Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
820.exe

Overview

General Information

Sample name:820.exe
(renamed file extension from none to exe)
Original sample name:820
Analysis ID:1428492
MD5:f318a9ad5a22eb8b1a0849d82b171cc6
SHA1:4206d66d1279f24097aeec8184dc3dd22cc6513a
SHA256:820b7ea29750ecab25b85ef56f24d42b51b332b404e594ee55cdff2bc63097df
Infos:

Detection

Pony
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Pony
C2 URLs / IPs found in malware configuration
Drops / launches Pony Loader self-deletion script - malware possibly based on Pony Loader leaked source code
Machine Learning detection for sample
Pony trojan / infostealer detected
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Yara signature match

Classification

  • System is w10x64
  • 820.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\820.exe" MD5: F318A9AD5A22EB8B1A0849D82B171CC6)
    • cmd.exe (PID: 7420 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EvilPony, PonyshePrivately modded version of the Pony stealer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony
{"C2 list": ["http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php"]}
SourceRuleDescriptionAuthorStrings
820.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    820.exeJoeSecurity_PonyYara detected PonyJoe Security
      820.exeWindows_Trojan_Pony_d5516fe8unknownunknown
      • 0x1443f:$a1: \Global Downloader
      • 0x13bc8:$a2: wiseftpsrvs.bin
      • 0x1429f:$a3: SiteServer %d\SFTP
      • 0x14293:$a4: %s\Keychain
      • 0x144fd:$a5: Connections.txt
      • 0x14844:$a6: ftpshell.fsi
      • 0x14f9f:$a7: inetcomm server passwords
      820.exeponyIdentify PonyBrian Wallace @botnet_hunter
      • 0x12dca:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x14fe6:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x125ec:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
      • 0x12c0d:$s3: POST %s HTTP/1.0
      • 0x12c36:$s4: Accept-Encoding: identity, *;q=0
      • 0x12d43:$s4: Accept-Encoding: identity, *;q=0
      820.exeFareitFareit Payloadkevoreilly
      • 0x1523d:$string1: 0D 0A 09 09 0D 0A 0D 0A 09 20 20 20 3A 6B 74 6B 20 20 20 0D 0A 0D 0A 0D 0A 20 20 20 20 20 64 65 6C 20 20 20 20 09 20 25 31 20 20 0D 0A 09 69 66 20 20 09 09 20 65 78 69 73 74 20 09 20 20 20 25 ...
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1616594000.0000000000413000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_PonyYara detected PonyJoe Security
          00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Pony_d5516fe8unknownunknown
          • 0x263f:$a1: \Global Downloader
          • 0x1dc8:$a2: wiseftpsrvs.bin
          • 0x249f:$a3: SiteServer %d\SFTP
          • 0x2493:$a4: %s\Keychain
          • 0x26fd:$a5: Connections.txt
          • 0x2a44:$a6: ftpshell.fsi
          • 0x319f:$a7: inetcomm server passwords
          00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmpponyIdentify PonyBrian Wallace @botnet_hunter
          • 0xfca:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
          • 0x31e6:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
          • 0x7ec:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
          • 0xe0d:$s3: POST %s HTTP/1.0
          • 0xe36:$s4: Accept-Encoding: identity, *;q=0
          • 0xf43:$s4: Accept-Encoding: identity, *;q=0
          00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.820.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.820.exe.400000.0.unpackJoeSecurity_PonyYara detected PonyJoe Security
                0.2.820.exe.400000.0.unpackWindows_Trojan_Pony_d5516fe8unknownunknown
                • 0x1523f:$a1: \Global Downloader
                • 0x149c8:$a2: wiseftpsrvs.bin
                • 0x1509f:$a3: SiteServer %d\SFTP
                • 0x15093:$a4: %s\Keychain
                • 0x152fd:$a5: Connections.txt
                • 0x15644:$a6: ftpshell.fsi
                • 0x15d9f:$a7: inetcomm server passwords
                0.2.820.exe.400000.0.unpackponyIdentify PonyBrian Wallace @botnet_hunter
                • 0x13bca:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                • 0x15de6:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                • 0x133ec:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
                • 0x13a0d:$s3: POST %s HTTP/1.0
                • 0x13a36:$s4: Accept-Encoding: identity, *;q=0
                • 0x13b43:$s4: Accept-Encoding: identity, *;q=0
                0.2.820.exe.400000.0.unpackFareitFareit Payloadkevoreilly
                • 0x1603d:$string1: 0D 0A 09 09 0D 0A 0D 0A 09 20 20 20 3A 6B 74 6B 20 20 20 0D 0A 0D 0A 0D 0A 20 20 20 20 20 64 65 6C 20 20 20 20 09 20 25 31 20 20 0D 0A 09 69 66 20 20 09 09 20 65 78 69 73 74 20 09 20 20 20 25 ...
