f6c8efaf34d3e531d58462b667ba857a61b59ff422c1b99a10b1ba
                                            • Opcode Fuzzy Hash: 393cdfa5e90172c38ce23b04994494a061c28785eddfdfed88361b285a484fb5
                                            • Instruction Fuzzy Hash: 4F920E34A0011D9FDB11EB55C885BCDB7B9AF49308F5081BBE408B7292DB38AF958F59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 494 418688-41868c 495 418691-418696 494->495 495->495 496 418698-4186d8 call 403980 * 3 495->496 503 4186e7-41871d call 4034e4 call 40357c * 2 call 4039e8 GetModuleHandleA 496->503 504 4186da-4186e2 call 40357c 496->504 514 41872f-418731 503->514 515 41871f-41872d call 4039e8 LoadLibraryA 503->515 504->503 517 418733-41874d call 4039e8 * 2 LoadLibraryA 514->517 518 41874f-418934 call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 404f00 * 7 call 403790 call 403990 InternetCrackUrlA call 4036dc call 403790 call 4039f0 call 403a78 514->518 515->514 517->518 568 418977-4189ce InternetOpenA InternetConnectA 518->568 569 418936-418974 call 4036dc call 4037dc call 417f6c call 403990 518->569 577 4189d4-4189fb call 4036dc call 403a78 568->577 578 418ad6-418ae3 568->578 569->568 588 418a04-418a2b call 403990 HttpOpenRequestA 577->588 589 4189fd 577->589 590 418ae5-418b23 call 4036dc * 2 call 418124 578->590 591 418b28-418b7f call 403538 call 4034e4 call 403508 * 4 578->591 599 418a31-418a35 588->599 600 418ad0-418ad4 InternetCloseHandle 588->600 589->588 590->591 603 418a55-418a77 call 403790 call 403990 HttpSendRequestA 599->603 604 418a37-418a51 call 403790 call 403990 599->604 600->578 603->600 620 418a79-418ac8 call 404f00 call 4035d4 call 403798 603->620 604->603 620->600 632 418aca-418ace 620->632 632->600 632->620
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418714
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418728
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418748
                                            • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 0041875C
                                            • GetProcAddress.KERNEL32(00000000,-0000001A), ref: 00418771
                                            • GetProcAddress.KERNEL32(00000000,-0000002B), ref: 00418786
                                            • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 0041879B
                                            • GetProcAddress.KERNEL32(00000000,-00000053), ref: 004187B0
                                            • GetProcAddress.KERNEL32(00000000,-00000064), ref: 004187C5
                                            • GetProcAddress.KERNEL32(00000000,-00000075), ref: 004187DA
                                            • GetProcAddress.KERNEL32(00000000,-00000089), ref: 004187F0
                                            • GetProcAddress.KERNEL32(00000000,-0000009B), ref: 00418807
                                            • InternetCrackUrlA.WININET(00000000,00000000,90000000,?,00000000,-0000009B,00000000,-00000089,00000000,-00000075,00000000,-00000064,00000000,-00000053,00000000,-0000003C), ref: 004188F3
                                            • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1),00000000,00000000,00000000,00000000,?,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C), ref: 00418984
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000), ref: 004189C4
                                            • HttpOpenRequestA.WININET(00000000,00000000,?,00000000,00000000,00000000,84003300,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000), ref: 00418A21
                                            • HttpSendRequestA.WININET(00000000,00418CB8,00000000,00000000,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418A72
                                            • InternetCloseHandle.WININET(00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418AD4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Internet$HandleHttpLibraryLoadOpenRequest$CloseConnectCrackModuleSend
                                            • String ID: .bit$Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$POST$inglesxyz.shop$wininet.dll
                                            • API String ID: 3386017226-1979561820
                                            • Opcode ID: 3985519fff23fc4608e233669805ad7cdc689a9b9ac4a7c1542b5e4b96a76217
                                            • Instruction ID: 8c20cc009bbb13acc87624f3a171753233ac08310759435a2e91fadf7e7a38d5
                                            • Opcode Fuzzy Hash: 3985519fff23fc4608e233669805ad7cdc689a9b9ac4a7c1542b5e4b96a76217
                                            • Instruction Fuzzy Hash: 33E1EBB1910218ABDB10EFA5CC86BDEBBBCBF44305F10417AF504B7681DB78AA458B58

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 40955e-409567 634 409583 633->634 635 409569-40957e LoadLibraryA GetProcAddress 633->635 635->634
                                            APIs
                                            • LoadLibraryA.KERNEL32(crypt32.dll,CryptUnprotectData), ref: 00409573
                                            • GetProcAddress.KERNEL32(00000000,crypt32.dll), ref: 00409579
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: CryptUnprotectData$crypt32.dll
                                            • API String ID: 2574300362-1827663648
                                            • Opcode ID: 0420e119ad5bb52e5c2197864a8ef738be67dd0fb3c4c8377fbeb38080e5296e
                                            • Instruction ID: 1936ed15528034ef1a8706b88be01f12f22861c51f7a066308f0a1848fab801f
                                            • Opcode Fuzzy Hash: 0420e119ad5bb52e5c2197864a8ef738be67dd0fb3c4c8377fbeb38080e5296e
                                            • Instruction Fuzzy Hash: 89C04CF368030376CF466B779D4A5462294B7C1B1D760493BF511B11D2D6BC8D404F5D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 636 407c58-407ca2 638 407ca4-407cf0 LookupAccountSidA CheckTokenMembership 636->638 639 407d1d-407d23 636->639 640 407cf2-407cf7 638->640 641 407cf9-407cfc 638->641 642 407cff-407d15 FreeSid 640->642 641->642
                                            APIs
                                            • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00407D16), ref: 00407CD9
                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,?), ref: 00407CEC
                                            • FreeSid.ADVAPI32(00000000,00407D1D), ref: 00407D10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AccountCheckFreeLookupMembershipToken
                                            • String ID:
                                            • API String ID: 1602037265-0
                                            • Opcode ID: 2fd40f1cd6d938c6e5d16d2cd6dc980c4c8d1b789cf8552ef7046a50898a570f
                                            • Instruction ID: 099d520652cb879bdf47a43f009fc20e3076d83f6f5b891ba4a5cda1263a2b72
                                            • Opcode Fuzzy Hash: 2fd40f1cd6d938c6e5d16d2cd6dc980c4c8d1b789cf8552ef7046a50898a570f
                                            • Instruction Fuzzy Hash: 7821A475A04209AFDB41CFA8DC51FEEB7F8EB48700F104466EA14E7290E775AA01DBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 644 4040f4-4040f8 645 404112 644->645 646 4040fa-40410a SysAllocStringLen 644->646 647 403b50 646->647 648 404110 646->648 647->644 648->645
                                            APIs
                                            • SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                                            Strings
                                            • SOFTWARE\Microsoft\Cryptography, xrefs: 00404101
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocString
                                            • String ID: SOFTWARE\Microsoft\Cryptography
                                            • API String ID: 2525500382-1514646153
                                            • Opcode ID: 6827334effe1af4081dab58951797ab719276b71555c5be752b1280ab307ebe8
                                            • Instruction ID: 809722c095ea45080b132ee1ecccaea0ad8e4e48b5b2181e80121cad3d0a43f6
                                            • Opcode Fuzzy Hash: 6827334effe1af4081dab58951797ab719276b71555c5be752b1280ab307ebe8
                                            • Instruction Fuzzy Hash: E6D012F42001025AD7489F198555A37776E5BD1700368C6BEA101BF2D5DB39E841EB34

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 649 407b78-407bc6 651 407bf4-407c06 649->651 652 407bc8-407bf1 649->652 653 407c08-407c1d CheckTokenMembership 651->653 654 407c2f-407c45 FreeSid 651->654 652->651 657 407c25-407c2c 653->657 658 407c1f-407c23 653->658 657->654 658->654
                                            APIs
                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000000,00407C46), ref: 00407C19
                                            • FreeSid.ADVAPI32(00000000,00407C4D), ref: 00407C40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CheckFreeMembershipToken
                                            • String ID:
                                            • API String ID: 3914140973-0
                                            • Opcode ID: 02d2a01e1651f1c233edb1ebec011e8a64dd2af6dca5e3f4e19433a4a010ba8d
                                            • Instruction ID: aed4e80559fb2a14190837efd407bda22eaf0f983d9af5a1b784dce0b7ff3491
                                            • Opcode Fuzzy Hash: 02d2a01e1651f1c233edb1ebec011e8a64dd2af6dca5e3f4e19433a4a010ba8d
                                            • Instruction Fuzzy Hash: 60214F75A48388BEE701DBA8CC41FAE77FCEB09704F4084B6E610E3291D775AA098759

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 659 407b77-407bc6 661 407bf4-407c06 659->661 662 407bc8-407bf1 659->662 663 407c08-407c1d CheckTokenMembership 661->663 664 407c2f-407c45 FreeSid 661->664 662->661 667 407c25-407c2c 663->667 668 407c1f-407c23 663->668 667->664 668->664
                                            APIs
                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000000,00407C46), ref: 00407C19