                Click to see the 5 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 820.exeAvira: detected
                Source: 0.0.820.exe.400000.0.unpackMalware Configuration Extractor: Pony {"C2 list": ["http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php"]}
                Source: assuredexpresscourierservice.comVirustotal: Detection: 7%Perma Link
                Source: 820.exeReversingLabs: Detection: 100%
                Source: 820.exeVirustotal: Detection: 87%Perma Link
                Source: Yara matchFile source: 820.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTR
                Source: 820.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040A67C lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree,0_2_0040A67C
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040D328 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D328
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040A4C1 WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,757283B0,0_2_0040A4C1
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040A8D7 CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree,0_2_0040A8D7
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040CDA7 lstrlen,CryptUnprotectData,LocalFree,0_2_0040CDA7
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040AA8E lstrlen,CryptUnprotectData,LocalFree,0_2_0040AA8E
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404346 CryptUnprotectData,LocalFree,0_2_00404346
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040BBA0 CryptUnprotectData,LocalFree,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA,0_2_0040BBA0
                Source: 820.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040514D FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_0040514D
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404110 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00404110
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404DDD FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00404DDD
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00408A4F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408A4F
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_004088CB FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_004088CB
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040979C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_0040979C
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

                Networking

                barindex
                Source: Malware configuration extractorURLs: http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php
                Source: unknownDNS traffic detected: query: assuredexpresscourierservice.com replaycode: Name error (3)
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: 820.exe, 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: 820.exeString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/abe2869f-9b47-4cd9-a358-c22904dba7f7Microsoft_WinInet_*ftp://Software\Adobe\CommonSiteServersSiteServer %d\HostSiteServer %d\WebUrlSiteServer %d\Remote DirectorySiteServer %d-UserSiteServer %d-User PW%s\KeychainSiteServer %d\SFTPDeluxeFTPsites.xmlWeb DataLogin DataSQLite format 3table() CONSTRAINTPRIMARYUNIQUECHECKFOREIGNloginsorigin_urlpassword_valueusername_valueftp://http://https://\Google\Chrome\Chromium\ChromePlusSoftware\ChromePlusInstall_Dir\Bromium\Nichrome\Comodo\RockMeltK-Meleon\K-Meleon\ProfilesEpic\Epic\EpicStaff-FTPsites.ini\Sites\Visicom Media.ftpSettings\Global DownloaderSM.archFreshFTP.SMFBlazeFtpsite.datLastPasswordLastAddressLastUserLastPortSoftware\FlashPeak\BlazeFtp\Settings\BlazeFtp.fplFTP++.Link\shell\open\commandGoFTPConnections.txt3D-FTPsites.ini\3D-FTP\SiteDesignerSOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32EasyFTP\NetSarang.xfp.rdpTERMSRV/*password 51:b:username:s:full address:s:.TERMSRV/FTP NowFTPNowsites.xmlSOFTWARE\Robo-FTP 3.7\ScriptsSOFTWARE\Robo-FTP 3.7\FTPServersFTP CountFTP File%dPasswordServerNameUserIDInitialDirectoryPortNumberServerType equals www.facebook.com (Facebook)
                Source: 820.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: unknownDNS traffic detected: queries for: assuredexpresscourierservice.com
                Source: 820.exeString found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
                Source: 820.exeString found in binary or memory: http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php
                Source: 820.exeString found in binary or memory: http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.phphttp://assuredexpresscourierservice.c
                Source: 820.exeString found in binary or memory: http://https://ftp://operawand.dat_Software
                Source: 820.exeString found in binary or memory: http://www.ibsensoftware.com/
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: 820.exe, 00000000.00000002.1635331357.000000000068E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: 820.exe, 00000000.00000002.1635331357.000000000068E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: 820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 820.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTR

                System Summary

                barindex
                Source: 820.exe, type: SAMPLEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 820.exe, type: SAMPLEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 820.exe, type: SAMPLEMatched rule: Fareit Payload Author: kevoreilly
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
                Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
                Source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
                Source: Signatures Results: All Signatures
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_004120090_2_00412009
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00402E670_2_00402E67
                Source: C:\Users\user\Desktop\820.exeCode function: String function: 00401CF9 appears 139 times
                Source: C:\Users\user\Desktop\820.exeCode function: String function: 0041062E appears 42 times
                Source: C:\Users\user\Desktop\820.exeCode function: String function: 004042BB appears 51 times
                Source: 820.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 820.exe, type: SAMPLEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 820.exe, type: SAMPLEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 820.exe, type: SAMPLEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
                Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
                Source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@1/0