                                            • FreeSid.ADVAPI32(00000000,00407C4D), ref: 00407C40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CheckFreeMembershipToken
                                            • String ID:
                                            • API String ID: 3914140973-0
                                            • Opcode ID: 85f5b30b1e39150e1c8e346ace12111ea4b56de602e113dca3c1568075f88dab
                                            • Instruction ID: f84fb7a27dacd8e4143a25a8c882f6f2bfcd0e0861e01e35ab8e7fc80b6cb224
                                            • Opcode Fuzzy Hash: 85f5b30b1e39150e1c8e346ace12111ea4b56de602e113dca3c1568075f88dab
                                            • Instruction Fuzzy Hash: 0A216075A48248BEE701CBA8CC81FAE77F8EB0D704F5084B6F610E36D1D775AA058B59

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                                            • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020019,?), ref: 00407582
                                            • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,000000FE), ref: 004075A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocOpenQueryStringValue
                                            • String ID:
                                            • API String ID: 4139485348-0
                                            • Opcode ID: 3ed5b2ee1dba194cc6dbe336fcadb55ada54ae4c4b70a41d90ff88955bf18e37
                                            • Instruction ID: a534eb6d79e9af16e12b264bd48d331209bfd9d9316274433d90d6d6e5d4440a
                                            • Opcode Fuzzy Hash: 3ed5b2ee1dba194cc6dbe336fcadb55ada54ae4c4b70a41d90ff88955bf18e37
                                            • Instruction Fuzzy Hash: 1921C771A04109AFD700EB99CD81EEEBBFCEB48304F504576B904E7691D774AE448A65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 690 4033f4-40340b 691 403423-40342a 690->691 692 40340d-403410 690->692 694 40342c-403438 call 4032dc call 403368 691->694 695 40343d-403441 691->695 692->691 693 403412-403421 692->693 693->691 694->695 696 403443-403446 695->696 697 40344d-403456 call 4031dc 695->697 696->697 699 403448-40344a 696->699 705 403458-40345b 697->705 706 40345d-403462 697->706 699->697 705->706 708 40347e-403487 call 4031b4 705->708 706->708 709 403464-403472 call 404890 706->709 715 403489 708->715 716 40348c-403490 708->716 709->708 714 403474-403476 709->714 714->708 719 403478-403479 FreeLibrary 714->719 715->716 717 403492 call 403338 716->717 718 403497-40349a 716->718 717->718 721 4034b3 718->721 722 40349c-4034a3 718->722 719->708 723 4034a5 722->723 724 4034ab-4034ae ExitProcess 722->724 723->724
                                            APIs
                                            • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                                            • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitFreeLibraryProcess
                                            • String ID:
                                            • API String ID: 1404682716-0
                                            • Opcode ID: 8728ad655b3e503d2fdb3a62f9eb409c209a4d433934cda3c6acf7bd146207aa
                                            • Instruction ID: 759013028fc8479fd2dc72d2fd20690e0ff356ad8f398ebd0a8dd26c183a4070
                                            • Opcode Fuzzy Hash: 8728ad655b3e503d2fdb3a62f9eb409c209a4d433934cda3c6acf7bd146207aa
                                            • Instruction Fuzzy Hash: 532162709002408BDB229F6584847577FD9AB49356F2585BBE844AF2C6D77CCEC0C7AD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 725 4033ec-40340b 727 403423-40342a 725->727 728 40340d-403410 725->728 730 40342c-403438 call 4032dc call 403368 727->730 731 40343d-403441 727->731 728->727 729 403412-403421 728->729 729->727 730->731 732 403443-403446 731->732 733 40344d-403456 call 4031dc 731->733 732->733 735 403448-40344a 732->735 741 403458-40345b 733->741 742 40345d-403462 733->742 735->733 741->742 744 40347e-403487 call 4031b4 741->744 742->744 745 403464-403472 call 404890 742->745 751 403489 744->751 752 40348c-403490 744->752 745->744 750 403474-403476 745->750 750->744 755 403478-403479 FreeLibrary 750->755 751->752 753 403492 call 403338 752->753 754 403497-40349a 752->754 753->754 757 4034b3 754->757 758 40349c-4034a3 754->758 755->744 759 4034a5 758->759 760 4034ab-4034ae ExitProcess 758->760 759->760
                                            APIs
                                            • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                                            • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitFreeLibraryProcess
                                            • String ID:
                                            • API String ID: 1404682716-0
                                            • Opcode ID: 12e1264d31eb56f2234adc36a07824a312904d80612c0ba461cf097056190f6f
                                            • Instruction ID: 6a24a9e445b26bd493014d0ae565dbad687ffc3c4e0e672e3f19fd4d116e45a8
                                            • Opcode Fuzzy Hash: 12e1264d31eb56f2234adc36a07824a312904d80612c0ba461cf097056190f6f
                                            • Instruction Fuzzy Hash: 082132709002408FDB229F6584847567FE9AF49316F1585BBE844AE2D6D77CCEC0C799

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 761 4033f0-40340b 762 403423-40342a 761->762 763 40340d-403410 761->763 765 40342c-403438 call 4032dc call 403368 762->765 766 40343d-403441 762->766 763->762 764 403412-403421 763->764 764->762 765->766 767 403443-403446 766->767 768 40344d-403456 call 4031dc 766->768 767->768 770 403448-40344a 767->770 776 403458-40345b 768->776 777 40345d-403462 768->777 770->768 776->777 779 40347e-403487 call 4031b4 776->779 777->779 780 403464-403472 call 404890 777->780 786 403489 779->786 787 40348c-403490 779->787 780->779 785 403474-403476 780->785 785->779 790 403478-403479 FreeLibrary 785->790 786->787 788 403492 call 403338 787->788 789 403497-40349a 787->789 788->789 792 4034b3 789->792 793 40349c-4034a3 789->793 790->779 794 4034a5 793->794 795 4034ab-4034ae ExitProcess 793->795 794->795
                                            APIs
                                            • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                                            • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitFreeLibraryProcess
                                            • String ID:
                                            • API String ID: 1404682716-0
                                            • Opcode ID: 48b7e33afc810a21c896a39620d19b1e342ee901d510fcbf56cb23baece62cc7
                                            • Instruction ID: 27f7e017d1627fb368da8b77f9887733e34b03074980a547fb73b729214f25e1
                                            • Opcode Fuzzy Hash: 48b7e33afc810a21c896a39620d19b1e342ee901d510fcbf56cb23baece62cc7
                                            • Instruction Fuzzy Hash: A42141709002408BDB229F6584847577FE9AF49316F2585BBE844AE2C6D77CCEC0CB9D

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                                            • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020119,?), ref: 00406E08
                                            • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406E2F
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String$AllocFreeOpenQueryValue
                                            • String ID:
                                            • API String ID: 967375698-0
                                            • Opcode ID: 42e8ac0eb481dbdee281ab6c948f954a5f7be2f1dbc7aad8dbdbf02e747b1a52
                                            • Instruction ID: d76901b39ac324b957afaa178e8467113ca23e905bfc9c7565385042a447591e
                                            • Opcode Fuzzy Hash: 42e8ac0eb481dbdee281ab6c948f954a5f7be2f1dbc7aad8dbdbf02e747b1a52
                                            • Instruction Fuzzy Hash: 4E110A71600209AFD700EB99C991ADEBBFCEB48304F504176B504E3291D774AF048AA5

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                                            • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020119,?), ref: 00406E08
                                            • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406E2F
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String$AllocFreeOpenQueryValue
                                            • String ID:
                                            • API String ID: 967375698-0
                                            • Opcode ID: 2211f0de82845023bd4461a93eb36700242ae8860f2016ef3c98de18d7d5de81
                                            • Instruction ID: 82cb5f20ed390e82a860d028ca805bd23af48b7bdc57f11f8f6bbfe72b4b229b
                                            • Opcode Fuzzy Hash: 2211f0de82845023bd4461a93eb36700242ae8860f2016ef3c98de18d7d5de81
                                            • Instruction Fuzzy Hash: 0211EC75600209AFD701EB99CD81EDEBBFCEB48704F504576B504F3291DB74AF448AA5
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013B7
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013DE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Virtual$AllocFree
                                            • String ID:
                                            • API String ID: 2087232378-0
                                            • Opcode ID: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                                            • Instruction ID: a459bd48843060549903651ed84add4fd647ab7a4347e8b1aec55fdbd67c2c02
                                            • Opcode Fuzzy Hash: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                                            • Instruction Fuzzy Hash: 72F0E972B0032017EB2055690CC1F5265C58B46760F14417BBE08FF7D9C6758C008299
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 1ebdfbd59a0e52ef2ea023c9a08e44020ac5f15f939b277ac4f00344f859253b
                                            • Instruction ID: cd992ebe0347ba42bda0945abe6e894bfe88d76707d831bffa21c0f3d5584e5e
                                            • Opcode Fuzzy Hash: 1ebdfbd59a0e52ef2ea023c9a08e44020ac5f15f939b277ac4f00344f859253b
                                            • Instruction Fuzzy Hash: 29E04FB12082425FD312EB98D880AA677E59F89300F05487AA885C72E1EE35DE649B57
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: c1aec3d96d918917163645e1cef9db84c357628eb7c3e8a5af25ed4d30638381
                                            • Instruction ID: 47af1fdf1995f1dddaec203f3ca82799803cb6e69f4b63bfcad29cffb6660ea3
                                            • Opcode Fuzzy Hash: c1aec3d96d918917163645e1cef9db84c357628eb7c3e8a5af25ed4d30638381
                                            • Instruction Fuzzy Hash: D9E08CB12042025BE310EA98D880AA6B2D89F88300F01483AB889C73D0FE39DE648A57
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,00000000,00000001,00000000,00000000,00000001,004036B0,00000000), ref: 0040361A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 626452242-0
                                            • Opcode ID: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                                            • Instruction ID: 7e1ccd6cea493bd3454663dff710d39ec61ca1bdc7a044e150527f2c3e7482f1
                                            • Opcode Fuzzy Hash: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                                            • Instruction Fuzzy Hash: 1EC002B22802087FE5149A9ADC46FA7769C9758B50F108029B7089E1D1D5A5B85046BC
                                            APIs
                                            • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 004014C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeVirtual
                                            • String ID:
                                            • API String ID: 1263568516-0
                                            • Opcode ID: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                                            • Instruction ID: bdb72b2e4f8392e9a4367bae485781504843fed35f2e07c9585e1bdde9d69fdb
                                            • Opcode Fuzzy Hash: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                                            • Instruction Fuzzy Hash: 2621F770608710AFC710DF19C8C0A5BBBE5EF85760F14C96AE4989B3A5D378EC41CB9A
                                            APIs
                                            • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,00401817), ref: 0040160A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeVirtual
                                            • String ID:
                                            • API String ID: 1263568516-0
                                            • Opcode ID: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                                            • Instruction ID: 104411973d7795ae4b76250d277c099600c8cf09cd5a8da0f47b470ca133b76a
                                            • Opcode Fuzzy Hash: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                                            • Instruction Fuzzy Hash: 82012B726443105FC3109F28DDC0E6A77E5DBC5324F19493EDA85AB391D33B6C0187A8
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?,0041A69E), ref: 004145C5
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeString$FileFindFirst
                                            • String ID: .LNK$._.$0_@$LLA$CA
                                            • API String ID: 1653790112-882170572
                                            • Opcode ID: eabfcec7a1b34a96f3a487c33c476ef2dae85da7546450ac9a0750b76edb40a6
                                            • Instruction ID: 9c4ae2fa8e47753b2fad7318643bbdaa039e98a1c6b9804601cb0bccf78cece1
                                            • Opcode Fuzzy Hash: eabfcec7a1b34a96f3a487c33c476ef2dae85da7546450ac9a0750b76edb40a6
                                            • Instruction Fuzzy Hash: 6A224374A0011E9BCB10EF55C985ADEB7B9EF84308F1081B7E504B7296DB38AF858F59
                                            APIs
                                            • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeString$InfoSystem
                                            • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                                            • API String ID: 4070941872-1038824218
                                            • Opcode ID: 994227d9c169a1dbbd8c134888da1df913b25c71fc93550dee7adeb46b23c78b
                                            • Instruction ID: ec5783c0b7ca42e81122729fbed3a1ddf4b85dfc6774dd9c704540b43fb157b1
                                            • Opcode Fuzzy Hash: 994227d9c169a1dbbd8c134888da1df913b25c71fc93550dee7adeb46b23c78b
                                            • Instruction Fuzzy Hash: 64411270A1010D9BDB01FFD1D882ADDBBB9EF48309F51403BF504B7296D639EA458B59
                                            APIs
                                              • Part of subcall function 00402A94: GetKeyboardType.USER32(00000000), ref: 00402A99
                                              • Part of subcall function 00402A94: GetKeyboardType.USER32(00000001), ref: 00402AA5
                                            • GetCommandLineA.KERNEL32 ref: 00404C7B
                                            • GetVersion.KERNEL32 ref: 00404C8F
                                            • GetVersion.KERNEL32 ref: 00404CA0
                                            • GetCurrentThreadId.KERNEL32 ref: 00404CDC
                                              • Part of subcall function 00402AC4: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                                              • Part of subcall function 00402AC4: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                                              • Part of subcall function 00402AC4: RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                                            • GetThreadLocale.KERNEL32 ref: 00404CBC
                                              • Part of subcall function 00404B4C: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404BB2), ref: 00404B72
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
                                            • String ID: `%`
                                            • API String ID: 3734044017-316121997
                                            • Opcode ID: f73d26185257f265a94a8c873c422c92913b77d5a1c3acb43c070b40e0b1affb
                                            • Instruction ID: 5abcdb9b335a34f550fa88bee7db3b3d0fbbcc1143cdfce7353ba034968c2f47
                                            • Opcode Fuzzy Hash: f73d26185257f265a94a8c873c422c92913b77d5a1c3acb43c070b40e0b1affb
                                            • Instruction Fuzzy Hash: C30112B0895341D9E714BFF29C863893E60AB89348F11C53FD2506A2F2D77D44449BAE
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00412FE0,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,0041335C,00000000,00000000), ref: 00412E08
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID: .txt$\*.*$\History
                                            • API String ID: 1974802433-2232271174
                                            • Opcode ID: 60f1aed37e2e99f440532b90469936e73ba5a5dec6828e4ede608866b0779c33
                                            • Instruction ID: 31102d54a49b3a600332046a535115537665bbef1f46384b784085fa532e6d73
                                            • Opcode Fuzzy Hash: 60f1aed37e2e99f440532b90469936e73ba5a5dec6828e4ede608866b0779c33
                                            • Instruction Fuzzy Hash: 61516C70909259AFCB12EB61CC45BDDBB78EF45304F2041EBA508F7192DA789F898B19
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00412FE0,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,0041335C,00000000,00000000), ref: 00412E08
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID: .txt$\*.*$\History
                                            • API String ID: 1974802433-2232271174
                                            • Opcode ID: 9e1fdcc0da242b739753036d29313186668cc0af82581ab44d3f55cd16266d53
                                            • Instruction ID: 28420ec06a4cf3b7f255eec712baa8d4c4073a44f08a77f37e2c3042b4162f15
                                            • Opcode Fuzzy Hash: 9e1fdcc0da242b739753036d29313186668cc0af82581ab44d3f55cd16266d53
                                            • Instruction Fuzzy Hash: 7C515D74904219ABDF10EF51CD45BCDBBB9EF48304F6041FAA508B2291DA789F958F18
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00413276,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,00413E3A,00000000,00000000), ref: 004130A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID: .txt$\*.*$\places.sqlite
                                            • API String ID: 1974802433-3919338718
                                            • Opcode ID: 57caf48ab4afc0b1baef0746783f85f9fbf3cd85722ed1048bbcffe4d93a662f
                                            • Instruction ID: 8aac54383f65123cc0eb0a4bac2364391818e056087fcce0e0ee32974804bc60
                                            • Opcode Fuzzy Hash: 57caf48ab4afc0b1baef0746783f85f9fbf3cd85722ed1048bbcffe4d93a662f
                                            • Instruction Fuzzy Hash: CB513A74904119ABDF10EF61CC45BCDBBB9EF44305F6081FAA508B3291DA39AF858F18
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,004118A0,00000000,00000000,00412524), ref: 0041122F
                                              • Part of subcall function 00410E70: GetTickCount.KERNEL32 ref: 00410EB4
                                              • Part of subcall function 00410E70: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                                            • FindNextFileW.KERNEL32(?,?,?,0041156C,?,0041156C,0041A69E,00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000,00000000), ref: 00411495
                                            • FindClose.KERNEL32(?,?,?,?,0041156C,?,0041156C,0041A69E,00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000), ref: 004114A6
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$CloseCopyCountFirstFreeNextStringTick
                                            • String ID: .txt$\*.*