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040D328 CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,0_2_0040D328
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_004028F0 LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,FindCloseChangeNotification,0_2_004028F0
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00402C5B WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle,0_2_00402C5B
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7428:120:WilError_03
                Source: C:\Users\user\Desktop\820.exeFile created: C:\Users\user\AppData\Local\Temp\6575781.batJump to behavior
                Source: C:\Users\user\Desktop\820.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" "
                Source: 820.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\820.exeFile read: C:\Windows\win.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 820.exe, 00000000.00000003.1621410526.00000000006E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 820.exeReversingLabs: Detection: 100%
                Source: 820.exeVirustotal: Detection: 87%
                Source: unknownProcess created: C:\Users\user\Desktop\820.exe "C:\Users\user\Desktop\820.exe"
                Source: C:\Users\user\Desktop\820.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" "
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\820.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" "Jump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: msi.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 820.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1616594000.0000000000413000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTR
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040245E LoadLibraryA,GetProcAddress,0_2_0040245E

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\820.exeFile dump: 6575781.bat.0.dr 3880EEB1C736D853EB13B44898B718ABJump to dropped file
                Source: C:\Users\user\Desktop\820.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\820.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-11054
                Source: C:\Users\user\Desktop\820.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-8340
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040514D FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,0_2_0040514D
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404110 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00404110
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404DDD FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_00404DDD
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00408A4F FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_00408A4F
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_004088CB FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,0_2_004088CB
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040979C FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,0_2_0040979C
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404567 GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00404567
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                Source: 820.exe, 00000000.00000002.1635331357.000000000068E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk^[
                Source: 820.exe, 00000000.00000002.1635331357.00000000006D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040245E LoadLibraryA,GetProcAddress,0_2_0040245E
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00410194 lstrcmpiA,LogonUserA,lstrlen,LCMapStringA,LogonUserA,LogonUserA,74781B10,ImpersonateLoggedOnUser,RevertToSelf,74775030,CloseHandle,0_2_00410194
                Source: C:\Users\user\Desktop\820.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" "Jump to behavior
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_0040443C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0040443C
                Source: C:\Users\user\Desktop\820.exeCode function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00404567
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00410365 OleInitialize,GetUserNameA,0_2_00410365
                Source: C:\Users\user\Desktop\820.exeCode function: 0_2_00404567 GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00404567

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 820.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTR
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SiteDesigner\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBITJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\AceBITJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FileZilla\filezilla.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\BitKinex\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SharedSettings.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SmartFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\SetupJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\TurboFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FTP Explorer\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\Estsoft\ALFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\ExpanDrive\drives.jsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\3\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\BlazeFtp\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\FTPGetter\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\AceBIT\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Windows\32BitFtp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\4\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\3D-FTP\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\Frigate3\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\NetSarang\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FTPRush\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbarJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\3\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: HKEY_LOCAL_MACHINE\Software\TurboFTPJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\FlashFXP\4\History.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Windows\wcx_ftp.iniJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\Jump to behavior
                Source: C:\Users\user\Desktop\820.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.datJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet SettingsJump to behavior
                Source: C:\Users\user\Desktop\820.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\Desktop\820.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword0_2_0040EB0D
                Source: C:\Users\user\Desktop\820.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword0_2_0040EB0D

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 820.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.820.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 820.exe PID: 7324, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                1
                Valid Accounts
                2
                Native API
                1
                Valid Accounts
                1
                Valid Accounts
                1
                Valid Accounts
                2
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scripting
                11
                Access Token Manipulation
                11
                Access Token Manipulation
                2
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                11
                Process Injection
                11
                Process Injection
                Security Account Manager1
                Account Discovery
                SMB/Windows Admin Shares2
                Data from Local System
                11
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                NTDS1
                System Owner/User Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets3
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Install Root Certificate
                Cached Domain Credentials14
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                820.exe100%ReversingLabsWin32.Infostealer.Fareit
                820.exe87%VirustotalBrowse
                820.exe100%AviraTR/PSW.Fareit.iloen
                820.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                assuredexpresscourierservice.com8%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.ibsensoftware.com/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                assuredexpresscourierservice.com
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://https://ftp://operawand.dat_Software820.exefalse
                  low
                  https://ac.ecosia.org/autocomplete?q=820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/chrome_newtab820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://duckduckgo.com/ac/?q=820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.google.com/images/branding/product/ico/googleg_lodp.ico820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              ftp://http://https://ftp.fireFTPsites.datSeaMonkey820.exefalse
                                low
                                https://www.ecosia.org/newtab/820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.ibsensoftware.com/820.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search820.exe, 00000000.00000003.1620871035.00000000006F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      No contacted IP infos
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1428492
                                      Start date and time:2024-04-19 02:50:20 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 2m 9s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:3
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:820.exe
                                      (renamed file extension from none to exe)
                                      Original Sample Name:820
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@5/1@1/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 83
                                      • Number of non-executed functions: 44
                                      Cookbook Comments:
                                      • Stop behavior analysis, all processes terminated
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\820.exe
                                      File Type:ASCII text, with CRLF, CR line terminators
                                      Category:dropped
                                      Size (bytes):94
                                      Entropy (8bit):3.233204299824007
                                      Encrypted:false
                                      SSDEEP:3:k4Zoa5/kFWJFFN6dAFZkMFlGl/AVFn:k/0/kFY/NDFZotwFn
                                      MD5:3880EEB1C736D853EB13B44898B718AB
                                      SHA1:4EEC9D50360CD815211E3C4E6BDD08271B6EC8E6
                                      SHA-256:936D9411D5226B7C5A150ECAF422987590A8870C8E095E1CAA072273041A86E7
                                      SHA-512:3EAA3DDDD7A11942E75ACD44208FBE3D3FF8F4006951CD970FB9AB748C160739409803450D28037E577443504707FC310C634E9DC54D0C25E8CFE6094F017C6B
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:......... :ktk ...... del . %1 ...if .. exist . %1 . goto .. ktk.. del . %0
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.22558066200294
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.56%
                                      • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                      • Windows Screen Saver (13104/52) 0.13%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      File name:820.exe
                                      File size:92'160 bytes
                                      MD5:f318a9ad5a22eb8b1a0849d82b171cc6
                                      SHA1:4206d66d1279f24097aeec8184dc3dd22cc6513a
                                      SHA256:820b7ea29750ecab25b85ef56f24d42b51b332b404e594ee55cdff2bc63097df
                                      SHA512:08aabb6469c060403d38bdc389e94d7997f85ca82f007afde7a0322d46b0fe18cb056050a32078855f81536afc6cd944392adadc3d3528debf5b418f4db761b9
                                      SSDEEP:1536:127gBvJqTAugrnSIa3HPdcbdReUNPkN1POkXoTvBEAlkzm/:wMdjXAHPqTeUOOLEAp/
                                      TLSH:56930903F580A0F1C1A26BB137C11771E7F99E797C3A8E4AEF4C49856EF26876B16412
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q%.b...............2.....R......V........0....@........................................................................
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x410456
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:
                                      Time Stamp:0x62E62571 [Sun Jul 31 06:47:13 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:c110bea8b4fbc49066981758795b93e1
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      pop ebp
                                      call 00007FE434F5DC5Ah
                                      mov ecx, 0000000Ah
                                      xor edx, edx
                                      div ecx
                                      cmp edx, 05h
                                      jne 00007FE434F5DC04h
                                      jmp 00007FE434F5DC04h
                                      jmp 00007FE434F5DBEBh
                                      call 00007FE434F5DB9Bh
                                      push 00000000h
                                      call 00007FE434F5DD32h