                                            • API String ID: 4269597168-2615687548
                                            • Opcode ID: 5eb2d59efa555ee89ed57af41da6cad216739ef9bb024f3ea898b5bc55f5b5a7
                                            • Instruction ID: 6859e3562032d776fa84e591ecfbf3afacee5e694faebf3c1d1cda20f45b7b98
                                            • Opcode Fuzzy Hash: 5eb2d59efa555ee89ed57af41da6cad216739ef9bb024f3ea898b5bc55f5b5a7
                                            • Instruction Fuzzy Hash: 6C810C7490021DABDF10EB51CC85BCDB77AEF84304F6041E6A608B62A2DB799F858F58
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,0041237E,00000000,00000000,00000000), ref: 004115FB
                                            • FindNextFileW.KERNEL32(?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000), ref: 00411768
                                            • FindClose.KERNEL32(?,?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000), ref: 00411779
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstFreeNextString
                                            • String ID: .txt$\*.*
                                            • API String ID: 2008072091-2615687548
                                            • Opcode ID: 0f6dccddeca5cc831589218911d3f92bb29d96b4250bcad063a90af0a6f30303
                                            • Instruction ID: cb1fa36ef6bd00d28df09069f3f2ad3b15c2d413a197645ac6dab8893c9dac73
                                            • Opcode Fuzzy Hash: 0f6dccddeca5cc831589218911d3f92bb29d96b4250bcad063a90af0a6f30303
                                            • Instruction Fuzzy Hash: 1D514C7490411DABDF10EB61CC45BDDB779EF45304F2085FAA608B22A2DA389F858F18
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,0041237E,00000000,00000000,00000000), ref: 004115FB
                                            • FindNextFileW.KERNEL32(?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000), ref: 00411768
                                            • FindClose.KERNEL32(?,?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000), ref: 00411779
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstFreeNextString
                                            • String ID: .txt$\*.*
                                            • API String ID: 2008072091-2615687548
                                            • Opcode ID: f5d4968fc86502ddbcb5c74ae6393bdac5bb8f60082bed19b5c2a5cb9a6abe43
                                            • Instruction ID: 05cc79d86d1b55c995a7b8d44de261c7f11cdb27113bd27bc9f6ce20252d4423
                                            • Opcode Fuzzy Hash: f5d4968fc86502ddbcb5c74ae6393bdac5bb8f60082bed19b5c2a5cb9a6abe43
                                            • Instruction Fuzzy Hash: C3514C7490411DABDF50EB61CC45BCDB779EF44304F6085FAA608B32A2DA399F858F58
                                            APIs
                                            • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 004094E5
                                            • LocalFree.KERNEL32(?), ref: 0040950A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CryptDataFreeLocalUnprotect
                                            • String ID:
                                            • API String ID: 1561624719-0
                                            • Opcode ID: 7af865200370c71dc1aeec28a3f245545c66ce1c623f0b7719112b5aa0c6dde3
                                            • Instruction ID: 8d19d854ff734d332b2dbdc515c77238868d08609e2067f50d6fa790567ddd23
                                            • Opcode Fuzzy Hash: 7af865200370c71dc1aeec28a3f245545c66ce1c623f0b7719112b5aa0c6dde3
                                            • Instruction Fuzzy Hash: 85F0B4B17043007BD7009E5ACC81B4BB7D8AB84710F10893EB558DB2D2D774D8054B5A
                                            APIs
                                            • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404BB2), ref: 00404B72
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID:
                                            • API String ID: 2299586839-0
                                            • Opcode ID: b9dbded4df740f95a366ffb3c725a865bd77cd50a76c54eebdafbaeb84b8c7b9
                                            • Instruction ID: e83552b6022aae669f2d5c27f359814ee46eaea323ddb5c136f95371eef2deca
                                            • Opcode Fuzzy Hash: b9dbded4df740f95a366ffb3c725a865bd77cd50a76c54eebdafbaeb84b8c7b9
                                            • Instruction Fuzzy Hash: 0FF0A470A04209AFEB15DE91CC41A9EF7BAF7C4714F40847AA610762C1E7B86A048698
                                            APIs
                                            • CoCreateInstance.OLE32(0041B0DC,00000000,00000005,0040A4CC,00000000,?,00000000,0040A52D,0041A69E), ref: 0040A4BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateInstance
                                            • String ID:
                                            • API String ID: 542301482-0
                                            • Opcode ID: 7b7d34e0f70cbabb5746a0b5785e83bae371d3c5d3f6c4cc1dc965a66d09d6f2
                                            • Instruction ID: ecfa08d63a5e99a02bf1f10941cb6c6ba3816feefb3116676bc77a3be9f2b9a2
                                            • Opcode Fuzzy Hash: 7b7d34e0f70cbabb5746a0b5785e83bae371d3c5d3f6c4cc1dc965a66d09d6f2
                                            • Instruction Fuzzy Hash: E5C002953917243AE551B2AA2CCAF5B418C4B88B59F214177B618F61D2A5E85C2001AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2a2d129c8543363c052d008b34330d58e57021dec0e7df0c1a6226ed5b22a4b
                                            • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                            • Opcode Fuzzy Hash: c2a2d129c8543363c052d008b34330d58e57021dec0e7df0c1a6226ed5b22a4b
                                            • Instruction Fuzzy Hash:
                                            APIs
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$CreateDirectory$LibraryLoad
                                            • String ID: %TEMP%\$%appdata%\$PATH
                                            • API String ID: 1305945209-1089150275
                                            • Opcode ID: 1a33a2769e6321904e3cdb265ad9754a853bf74ca40744ee91329e9d7d30e973
                                            • Instruction ID: 107c2c44d9e3562d342af0426f92bc8293728700e54ee15747b3200e896e575f
                                            • Opcode Fuzzy Hash: 1a33a2769e6321904e3cdb265ad9754a853bf74ca40744ee91329e9d7d30e973
                                            • Instruction Fuzzy Hash: 08C12A709002059BDB01EBA9DD86BCE77B8EF49308F20457BB454BB2D6CB78AD05CB59
                                            APIs
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$CreateDirectory$LibraryLoad
                                            • String ID: %TEMP%\$%appdata%\$PATH
                                            • API String ID: 1305945209-1089150275
                                            • Opcode ID: 79934f1c985d954dbaeb093b53ec4003d150750486ead7d04ba29fc2d927e3f7
                                            • Instruction ID: 2d8dd4a76802c8c05b7f9f6fb250e21a54e9375513618aa46567d80ce5eb0686
                                            • Opcode Fuzzy Hash: 79934f1c985d954dbaeb093b53ec4003d150750486ead7d04ba29fc2d927e3f7
                                            • Instruction Fuzzy Hash: A7C12A70A002059BDB01EBA9DD86BCE77B8EF45308F20453BB454BB3D5CB78AD058B59
                                            APIs
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$CreateDirectory$LibraryLoad
                                            • String ID: %TEMP%\$%appdata%\$PATH
                                            • API String ID: 1305945209-1089150275
                                            • Opcode ID: 3e01a980fe06b71006a212d9f424134b77ef2a0a464c1b07fa2ce8f8b0dee680
                                            • Instruction ID: f743aedec7dbf6b98949553c7d40f8bccc431f9c9a4af862cbdb08e619508236
                                            • Opcode Fuzzy Hash: 3e01a980fe06b71006a212d9f424134b77ef2a0a464c1b07fa2ce8f8b0dee680
                                            • Instruction Fuzzy Hash: A0C11A70A002059BDB01EBA9DD86BCE77B8EF48309F20453BB454BB3D5DB78AD058B59
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000000,00418535,?,00000000,00000000,?,00418B28,00000000,?,?,?,?,?,0041B0FC,0000044D), ref: 004181B0
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418535,?,00000000,00000000,?,00418B28,00000000,?,?,?,?,?,0041B0FC), ref: 004181C4
                                            • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 004181D8
                                            • GetProcAddress.KERNEL32(00000000,-00000017), ref: 004181EF
                                            • GetProcAddress.KERNEL32(00000000,-00000025), ref: 00418206
                                            • GetProcAddress.KERNEL32(00000000,-0000002C), ref: 0041821D
                                            • GetProcAddress.KERNEL32(00000000,-00000031), ref: 00418234
                                            • GetProcAddress.KERNEL32(00000000,-00000036), ref: 0041824B
                                            • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 00418262
                                            • GetProcAddress.KERNEL32(00000000,-00000044), ref: 00418279
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$HandleLibraryLoadModule
                                            • String ID: $$ HTTP/1.0$Connection: close$Content-Length: $Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$User-agent: $wsock32.dll
                                            • API String ID: 384173800-3355491746
                                            • Opcode ID: 447bc90b094ad6630a41df1a26737c259296e5cff920802da588b0ecfe34b4d8
                                            • Instruction ID: acd65350bdfe250b2cabb462dd412f1b2f53023e341749034ab9d15be0839763
                                            • Opcode Fuzzy Hash: 447bc90b094ad6630a41df1a26737c259296e5cff920802da588b0ecfe34b4d8