                                      int3
                                      jmp dword ptr [0041817Ch]
                                      jmp dword ptr [00418180h]
                                      jmp dword ptr [00418184h]
                                      jmp dword ptr [00418188h]
                                      jmp dword ptr [0041818Ch]
                                      jmp dword ptr [00418190h]
                                      jmp dword ptr [00418194h]
                                      jmp dword ptr [00418198h]
                                      jmp dword ptr [0041819Ch]
                                      jmp dword ptr [004181A0h]
                                      jmp dword ptr [004181A4h]
                                      jmp dword ptr [004181A8h]
                                      jmp dword ptr [004181ACh]
                                      jmp dword ptr [004181B0h]
                                      jmp dword ptr [004181B4h]
                                      jmp dword ptr [004181B8h]
                                      jmp dword ptr [004181BCh]
                                      jmp dword ptr [004181C0h]
                                      jmp dword ptr [004181C4h]
                                      jmp dword ptr [004181C8h]
                                      jmp dword ptr [004181CCh]
                                      jmp dword ptr [004181D0h]
                                      jmp dword ptr [004181D4h]
                                      jmp dword ptr [004181D8h]
                                      jmp dword ptr [004181DCh]
                                      jmp dword ptr [004181E0h]
                                      jmp dword ptr [000081E4h]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x17f280xc8.data
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x1186b0x11a00e2ecf54ac1aeeaa3108e62c399d1b6dfFalse0.4605496453900709data6.063420518847026IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x130000x1000x20062b50172bb46ac5ad3e41d6230f4b01cFalse0.392578125data3.0480045566937473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x140000x4eb80x4a00ab53bb856e61986f1207e75a1783b87fFalse0.4161739864864865data5.286540277071365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      DLLImport
                                      KERNEL32.DLLCreateFileA, ReadFile, CloseHandle, WriteFile, lstrlenA, GlobalLock, GlobalUnlock, LocalFree, LocalAlloc, GetTickCount, lstrcpyA, lstrcatA, GetFileAttributesA, ExpandEnvironmentStringsA, GetFileSize, CreateFileMappingA, MapViewOfFile, UnmapViewOfFile, LoadLibraryA, GetProcAddress, GetTempPathA, CreateDirectoryA, DeleteFileA, GetCurrentProcess, WideCharToMultiByte, GetLastError, lstrcmpA, CreateToolhelp32Snapshot, Process32First, OpenProcess, Process32Next, FindFirstFileA, lstrcmpiA, FindNextFileA, FindClose, GetModuleHandleA, GetVersionExA, GetLocaleInfoA, GetSystemInfo, GetWindowsDirectoryA, GetPrivateProfileStringA, SetCurrentDirectoryA, GetPrivateProfileSectionNamesA, GetPrivateProfileIntA, GetCurrentDirectoryA, lstrlenW, MultiByteToWideChar, Sleep, GetModuleFileNameA, LCMapStringA, ExitProcess
                                      advapi32.dllRegOpenKeyExA, RegQueryValueExA, RegCloseKey, RegOpenKeyA, RegEnumKeyExA, RegCreateKeyA, RegSetValueExA, IsTextUnicode, RegOpenCurrentUser, RegEnumValueA, GetUserNameA
                                      ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoCreateGuid, CoTaskMemFree, CoCreateInstance, OleInitialize
                                      shell32.dllShellExecuteA
                                      shlwapi.dllStrStrIA, StrRChrIA, StrToIntA, StrStrA, StrCmpNIA, StrStrIW
                                      user32.dllwsprintfA
                                      userenv.dllLoadUserProfileA, UnloadUserProfile
                                      wininet.dllInternetCrackUrlA, InternetCreateUrlA
                                      wsock32.dllinet_addr, gethostbyname, socket, connect, closesocket, send, select, recv, setsockopt, WSAStartup
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 19, 2024 02:51:06.650149107 CEST5672153192.168.2.41.1.1.1
                                      Apr 19, 2024 02:51:06.757905960 CEST53567211.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Apr 19, 2024 02:51:06.650149107 CEST192.168.2.41.1.1.10x808dStandard query (0)assuredexpresscourierservice.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Apr 19, 2024 02:51:06.757905960 CEST1.1.1.1192.168.2.40x808dName error (3)assuredexpresscourierservice.comnonenoneA (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:02:51:05
                                      Start date:19/04/2024
                                      Path:C:\Users\user\Desktop\820.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\820.exe"
                                      Imagebase:0x400000
                                      File size:92'160 bytes
                                      MD5 hash:F318A9AD5A22EB8B1A0849D82B171CC6
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.1616594000.0000000000413000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000000.1616612816.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:02:51:07
                                      Start date:19/04/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6575781.bat" "C:\Users\user\Desktop\820.exe" "
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:02:51:07
                                      Start date:19/04/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:28.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:11.6%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:45