                                            • Instruction Fuzzy Hash: 85B1DFB1940219AFDB11EF65CC86BDF7BB8EF44306F50407BF504B2291DB789A458E58
                                            APIs
                                            • GetSystemMetrics.USER32(00000000), ref: 004173D7
                                            • GetSystemMetrics.USER32(00000001), ref: 004173EE
                                              • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                            • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                                            • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                                            • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                                            • API String ID: 75899496-943277980
                                            • Opcode ID: 4be26f394024ad5c91b88013eb9f7e22f1757fe5255d0d7559962d2f1b93f894
                                            • Instruction ID: faa4580c3751e67dc94fa71ed2fe839e62200f283c7ef28ebc39c5cb7ba49714
                                            • Opcode Fuzzy Hash: 4be26f394024ad5c91b88013eb9f7e22f1757fe5255d0d7559962d2f1b93f894
                                            • Instruction Fuzzy Hash: 94814F70A44209AFCB01FFA1CC42BCDBF7AAF49309F60407BB104B65D6D67D9A568B19
                                            APIs
                                            • GetSystemMetrics.USER32(00000000), ref: 004173D7
                                            • GetSystemMetrics.USER32(00000001), ref: 004173EE
                                              • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                            • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                                            • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                                            • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                                            • API String ID: 75899496-943277980
                                            • Opcode ID: c1c0bba0cf5750b68568b08facd4bf438261c5427543421f404452287209528a
                                            • Instruction ID: 915cc31ebaf767ee9912e0c916b5d60c1651ad94c460c6a34579714c0f7d2b16
                                            • Opcode Fuzzy Hash: c1c0bba0cf5750b68568b08facd4bf438261c5427543421f404452287209528a
                                            • Instruction Fuzzy Hash: 9A814E70A44209AFCB01FFA1CC42BCDBF7AAF49309F60407BB104B65D6D67D9A468B19
                                            APIs
                                            • GetSystemMetrics.USER32(00000000), ref: 004173D7
                                            • GetSystemMetrics.USER32(00000001), ref: 004173EE
                                              • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                            • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                              • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                              • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                                            • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                                              • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                                              • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                                            • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                                            • API String ID: 75899496-943277980
                                            • Opcode ID: dd72d902fec3c835ff41235e95e9197e7833cbbe4dd907cdafe0256d0d0e0796
                                            • Instruction ID: 9ad36b54795493928cf4d7680a901020c7452f2e53798e9be21810986d7bb062
                                            • Opcode Fuzzy Hash: dd72d902fec3c835ff41235e95e9197e7833cbbe4dd907cdafe0256d0d0e0796
                                            • Instruction Fuzzy Hash: A2714E30A44109ABCF01FFD1CC42FCDBBBAAF48309F60407BB104B65D6D67DAA468A19
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E00
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407E06
                                            • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E17
                                            • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407E1D
                                            • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E2E
                                            • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407E34
                                              • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402778
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc$FileModuleName
                                            • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                                            • API String ID: 2206896924-1825016774
                                            • Opcode ID: 7f96db7897a1f98cdf8b59428a73a971fc0080a3a05c1da7105613a8313ce1c2
                                            • Instruction ID: 099c1664e0e1cd81917be229cd1a82c6e96495822271a1ae00088806601eb9d9
                                            • Opcode Fuzzy Hash: 7f96db7897a1f98cdf8b59428a73a971fc0080a3a05c1da7105613a8313ce1c2
                                            • Instruction Fuzzy Hash: C2312BB1A443086EDB00EBB5CC42E9E7BBCAB48754F200576F504F72C1DA78AE058A68
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E00
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407E06
                                            • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E17
                                            • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407E1D
                                            • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E2E
                                            • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407E34
                                              • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402778
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc$FileModuleName
                                            • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                                            • API String ID: 2206896924-1825016774
                                            • Opcode ID: 27f1b7fea490fa65aef81c43b6e31d3605ad6563d7a28bf75364900d2bc4d32e
                                            • Instruction ID: f930562a739e9fb19de45fac1d58899ce59ec74f5e2b45b4c14d1fb7312bbdc9
                                            • Opcode Fuzzy Hash: 27f1b7fea490fa65aef81c43b6e31d3605ad6563d7a28bf75364900d2bc4d32e
                                            • Instruction Fuzzy Hash: 28312EB1E443096EDB00EBB5CC42E9E7BFCAB48754F200576F514F72C1DA78AE058A58
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc$CurrentProcess
                                            • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                                            • API String ID: 3877065590-4127804628
                                            • Opcode ID: f3f8819d2a06753c8c004d88ffab413edcc893332a2b89064e09e30df0b38323
                                            • Instruction ID: b4fa090e97bfe7a1d5ce5cc441e323bfe92997b970e5e29befa82c83258fdf6c
                                            • Opcode Fuzzy Hash: f3f8819d2a06753c8c004d88ffab413edcc893332a2b89064e09e30df0b38323
                                            • Instruction Fuzzy Hash: B4918574A001099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc$CurrentProcess
                                            • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                                            • API String ID: 3877065590-4127804628
                                            • Opcode ID: 875a9f34e7222272479a6dad8a5508aed50dcbee07cd349c5d72faaa483ea699
                                            • Instruction ID: f3c24ddc2a443a78fd4165323e7ca93df30f075cb4f00a4e444516d0c24f858d
                                            • Opcode Fuzzy Hash: 875a9f34e7222272479a6dad8a5508aed50dcbee07cd349c5d72faaa483ea699
                                            • Instruction Fuzzy Hash: FB917570A006099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                                            • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc$CurrentProcess
                                            • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                                            • API String ID: 3877065590-4127804628
                                            • Opcode ID: 0f8ae1aecedffc538cedfaaf6d2ef413c8cc501e5b20150028d7674d04a881bf
                                            • Instruction ID: fd76d8ed353255a1278cd755ee3df483ef4fe920b1e5afc451e9d1c12470fbd9
                                            • Opcode Fuzzy Hash: 0f8ae1aecedffc538cedfaaf6d2ef413c8cc501e5b20150028d7674d04a881bf
                                            • Instruction Fuzzy Hash: B2818570A006099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                                            • RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                                            • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                                            • RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                                              • Part of subcall function 00407500: RegQueryValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,000000FE), ref: 004075A9
                                              • Part of subcall function 00407500: RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020019,?), ref: 00407582
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Open$EnumFreeString$QueryValue
                                            • String ID: $()$)$RGlzcGxheU5hbWU=$RGlzcGxheVZlcnNpb24=$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxs$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxsXA==
                                            • API String ID: 811798878-3013244427
                                            • Opcode ID: de493516d1551eb8ed3128fa62d2f5255a1c7b72798445e0c46a5ea88ad76063
                                            • Instruction ID: 33798bc805095534a257e2f05040e6cfe59ff7211d39a9aa4329e2c1f04a858c
                                            • Opcode Fuzzy Hash: de493516d1551eb8ed3128fa62d2f5255a1c7b72798445e0c46a5ea88ad76063
                                            • Instruction Fuzzy Hash: 34C124B1A001189BD710EB55CC81BCEB7BDAF44309F5145FBA608B7286DA38AF858F5D
                                            APIs
                                            • 73A1A570.USER32(00000000,?,00000000,0041B0FC,00000000,?,00419475,00000000,00000001,?,image/jpeg,00000032,00000000,?,?,?), ref: 00417994
                                            • 73A24C40.GDI32(00000000,00000000,?,00000000,0041B0FC,00000000,?,00419475,00000000,00000001,?,image/jpeg,00000032,00000000,?,?), ref: 0041799D
                                            • 73A24C00.GDI32(00000000,0041A69E,?,00000000,00000000,?,00000000,0041B0FC,00000000,?,00419475,00000000,00000001,?,image/jpeg,00000032), ref: 004179AD
                                            • SelectObject.GDI32(00000000,00000000), ref: 004179B6
                                            • 73A24D40.GDI32(00000000,00000000,00000000,0041A69E,?,00000000,00000000,?,00CC0020,00000000,0041A69E,?,00000000,00000000,?,00000000), ref: 004179D6
                                            • CreateStreamOnHGlobal.COMBASE(00000000,000000FF,00000000), ref: 004179E8
                                            • GetHGlobalFromStream.COMBASE(?,?), ref: 00417A76
                                            • GlobalLock.KERNEL32(?), ref: 00417A80
                                            • GlobalUnlock.KERNEL32(?), ref: 00417AA2
                                            • DeleteObject.GDI32(00000000), ref: 00417AA8
                                            • DeleteDC.GDI32(00000000), ref: 00417AAE
                                            • 73A1A480.USER32(00000000,00000000), ref: 00417AB6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Global$DeleteObjectStream$A480A570CreateFromLockSelectUnlock
                                            • String ID:
                                            • API String ID: 2699471203-0
                                            • Opcode ID: c6339665ace03b91d436a6d8c1ab4105ac859371922734f0929d45322917c03e
                                            • Instruction ID: 9ea5443061d6a736e16c7905b4946b830ee6406ef7c7b01cecb07d86951751fb
                                            • Opcode Fuzzy Hash: c6339665ace03b91d436a6d8c1ab4105ac859371922734f0929d45322917c03e
                                            • Instruction Fuzzy Hash: 9B513CB1944208AFDB10EFA5DC85BEF7BF8AB48305F24402AF614E62D1D7789985CB58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 004129E8
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412CA8,?,.tmp,?,?,00000000,00412BE7,?,00000000,00412C71,?,00000000), ref: 00412A64
                                            • DeleteFileW.KERNEL32(00000000), ref: 00412C05
                                            Strings
                                            • SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000, xrefs: 00412ACE
                                            • , xrefs: 00412B98
                                            • %TEMP%, xrefs: 00412A23
                                            • .tmp, xrefs: 00412A03
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CopyCountDeleteTick
                                            • String ID: $%TEMP%$.tmp$SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000
                                            • API String ID: 2381671008-351388873
                                            • Opcode ID: ef1d475732b00c6658fc3908e371784fc5ab7c3495e9950f6ff69cc71723a14a
                                            • Instruction ID: 01415e14dcc46a11cfd4ad831b9185370b0be0c5393ee3a374a7f2b0250afb3b
                                            • Opcode Fuzzy Hash: ef1d475732b00c6658fc3908e371784fc5ab7c3495e9950f6ff69cc71723a14a
                                            • Instruction Fuzzy Hash: 05810C31A00109AFDB00EF95DD82ADEBBB9EF48315F204436F514F7292DB78AE558B58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 004125B0
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412870,?,.tmp,?,?,00000000,004127AF,?,00000000,00412839,?,00000000), ref: 0041262C
                                            • DeleteFileW.KERNEL32(00000000), ref: 004127CD
                                            Strings
                                            • .tmp, xrefs: 004125CB
                                            • SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000, xrefs: 00412696
                                            • %TEMP%, xrefs: 004125EB
                                            • , xrefs: 00412760
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CopyCountDeleteTick
                                            • String ID: $%TEMP%$.tmp$SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000
                                            • API String ID: 2381671008-462058183
                                            • Opcode ID: 416e3653b17ffb8b792b409557a66c85679e4b3f6acb14a3ced176a5403dbca9
                                            • Instruction ID: 880bf71673710542150f6ebe4433b3a02274b147136189202950d85bd83b2515
                                            • Opcode Fuzzy Hash: 416e3653b17ffb8b792b409557a66c85679e4b3f6acb14a3ced176a5403dbca9
                                            • Instruction Fuzzy Hash: A9810C71A00109AFDB00EF95DD82ADEBBB9EF48314F504536F410F72A2DB78AE558B58
                                            APIs
                                            • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeString$InfoSystem
                                            • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                                            • API String ID: 4070941872-1038824218
                                            • Opcode ID: ea7c467229dc03554361d8e6d8d9c9cd62cd80fa8131b6840d5b8a065aae733e
                                            • Instruction ID: 93658ecaa3e0ddcdd5b33a88495a7f5ee5c1cb8a97fdfd99440d65a07410f67b
                                            • Opcode Fuzzy Hash: ea7c467229dc03554361d8e6d8d9c9cd62cd80fa8131b6840d5b8a065aae733e
                                            • Instruction Fuzzy Hash: DF411F70A1010DABDB01FFD1D882ACDBBB9EF48309F61403BF504B7296D639EA458A58
                                            APIs
                                            • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                              • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeString$InfoSystem
                                            • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                                            • API String ID: 4070941872-1038824218
                                            • Opcode ID: c93147df2423285c54bad4dc95c4c660ec513e1a04b46fc35375619ea2add05a
                                            • Instruction ID: 0500c902736339f4efa0b07d3f9bc907855da1606bbc95f65d7857d0c3659172
                                            • Opcode Fuzzy Hash: c93147df2423285c54bad4dc95c4c660ec513e1a04b46fc35375619ea2add05a
                                            • Instruction Fuzzy Hash: 27410F70A1010DABDB01FFD1D882EDDBBB9EF48709F61403BF504B7296D639EA458A58
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000), ref: 004033A1
                                            • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E), ref: 004033A7
                                            • GetStdHandle.KERNEL32(000000F5,004033F0,00000002,0041A69E,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436), ref: 004033BC
                                            • WriteFile.KERNEL32(00000000,000000F5,004033F0,00000002,0041A69E,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436), ref: 004033C2
                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 004033E0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileHandleWrite$Message
                                            • String ID: Error$Runtime error at 00000000
                                            • API String ID: 1570097196-2970929446
                                            • Opcode ID: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                                            • Instruction ID: 272384808b0d926620c8a29f01af81f970e1c010559b5e4fcbf7d036ebb79ccd
                                            • Opcode Fuzzy Hash: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                                            • Instruction Fuzzy Hash: F5F09670AC03847AE620A7915DCAF9B2A5C8708F15F20867BB660744E5DBBC55C4525D
                                            APIs
                                            • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 0040269F
                                            • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026A9
                                            • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026C6
                                            • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026D0
                                            • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026F9
                                            • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402703
                                            • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402727
                                            • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402731
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CharNext
                                            • String ID:
                                            • API String ID: 3213498283-0