                                        execution_graph 11313 40b851 11314 40b994 11313->11314 11315 401840 LocalFree 11314->11315 11316 40b99c 11315->11316 8179 410456 8180 41045a GetTickCount 8179->8180 8181 41046d 8180->8181 8182 41046f 8180->8182 8185 41040c 8181->8185 8182->8180 8202 410365 OleInitialize 8185->8202 8187 410415 8222 40f94b 8187->8222 8191 41041f 8244 40fcf4 8191->8244 8195 410436 RevertToSelf 8196 41043c 8195->8196 8262 410094 8196->8262 8314 4024b8 8202->8314 8205 40f94b GetTickCount 8206 410380 8205->8206 8331 402b52 8206->8331 8210 41038a 8211 4103a1 8210->8211 8212 41038e 8210->8212 8352 401857 LocalAlloc 8211->8352 8387 402c5b 8212->8387 8215 4103ab GetUserNameA 8217 4103ca 8215->8217 8218 4103d5 8215->8218 8216 410393 8216->8211 8353 401840 8217->8353 8356 402041 8218->8356 8221 4103e4 8221->8187 8223 40f994 8222->8223 8224 40f970 GetTickCount 8223->8224 8225 40f99a 8223->8225 8224->8223 8226 40fbe5 8225->8226 8441 403f65 WSAStartup 8226->8441 8228 40fbf8 DeleteFileA 8442 401000 756A4620 8228->8442 8230 40fc12 8231 40fc30 8230->8231 8450 401000 756A4620 8230->8450 8233 40fce6 8231->8233 8443 40fbb1 8231->8443 8233->8191 8235 40fc21 8235->8231 8451 401000 756A4620 8235->8451 8237 40fcd2 8237->8233 8471 402665 RegCreateKeyA 8237->8471 8240 40fc46 8240->8233 8240->8237 8241 40fcb1 Sleep 8240->8241 8243 40f9bb 6 API calls 8240->8243 8452 403f01 8240->8452 8461 401b48 756D19A0 8240->8461 8241->8240 8243->8240 8245 40fedc 8244->8245 8250 40fd11 8244->8250 8245->8195 8245->8196 8247 401710 5 API calls 8247->8250 8248 40fd4f wsprintfA 8249 401dd4 6 API calls 8248->8249 8249->8250 8250->8245 8250->8247 8250->8248 8251 401840 LocalFree 8250->8251 8252 40fdcc GetTempPathA 8250->8252 8253 40fdf0 GetTickCount wsprintfA CreateDirectoryA 8250->8253 11216 403cd7 8250->11216 8251->8250 8252->8250 8258 40fe24 8253->8258 8254 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 8254->8258 8255 401dd4 6 API calls 8255->8258 8256 4013eb 3 API calls 8256->8258 8257 40fe76 lstrlen 8260 402665 19 API calls 8257->8260 8258->8254 8258->8255 8258->8256 8258->8257 8259 401840 LocalFree 8258->8259 8259->8250 8261 40fe91 ShellExecuteA 8260->8261 8261->8258 8263 4100b1 8262->8263 8265 4100a8 8262->8265 8267 410194 8263->8267 8264 402a32 LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte 8264->8265 8265->8263 8265->8264 11254 401857 LocalAlloc 8265->11254 8268 4101b2 8267->8268 8272 4101a9 8267->8272 8285 40fee0 8268->8285 8269 402b52 5 API calls 8269->8272 8270 4101d1 lstrcmpiA 8271 4101e8 LogonUserA 8270->8271 8270->8272 8271->8272 8272->8268 8272->8269 8272->8270 8272->8271 8273 410297 74781B10 8272->8273 8274 4029a5 3 API calls 8272->8274 8276 4102fc ImpersonateLoggedOnUser 8272->8276 8278 401840 LocalFree 8272->8278 8279 40fbe5 397 API calls 8272->8279 8280 410338 CloseHandle 8272->8280 8281 41032d 74775030 8272->8281 8282 410274 LogonUserA 8272->8282 8283 410317 RevertToSelf 8272->8283 8284 41031d 8272->8284 8273->8272 8275 410216 lstrlen LCMapStringA 8274->8275 8275->8272 8277 41023c LogonUserA 8275->8277 8276->8272 8277->8272 8278->8272 8279->8272 8280->8272 8281->8280 8282->8272 8282->8273 8283->8284 8284->8272 11255 401857 LocalAlloc 8285->11255 8287 40fef9 GetTickCount wsprintfA 11256 401857 LocalAlloc 8287->11256 8289 40ff23 11257 401857 LocalAlloc 8289->11257 8291 40ff3b 11258 401857 LocalAlloc 8291->11258 8293 40ff4e GetModuleFileNameA GetTempPathA 8294 40ffa0 CreateFileA 8293->8294 8295 40ff90 lstrcat 8293->8295 8296 40ffc5 lstrcpy StrRChrIA 8294->8296 8297 410007 lstrlen 8294->8297 8295->8294 8299 40ffe0 lstrcpy 8296->8299 8300 40ffea CreateFileA 8296->8300 8298 4013aa WriteFile 8297->8298 8301 41001f CloseHandle 8298->8301 8299->8300 8300->8297 8302 41002d 8300->8302 8301->8302 8303 41002f wsprintfA LoadLibraryA 8301->8303 8303->8302 8405 40245e LoadLibraryA 8314->8405 8316 4024c7 8317 40245e 2 API calls 8316->8317 8318 4024d6 8317->8318 8319 40245e 2 API calls 8318->8319 8320 4024e5 8319->8320 8321 40245e 2 API calls 8320->8321 8322 4024f4 8321->8322 8323 40245e 2 API calls 8322->8323 8324 402503 8323->8324 8325 40245e 2 API calls 8324->8325 8326 402512 8325->8326 8327 40245e 2 API calls 8326->8327 8328 402521 8327->8328 8329 40245e 2 API calls 8328->8329 8330 402530 8329->8330 8330->8205 8333 402b62 8331->8333 8334 402b7a 8333->8334 8411 4028f0 8333->8411 8335 402b7f 8334->8335 8336 402b93 8335->8336 8337 402ba5 8335->8337 8336->8337 8338 402baa GetCurrentProcess OpenProcessToken 8336->8338 8337->8210 8339 402c56 8338->8339 8340 402bc6 GetTokenInformation 8338->8340 8339->8210 8341 402be4 GetLastError 8340->8341 8342 402c4e CloseHandle 8340->8342 8341->8342 8343 402bee 8341->8343 8342->8339 8343->8342 8421 401857 LocalAlloc 8343->8421 8345 402bfc GetTokenInformation 8346 402c46 8345->8346 8347 402c18 ConvertSidToStringSidA 8345->8347 8349 401840 LocalFree 8346->8349 8347->8346 8348 402c2c lstrcmp 8347->8348 8350 402c3d 8348->8350 8351 402c3e LocalFree 8348->8351 8349->8342 8350->8351 8351->8346 8352->8215 8354 401851 8353->8354 8355 401849 LocalFree 8353->8355 8354->8218 8355->8354 8357 402055 8356->8357 8358 402060 8356->8358 8359 401840 LocalFree 8357->8359 8360 40207e 8358->8360 8361 401840 LocalFree 8358->8361 8359->8358 8422 401000 756A4620 8360->8422 8361->8360 8363 402094 8423 401000 756A4620 8363->8423 8365 4020a0 RegOpenKeyA 8369 402216 8365->8369 8382 4020bb 8365->8382 8366 4020c5 RegEnumKeyExA 8367 40220e RegCloseKey 8366->8367 8366->8382 8367->8369 8370 402230 756D19A0 8369->8370 8371 402291 756D19A0 8370->8371 8372 402246 8370->8372 8374 4022a7 8371->8374 8376 4022f2 8371->8376 8437 401857 LocalAlloc 8372->8437 8438 401857 LocalAlloc 8374->8438 8376->8221 8377 402262 GlobalFix 8377->8371 8380 402276 GlobalUnWire 8377->8380 8379 4022c3 GlobalFix 8379->8376 8381 4022d7 GlobalUnWire 8379->8381 8380->8371 8381->8376 8382->8366 8383 401cf9 6 API calls 8382->8383 8384 4021d3 lstrlen 8382->8384 8385 402198 lstrlen 8382->8385 8386 401840 LocalFree 8382->8386 8424 401d80 8382->8424 8429 401dd4 8382->8429 8383->8382 8384->8382 8385->8382 8386->8382 8388 402c72 8387->8388 8389 402c8d 8387->8389 8388->8389 8390 402c92 WTSGetActiveConsoleSessionId CreateToolhelp32Snapshot 8388->8390 8389->8216 8391 402dd7 8390->8391 8392 402cb9 Process32First 8390->8392 8391->8216 8393 402cd1 8392->8393 8394 402cd9 StrStrIA 8393->8394 8395 402dcc CloseHandle 8393->8395 8397 402db5 Process32Next 8393->8397 8398 402d26 OpenProcess 8393->8398 8396 402cf2 ProcessIdToSessionId 8394->8396 8394->8397 8395->8391 8396->8393 8396->8397 8397->8393 8398->8397 8399 402d3c OpenProcessToken 8398->8399 8400 402d55 ImpersonateLoggedOnUser 8399->8400 8401 402dad CloseHandle 8399->8401 8402 402d62 RegOpenCurrentUser 8400->8402 8403 402d9b CloseHandle CloseHandle 8400->8403 8401->8397 8404 402d82 8402->8404 8403->8397 8404->8395 8406 402471 8405->8406 8407 402478 8405->8407 8406->8316 8408 402493 GetProcAddress 8407->8408 8409 4024ac 8407->8409 8408->8407 8410 40249e 8408->8410 8409->8316 8410->8316 8412 402900 8411->8412 8413 402912 8411->8413 8412->8413 8414 402919 LookupPrivilegeValueA 8412->8414 8413->8333 8415 40298f 8414->8415 8416 402935 GetCurrentProcess OpenProcessToken 8414->8416 8417 402996 CloseHandle 8415->8417 8418 40299e 8415->8418 8419 402976 AdjustTokenPrivileges 8416->8419 8420 40294d 8416->8420 8417->8418 8418->8333 8419->8415 8420->8419 8421->8345 8422->8363 8423->8365 8425 401d8a lstrlen lstrlen 8424->8425 8439 401857 LocalAlloc 8425->8439 8428 401db9 lstrcpy lstrcat 8428->8382 8430 401dde lstrlen lstrlen 8429->8430 8440 401857 LocalAlloc 8430->8440 8433 401e0d lstrcpy lstrcat 8434 401e32 8433->8434 8435 401e2a 8433->8435 8434->8382 8436 401840 LocalFree 8435->8436 8436->8434 8437->8377 8438->8379 8439->8428 