                                            • Opcode ID: b7f289542d20783a7460a3fa223e5cf14214bb8296ee11ce479d6e83d044995d
                                            • Instruction ID: 5b28f76bfa796ab2381ca360e83c3cb8d2614de50686c14b6561fe7fc9f0b368
                                            • Opcode Fuzzy Hash: b7f289542d20783a7460a3fa223e5cf14214bb8296ee11ce479d6e83d044995d
                                            • Instruction Fuzzy Hash: B021E7546043951ADB31297A0AC877B6B894A5B304B68087BD0C1BB3D7D4FE4C8B832D
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410EB4
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                                            • DeleteFileW.KERNEL32(00000000), ref: 004110EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CopyCountDeleteTick
                                            • String ID: $%TEMP%$.tmp
                                            • API String ID: 2381671008-2792595090
                                            • Opcode ID: 25513a2d6d90f056bd5cf02fe9c1dff5265798498166ca8350b0b3102dd1fa50
                                            • Instruction ID: ef1d9ef4a41f0d536355ae74e23377fcfc6b42a5aa152db35adc264ec6821d93
                                            • Opcode Fuzzy Hash: 25513a2d6d90f056bd5cf02fe9c1dff5265798498166ca8350b0b3102dd1fa50
                                            • Instruction Fuzzy Hash: 55910B31A40109AFDB00EB95DC82EDEBBB9EF48315F104436F514F72A2DB78AE458B58
                                            APIs
                                            • LoadLibraryA.KERNEL32(00000000,00000000,00000000,0040B3C3,?,00000000,0041B0FC,00000000,0000000B,00000000,00000000,?,0040B405,00000000,0040B40F), ref: 0040B1A9
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B1AF
                                            • LoadLibraryA.KERNEL32(00000000,?,00000000,0041B0FC,00000000,0000000B,00000000,00000000,?,0040B405,00000000,0040B40F,?,00000000,0041B0FC,00000000), ref: 0040B204
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B22A
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B248
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B266
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID:
                                            • API String ID: 2238633743-0
                                            • Opcode ID: 695678cf7ca45a9e7c8b3b2878ade717b4a60ccd5b1908c8415a47cf5bea5569
                                            • Instruction ID: 364380f0d352aef1bf1129e1f4ec87a81fdd7fa01391a9152c5138518fa9ee90
                                            • Opcode Fuzzy Hash: 695678cf7ca45a9e7c8b3b2878ade717b4a60ccd5b1908c8415a47cf5bea5569
                                            • Instruction Fuzzy Hash: 5761E375A002099BDB01EBE5C985E9EB7BDFF44304F50453AB900FB385DA78EE0587A8
                                            APIs
                                            • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,00401A0A), ref: 00401961
                                            • LocalFree.KERNEL32(00000000,00000000,00401A0A), ref: 00401973
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 00401992
                                            • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 004019D1
                                            • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 004019FA
                                            • RtlDeleteCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 00401A04
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                            • String ID:
                                            • API String ID: 3782394904-0
                                            • Opcode ID: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                                            • Instruction ID: f5b3729ab89c308c15893b8da70c4d7314be5901088e834fcff69d5c90a64892
                                            • Opcode Fuzzy Hash: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                                            • Instruction Fuzzy Hash: F11193B17843907ED715AB669CD1B927B969745708F50807BF100BA2F1C73DA840CF5D
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410BFD
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                                            • DeleteFileW.KERNEL32(00000000), ref: 00410DBE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CopyCountDeleteTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 2381671008-3650661790
                                            • Opcode ID: 4a067d1f8ba6d400319fcf7a723a146227050b837b1c7306f0a806063b549887
                                            • Instruction ID: 978216aeb9802c3a8092c63d781cd7ad87e87d7acf88f4e3b280f19958954086
                                            • Opcode Fuzzy Hash: 4a067d1f8ba6d400319fcf7a723a146227050b837b1c7306f0a806063b549887
                                            • Instruction Fuzzy Hash: 7C710C71A00109AFDB00EBD5DC42ADEBBB9EF48318F50447AF514F7292DA78AE458A58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410945
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410B9C,?,.tmp,?,?,00000000,00410AE8,?,00000000,00410B63,?,00000000), ref: 004109C1
                                            • DeleteFileW.KERNEL32(00000000), ref: 00410B06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CopyCountDeleteTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 2381671008-3650661790
                                            • Opcode ID: b6365babbb2d3b2e1b37703ec200a2ec6b79da26c3864396c2c11ec0f131d7bb
                                            • Instruction ID: 1e08b77d5c93ddd244bb37ca777f3c967e0d5c0e96542229b92685f54af29c93
                                            • Opcode Fuzzy Hash: b6365babbb2d3b2e1b37703ec200a2ec6b79da26c3864396c2c11ec0f131d7bb
                                            • Instruction Fuzzy Hash: DA710B71A04109AFDB00EF95DC41EDEBBB9EF48318F104476F514F72A2DA78AE458B58
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                                            • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                                            • RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                            • API String ID: 3677997916-4173385793
                                            • Opcode ID: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                                            • Instruction ID: 9172d05214030136d6eeabac91fa7c92d03713ed8c8260d1a9efe939ba63eb8f
                                            • Opcode Fuzzy Hash: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                                            • Instruction Fuzzy Hash: 04019275500308B9DB21AF908D46FAA7BB8D708700F600076BA04F66D0E7B8AA10979C
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,00000000,0041660E,?,0041B0FC,?), ref: 004165AB
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004165B1
                                              • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeLibraryLoadProcString
                                            • String ID: @$GlobalMemoryStatusEx$kernel32.dll
                                            • API String ID: 923276998-3878206809
                                            • Opcode ID: 85db832d693e486d1a61cee5b690b9a662077cbaa7453f9a7cd2e2dd296e1093
                                            • Instruction ID: ae4c68d41a3a4174a937c26ab83d8f0c6d254553f6270358502c1b43c0ddce29
                                            • Opcode Fuzzy Hash: 85db832d693e486d1a61cee5b690b9a662077cbaa7453f9a7cd2e2dd296e1093
                                            • Instruction Fuzzy Hash: A3018871A002086BD711EBA5DC42E8EB7BDEB88744F61413AF504B32D1E77CAD01855C
                                            APIs
                                            • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,?,?,004066D4,?,00417330,00000000,004175F4,?,Windows : ,?,,?,EXE_PATH : ,?), ref: 00406660
                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406666
                                            • GetCurrentProcess.KERNEL32(?,00000000,kernel32.dll,IsWow64Process,?,?,004066D4,?,00417330,00000000,004175F4,?,Windows : ,?,,?), ref: 00406677
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressCurrentHandleModuleProcProcess
                                            • String ID: IsWow64Process$kernel32.dll
                                            • API String ID: 4190356694-3024904723
                                            • Opcode ID: bb90ac27b46476fccc6d3856fb06f30bc2750b404d13dc0022771fe07b4660df
                                            • Instruction ID: ba80d2391f81007aa42feea1da534082dc1adbf3711fe3d895332dec38dcedd5
                                            • Opcode Fuzzy Hash: bb90ac27b46476fccc6d3856fb06f30bc2750b404d13dc0022771fe07b4660df
                                            • Instruction Fuzzy Hash: B0E06DB12143019EEB007EB58881A3B21C89B44305F130E3EA496F21C1E97EC8A0866D
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410EB4
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CopyCountFileTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 3448371392-3650661790
                                            • Opcode ID: dcbd54fc4c37fa41d1f3def047f476980ec269fdbcef2be5238ae35c760609eb
                                            • Instruction ID: 0e4f139da3bc19c2096e57fedbffea1b6a0c7ee0d64fc6893e7b5a554fe936bc
                                            • Opcode Fuzzy Hash: dcbd54fc4c37fa41d1f3def047f476980ec269fdbcef2be5238ae35c760609eb
                                            • Instruction Fuzzy Hash: D0411F31904249AEDB01EBA1D852ACDBF79EF49308F50447BF500B76A3D67CAE458A58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410EB4
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CopyCountFileTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 3448371392-3650661790
                                            • Opcode ID: b4051c86d89d16cbdd011401cb26392d540c890b59df4c5f9e00e45593a2b883
                                            • Instruction ID: 2c73a4ceecea9b7a55c8e1441bd033eb3759b1d2195d340dd4b2e4f4f6784083
                                            • Opcode Fuzzy Hash: b4051c86d89d16cbdd011401cb26392d540c890b59df4c5f9e00e45593a2b883