8440->8433 8441->8228 8442->8230 8496 40fad7 8443->8496 8446 40fbe1 8446->8240 8447 40fad7 365 API calls 8448 40fbd2 8447->8448 8448->8446 8449 40fad7 365 API calls 8448->8449 8449->8446 8450->8235 8451->8231 8453 403f10 8452->8453 8456 403f56 8452->8456 8454 403f16 756D19A0 8453->8454 8453->8456 8455 403f26 8454->8455 8454->8456 8457 403f2e GlobalFix 8455->8457 8456->8240 8457->8456 8458 403f3d 8457->8458 11130 403d4f 8458->11130 8462 401c06 8461->8462 8463 401b68 8461->8463 8462->8240 8463->8462 8464 401b7d GlobalFix 8463->8464 8464->8462 8465 401b89 8464->8465 11215 401857 LocalAlloc 8465->11215 8467 401b94 8468 401ba5 GlobalUnWire 8467->8468 8469 401bbe 8468->8469 8470 401840 LocalFree 8469->8470 8470->8462 8472 402689 RegSetValueExA 8471->8472 8473 4026ab 8471->8473 8474 4026a2 8472->8474 8475 4026a3 RegCloseKey 8472->8475 8476 4026b3 GetTempPathA 8473->8476 8477 402778 8473->8477 8474->8475 8475->8473 8476->8477 8478 4026cc 8476->8478 8477->8233 8478->8477 8479 4026d7 CreateDirectoryA 8478->8479 8480 4026f1 8479->8480 8481 402711 8480->8481 8482 4026f5 8480->8482 8483 401d80 5 API calls 8481->8483 8484 401d80 5 API calls 8482->8484 8485 402720 CreateFileA 8483->8485 8486 402706 8484->8486 8487 402746 8485->8487 8488 40275e 8485->8488 8489 401dd4 6 API calls 8486->8489 8490 4013aa WriteFile 8487->8490 8491 402762 DeleteFileA 8488->8491 8492 40276d 8488->8492 8493 40270f 8489->8493 8491->8492 8493->8485 8519 40fa47 8496->8519 8498 40fae9 8509 40fafd 8498->8509 8523 40fa80 8498->8523 8502 40fb15 8502->8509 8544 4015fd 756D19A0 8502->8544 8504 40fb26 8504->8509 8550 401663 756D19A0 8504->8550 8509->8446 8509->8447 8520 40fa56 8519->8520 8584 40f8ee 8520->8584 11109 401710 756D19A0 8523->11109 8525 40fa95 8526 40277f 23 API calls 8525->8526 8527 40faaa 8526->8527 8528 40fad0 8527->8528 8529 401840 LocalFree 8527->8529 8530 40175d 756D19A0 8528->8530 8529->8528 8531 401831 8530->8531 8532 40177a 8530->8532 8531->8502 8533 401782 GlobalFix 8532->8533 8533->8531 8534 401795 8533->8534 11122 401857 LocalAlloc 8534->11122 8536 4017ae 11123 401857 LocalAlloc 8536->11123 8545 401647 8544->8545 8546 40161a 8544->8546 8545->8504 8547 401622 GlobalFix 8546->8547 8547->8545 8548 401631 8547->8548 8549 40163c GlobalUnWire 8548->8549 8549->8545 8551 401680 8550->8551 8552 4016cd 8550->8552 8587 40f910 8584->8587 8585 40f943 8585->8498 8587->8585 8669 402392 8587->8669 8673 4076be 8587->8673 8681 4077bd 8587->8681 8695 407e3b 8587->8695 8699 40e83b 8587->8699 8703 404bbb 8587->8703 8775 408eb9 8587->8775 8787 40e538 8587->8787 8791 40c138 8587->8791 8795 40c2b8 8587->8795 8799 40e037 8587->8799 8803 406336 8587->8803 8807 409d35 8587->8807 8822 4060b5 8587->8822 8834 404fb5 8587->8834 8862 405a35 8587->8862 8896 405c34 8587->8896 8934 405db3 8587->8934 8942 40e3b3 8587->8942 8952 409cae 8587->8952 8960 40532d 8587->8960 8987 40eaad 8587->8987 8995 408bad 8587->8995 9028 40a12c 8587->9028 9038 40f6aa 8587->9038 9064 40d328 8587->9064 9086 40c225 8587->9086 9090 40e421 8587->9090 9094 40c19a 8587->9094 9106 40ee18 8587->9106 9112 40aa12 8587->9112 9120 40db91 8587->9120 9124 40808e 8587->9124 9130 40c78d 8587->9130 9161 40a00c 8587->9161 9174 40d90b 8587->9174 9184 407d8a 8587->9184 9190 40690a 8587->9190 9194 408f89 8587->9194 9202 40f789 8587->9202 9214 40c287 8587->9214 9218 40a186 8587->9218 9222 40cf05 8587->9222 9232 40de05 8587->9232 9238 40e805 8587->9238 9242 409f80 8587->9242 9256 40d700 8587->9256 9260 40687f 8587->9260 9270 4049ff 8587->9270 9284 406c7e 8587->9284 9288 40effd 8587->9288 9302 40af7c 8587->9302 9306 409ef9 8587->9306 9314 40c8f4 8587->9314 9324 4074f3 8587->9324 9330 409e72 8587->9330 9338 40e871 8587->9338 9364 406ff0 8587->9364 9406 4075ef 8587->9406 9416 405e6e 8587->9416 9422 409deb 8587->9422 9430 40e569 8587->9430 9434 40c169 8587->9434 9438 4079e9 8587->9438 9458 404567 8587->9458 9484 40cade 8587->9484 9498 40c65a 8587->9498 9506 40cb58 8587->9506 9510 405557 8587->9510 9550 40c256 8587->9550 9554 40c6d3 8587->9554 9562 407dd3 8587->9562 9572 406c4d 8587->9572 9576 40decc 8587->9576 9586 406a4a 8587->9586 9590 4065c8 8587->9590 9594 40db48 8587->9594 9600 4072c8 8587->9600 9606 406945 8587->9606 9618 40d2c4 8587->9618 9628 40c9c3 8587->9628 9651 40a1c1 8587->9651 8670 40239b 8669->8670 8671 4023a7 8670->8671 8672 401840 LocalFree 8670->8672 8671->8587 8672->8670 8674 4076d0 8673->8674 9657 40765d 8674->9657 8677 40765d 51 API calls 8678 4076e7 8677->8678 8679 40765d 51 API calls 8678->8679 8680 4076f1 8679->8680 8680->8587 8682 4077cf 8681->8682 9711 407700 8682->9711 8685 407700 29 API calls 8686 4077ea 8685->8686 8687 407700 29 API calls 8686->8687 8688 4077f6 8687->8688 8689 407700 29 API calls 8688->8689 8690 407805 8689->8690 8691 407700 29 API calls 8690->8691 8692 407814 8691->8692 8693 407700 29 API calls 8692->8693 8694 407823 8693->8694 8694->8587 8696 407e4d 8695->8696 9784 404306 8696->9784 8698 407e67 8698->8587 8700 40e84d 8699->8700 9800 40e7c7 8700->9800 8702 40e862 8702->8587 8704 404bcd 8703->8704 9823 401857 LocalAlloc 8704->9823 8706 404bda GetWindowsDirectoryA 8707 404c02 8706->8707 8708 404bee 8706->8708 8709 401840 LocalFree 8707->8709 8708->8707 8710 404bf5 8708->8710 8711 404c00 8709->8711 9824 404a88 8710->9824 8713 401e39 7 API calls 8711->8713 8714 404c11 8713->8714 8715 404a88 28 API calls 8714->8715 8716 404c1a 8715->8716 8717 401e39 7 API calls 8716->8717 8718 404c21 8717->8718 8719 404c39 8718->8719 8720 401dd4 6 API calls 8718->8720 8721 401e39 7 API calls 8719->8721 8722 404c30 8720->8722 8723 404c40 8721->8723 8725 404a88 28 API calls 8722->8725 8724 404c58 8723->8724 8726 401dd4 6 API calls 8723->8726 8725->8719 8776 408ecb 8775->8776 8777 404306 51 API calls 8776->8777 8778 408ee5 8777->8778 9879 408c88 RegOpenKeyA 8778->9879 8781 408c88 14 API calls 8782 408f0a 8781->8782 9890 408d77 RegOpenKeyA 8782->9890 8785 408d77 58 API calls 8786 408f2e 8785->8786 8786->8587 8788 40e54a 8787->8788 9927 40e4d0 8788->9927 8790 40e55a 8790->8587 8792 40c14a 8791->8792 9939 40c0a7 8792->9939 8796 40c2ca 8795->8796 8797 40c0a7 51 API calls 8796->8797 8798 40c2da 8797->8798 8798->8587 8800 40e049 8799->8800 8801 40c0a7 51 API calls 8800->8801 8802 40e059 8801->8802 8802->8587 8804 406348 8803->8804 9961 40614e RegOpenKeyA 8804->9961 8806 406358 8806->8587 8808 409d4a 8807->8808 8809 401e39 7 API calls 8808->8809 8810 409d54 8809->8810 8811 409d7c GetCurrentDirectoryA 8810->8811 8812 401dd4 6 API calls 8810->8812 9972 409ba6 StrStrIA 8811->9972 8814 409d63 8812->8814 8816 4042bb 46 API calls 8814->8816 8818 409d77 8816->8818 8817 409ba6 83 API calls 8819 409dd0 SetCurrentDirectoryA 8817->8819 8821 401840 LocalFree 8818->8821 8820 409de7 8819->8820 8820->8587 8821->8811 8823 4060c7 8822->8823 8824 