                                            • Instruction Fuzzy Hash: DF412131904149AFDB01FFA1D842ACDBBB9EF49318F50447BF500B36A2D67CAE458A58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410EB4
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CopyCountFileTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 3448371392-3650661790
                                            • Opcode ID: fd3ed2e0f10af06c7055efab6d8518f1a7d31fde7c18b0f8517e5c88414f77f6
                                            • Instruction ID: 3bd2312418c75e2bfd4f88111c3886d823680ea6e83d1d6075c9c2a9f0993f15
                                            • Opcode Fuzzy Hash: fd3ed2e0f10af06c7055efab6d8518f1a7d31fde7c18b0f8517e5c88414f77f6
                                            • Instruction Fuzzy Hash: 4241013190410DAEDB01FFA1D842ADDBBB9EF49318F50447BF500B36A2D77DAE458A58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410BFD
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CopyCountFileTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 3448371392-3650661790
                                            • Opcode ID: 3c9c793cbba2b1494e5bbcc8797dd77cc55da2a1b03f1701932884ea86e2c921
                                            • Instruction ID: ad1686550c7843c0884c0506788be05dc1fde737249d1bd281ecbc27d8194f8d
                                            • Opcode Fuzzy Hash: 3c9c793cbba2b1494e5bbcc8797dd77cc55da2a1b03f1701932884ea86e2c921
                                            • Instruction Fuzzy Hash: BF412330914109AEDB01FF91D952ADDBBBDEF49318F50447BF400B7292D77CAE458A58
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00410BFD
                                            • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CopyCountFileTick
                                            • String ID: %TEMP%$.tmp
                                            • API String ID: 3448371392-3650661790
                                            • Opcode ID: 7e65eb29c14a11400a8ae9f9535f570905a72362550addcf7d14f60cf147a02b
                                            • Instruction ID: ab4a798e1dfa23648b03a2b2561a2af29de01fabf162149de749457abe37d48b
                                            • Opcode Fuzzy Hash: 7e65eb29c14a11400a8ae9f9535f570905a72362550addcf7d14f60cf147a02b
                                            • Instruction Fuzzy Hash: 37411331910109AEDB01FF92D952ADDBBBDEF48318F50447BF400B3292D77DAE458A58
                                            APIs
                                              • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                                            • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,0040DEAF,?,00000000,00000000,00000000,00000000,00000000,00000000,?,004148F8,00000001,00414C4C), ref: 0040DE38
                                            • DeleteFileW.KERNEL32(00000000,00000000,0040DEAF,?,00000000,00000000,00000000,00000000,00000000,00000000,?,004148F8,00000001,00414C4C,00000001,?), ref: 0040DE7A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$AllocCopyDeleteString
                                            • String ID: %TEMP%\curbuf.dat$LLA
                                            • API String ID: 5292005-3909751444
                                            • Opcode ID: 03760eacd4bf6eafee70f4f711e65bc97b6305d2d94ef0ca2e56f12b63379ea2
                                            • Instruction ID: d3139e3bb668dcd489f787ebceafddff3eb8ed9e6fe86914fc70b8a9fa006da4
                                            • Opcode Fuzzy Hash: 03760eacd4bf6eafee70f4f711e65bc97b6305d2d94ef0ca2e56f12b63379ea2
                                            • Instruction Fuzzy Hash: 3E21FC74D10509ABDB00FBE5C88299EB7B9AF54305F50857BF400B72D2D738AE058A99
                                            APIs
                                            • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                                            • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: DnsQuery_A$dnsapi.dll
                                            • API String ID: 2574300362-3847274415
                                            • Opcode ID: 724cfed19cb1d21381234b51a37364b79d38ba7da5abfef29c6bd78e431c9a57
                                            • Instruction ID: ee02e28701cd333fe80aa916ff0e932040e536dc5bff3800914b034e455f76c5
                                            • Opcode Fuzzy Hash: 724cfed19cb1d21381234b51a37364b79d38ba7da5abfef29c6bd78e431c9a57
                                            • Instruction Fuzzy Hash: A9115E71A08304AED711DBA9CC52B9EBBB8DB45704F5140A7E504E72D2D6789E018B58
                                            APIs
                                            • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                                            • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: DnsQuery_A$dnsapi.dll
                                            • API String ID: 2574300362-3847274415
                                            • Opcode ID: 50f0b7069414203643d559ff8c1b4067f618f2f1807c4d8d96e87e961dc54617
                                            • Instruction ID: 3ed38bd560de987a20526e09c97c4f2d359d7c1ce2b9a36b0a47fbdadc566110
                                            • Opcode Fuzzy Hash: 50f0b7069414203643d559ff8c1b4067f618f2f1807c4d8d96e87e961dc54617
                                            • Instruction Fuzzy Hash: 48113D71A08304AEDB11DBA9CD52B9EBBB8DB44714F5140BBF904E73D1D6789E018B58
                                            APIs
                                            • LoadLibraryA.KERNEL32(user32.dll,EnumDisplayDevicesW,00000000,0041670D,?,-00000001,0041B0FC,?,?,00416863,Video Info,?,004169AC,?,GetRAM: ,?), ref: 00416678
                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0041667E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: EnumDisplayDevicesW$user32.dll
                                            • API String ID: 2574300362-1693391355
                                            • Opcode ID: be31b090cf9e22f53fe63a2b9ccc94bb75e49f076f039a93db071de62ba29d85
                                            • Instruction ID: bffb8a391e8cbf63d1c0eded9315efc20e69fe0ee1e689c0aa8ff6c2638661ea
                                            • Opcode Fuzzy Hash: be31b090cf9e22f53fe63a2b9ccc94bb75e49f076f039a93db071de62ba29d85
                                            • Instruction Fuzzy Hash: 7E118970500618AFDB61EF61CC45BDABBBCEF84709F1140FAE508A6291D6789E848E58
                                            APIs
                                            • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                                            • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: DnsQuery_A$dnsapi.dll
                                            • API String ID: 2574300362-3847274415
                                            • Opcode ID: a19d4597b475aaa9ac328eaf6b87c7589b0a3e1b2296b7586c6c4fb46158065e
                                            • Instruction ID: 92d1eb556667ed81b8552bf9075b82756b3340621e6324b7cba7be93811987cb
                                            • Opcode Fuzzy Hash: a19d4597b475aaa9ac328eaf6b87c7589b0a3e1b2296b7586c6c4fb46158065e
                                            • Instruction Fuzzy Hash: 20111CB1A04304AED751DBAACD42B9FBBF8EB48714F5140B6F904E73C1E678DE418A58
                                            APIs
                                            • RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                                            • RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                                            • RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                            • String ID:
                                            • API String ID: 730355536-0
                                            • Opcode ID: 099da0d79779097dabcbbe4e17eced4135313adf81f8614c79238fcf2f8b4282
                                            • Instruction ID: 5328ea8a61f1b3c3886908a4d7eb6976bfaff4b38786c7c23389d9dab3a387f7
                                            • Opcode Fuzzy Hash: 099da0d79779097dabcbbe4e17eced4135313adf81f8614c79238fcf2f8b4282
                                            • Instruction Fuzzy Hash: 06015BB0684390AEE719AB6A9C967957F92D749704F05C0BFE100BA6F1CB7D5480CB1E
                                            APIs
                                            • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,^), ref: 004024AF
                                            • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00402524), ref: 00402517
                                              • Part of subcall function 00401870: RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                                              • Part of subcall function 00401870: RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                                              • Part of subcall function 00401870: LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                                              • Part of subcall function 00401870: RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1701573868.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1701562368.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701589248.000000000041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1701600382.000000000041E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Oggq2dY6kx.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                            • String ID: ^
                                            • API String ID: 2227675388-551292248
                                            • Opcode ID: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                                            • Instruction ID: 4ed45a5183fb1a6edd108f9af425bfacc088641811e0c18f6da98f6ec62fa594
                                            • Opcode Fuzzy Hash: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                                            • Instruction Fuzzy Hash: 92113431700210AEEB25AB7A5F49B5A7BD59786358F20407FF404F32D2D6BD9C00825C