401cf9 6 API calls 8823->8824 8827 4060e3 8824->8827 8825 4060fe 8826 401cf9 6 API calls 8825->8826 8832 406117 8826->8832 8827->8825 8828 401840 LocalFree 8827->8828 8828->8825 8829 406132 10048 405eb6 RegOpenKeyA 8829->10048 8831 40613f 8831->8587 8832->8829 8833 401840 LocalFree 8832->8833 8833->8829 10058 401578 8834->10058 8836 404fca GetWindowsDirectoryA 8837 404fe6 8836->8837 8838 405089 8836->8838 8837->8838 8840 401d80 5 API calls 8837->8840 8839 401e39 7 API calls 8838->8839 8841 405090 8839->8841 8842 405002 GetPrivateProfileStringA 8840->8842 8843 4050b0 8841->8843 8847 401dd4 6 API calls 8841->8847 8844 405032 8842->8844 8845 405043 GetPrivateProfileStringA 8842->8845 10088 404f69 8843->10088 8848 404ddd 31 API calls 8844->8848 8850 40506d 8845->8850 8851 40507e 8845->8851 8852 40509f 8847->8852 8848->8845 8854 404ddd 31 API calls 8850->8854 8855 401840 LocalFree 8851->8855 10060 404ddd 8852->10060 8854->8851 8855->8838 8859 401840 LocalFree 8859->8843 8863 405a47 8862->8863 10102 40590e 8863->10102 8897 405c46 8896->8897 8898 401cf9 6 API calls 8897->8898 8899 405c60 8898->8899 8900 405c78 8899->8900 8901 403fd6 16 API calls 8899->8901 8902 401cf9 6 API calls 8900->8902 8903 405c73 8901->8903 8904 405c8f 8902->8904 8905 401840 LocalFree 8903->8905 8906 405ca7 8904->8906 8908 403fd6 16 API calls 8904->8908 8905->8900 8907 401cf9 6 API calls 8906->8907 8909 405cbe 8907->8909 8910 405ca2 8908->8910 8911 405cd1 8909->8911 10191 405bd6 8909->10191 8912 401840 LocalFree 8910->8912 8914 401cf9 6 API calls 8911->8914 8912->8906 8916 405ce8 8914->8916 8918 405cfb 8916->8918 8919 405bd6 46 API calls 8916->8919 8917 401840 LocalFree 8917->8911 8920 401cf9 6 API calls 8918->8920 8922 405cf6 8919->8922 8921 405d12 8920->8921 8923 405d25 8921->8923 8925 405bd6 46 API calls 8921->8925 8924 401840 LocalFree 8922->8924 8924->8918 8935 405dc5 8934->8935 10196 405d52 8935->10196 8938 405d52 51 API calls 8939 405ddc 8938->8939 8940 405d52 51 API calls 8939->8940 8941 405de6 8940->8941 8941->8587 8943 40e3c5 8942->8943 10209 40e1a1 RegOpenKeyA 8943->10209 8946 40e1a1 11 API calls 8947 40e3ed 8946->8947 10242 40e2ea RegOpenKeyA 8947->10242 8950 40e2ea 31 API calls 8951 40e412 8950->8951 8951->8587 8953 401578 8952->8953 8954 409cc3 GetCurrentDirectoryA 8953->8954 8955 409ba6 83 API calls 8954->8955 8956 409cfe 8955->8956 8957 409ba6 83 API calls 8956->8957 8958 409d1a SetCurrentDirectoryA 8957->8958 8959 409d31 8958->8959 8959->8587 8961 405340 8960->8961 8962 405389 8961->8962 8963 40534e StrStrIA 8961->8963 8966 4023b3 9 API calls 8961->8966 8972 401840 LocalFree 8961->8972 10316 40514d 8961->10316 10282 405284 8962->10282 8963->8961 8966->8961 8967 405284 34 API calls 8968 40539d 8967->8968 8969 405284 34 API calls 8968->8969 8971 4053a7 8969->8971 8973 405284 34 API calls 8971->8973 8972->8961 8974 4053b1 8973->8974 10311 405103 8974->10311 8988 40eabf 8987->8988 10343 40e963 8988->10343 8991 40e963 54 API calls 8992 40eae7 8991->8992 8993 404306 51 API calls 8992->8993 8994 40eafe 8993->8994 8994->8587 8996 408bbf 8995->8996 10361 408b8b 8996->10361 8999 408b8b 54 API calls 9000 408bd6 8999->9000 9001 408b8b 54 API calls 9000->9001 9002 408be0 9001->9002 9003 401cf9 6 API calls 9002->9003 9004 408bf7 9003->9004 9005 408bfb 9004->9005 9006 408c0f 9004->9006 10368 4088cb 9005->10368 9008 401cf9 6 API calls 9006->9008 9010 408c26 9008->9010 9012 408c2a 9010->9012 9013 408c3e 9010->9013 9014 4088cb 43 API calls 9012->9014 9015 401cf9 6 API calls 9013->9015 9029 40a13e 9028->9029 9030 401cf9 6 API calls 9029->9030 9031 40a154 9030->9031 9032 40a177 9031->9032 9033 4023b3 9 API calls 9031->9033 9032->8587 9034 40a15e 9033->9034 9035 4042bb 46 API calls 9034->9035 9036 40a172 9035->9036 9037 401840 LocalFree 9036->9037 9037->9032 9039 40f6bc 9038->9039 10455 40f658 9039->10455 9044 401d80 5 API calls 9045 40f6e9 9044->9045 10469 40f316 RegOpenKeyA 9045->10469 9048 401840 LocalFree 9049 40f703 9048->9049 9050 401cf9 6 API calls 9049->9050 9051 40f719 9050->9051 9052 40f73d 9051->9052 9053 401dd4 6 API calls 9051->9053 9054 40f277 23 API calls 9052->9054 9055 40f728 9053->9055 9056 40f750 9054->9056 9058 40f277 23 API calls 9055->9058 9065 40d33c 9064->9065 9066 40d519 9065->9066 9067 40d3a7 CertOpenSystemStoreA 9065->9067 9066->8587 9067->9066 9074 40d3c1 9067->9074 9068 40d3c3 CertEnumCertificatesInStore 9069 40d3d3 CertCloseStore 9068->9069 9068->9074 9069->9066 9071 40d3f1 lstrcmp 9071->9074 9073 40d428 lstrcmp 9073->9074 9075 40d43d CryptAcquireCertificatePrivateKey 9073->9075 9074->9068 9074->9071 9074->9073 9076 401840 LocalFree 9074->9076 10515 401857 LocalAlloc 9074->10515 9075->9074 9077 40d45a CryptGetUserKey 9075->9077 9076->9074 9078 40d4e6 CryptReleaseContext 9077->9078 9079 40d46e CryptExportKey 9077->9079 9078->9074 9080 40d487 9079->9080 9081 40d4dd CryptDestroyKey 9079->9081 10516 401857 LocalAlloc 9080->10516 9081->9078 9083 40d48f CryptExportKey 9085 40d4ac 9083->9085 9084 401840 LocalFree 9084->9081 9085->9084 9087 40c237 9086->9087 9088 40c0a7 51 API calls 9087->9088 9089 40c247 9088->9089 9089->8587 9091 40e433 9090->9091 9092 40c0a7 51 API calls 9091->9092 9093 40e443 9092->9093 9093->8587 9095 40c1ac 9094->9095 9096 40c0a7 51 API calls 9095->9096 9097 40c1bc 9096->9097 9098 401cf9 6 API calls 9097->9098 9099 40c1d3 9098->9099 9100 40c216 9099->9100 9101 404110 46 API calls 9099->9101 9100->8587 9102 40c1f4 9101->9102 9103 404110 46 API calls 9102->9103 9104 40c20e 9103->9104 9105 401840 LocalFree 9104->9105 9105->9100 9107 40ee2a 9106->9107 10517 40eb0d RegOpenKeyA 9107->10517 9110 40eb0d 18 API calls 9111 40ee52 9110->9111 9111->8587 9116 40aa24 9112->9116 9113 40aa4a 10529 40a7df 756FE550 9113->10529 9116->9113 9119 40a3c8 757283B0 9116->9119 9118 40aa7f 9118->8587 9119->9113 9121 40dba3 9120->9121 9122 404306 51 API calls 9121->9122 9123 40dbbd 9122->9123 9123->8587 9125 4080a0 9124->9125 10577 407e76 RegOpenKeyA 9125->10577 9128 407e76 14 API calls 9129 4080c8 9128->9129 9129->8587 9133 40c7a0 9130->9133 9131 40c7f5 9134 404306 51 API calls 9131->9134 9132 40c7ae StrStrIA 9132->9133 9133->9131 9133->9132 9135 4023b3 9 API calls 9133->9135 9140 4042bb 46 API calls 9133->9140 9143 401840 LocalFree 9133->9143 9136 40c80c 9134->9136 9135->9133 9137 401cf9 6 API calls 9136->9137 9138 40c823 9137->9138 9139 401cf9 6 API calls 9138->9139 9141 40c83d 9139->9141 9140->9133 9142 401cf9 6 API calls 9141->9142 9144 40c857 9142->9144 9143->9133 9145 401cf9 6 API calls 9144->9145 9148 40c873 9145->9148 9146 401840 LocalFree 9147 40c8cc 9146->9147 9149 401840 LocalFree 9147->9149 9152 401553 lstrlen 9148->9152 9160 40c8b6 9148->9160 9154 40c8a0 9152->9154 9156 401553 lstrlen 9154->9156 9158 40c8ab 9156->9158 9160->9146 9162 40a020 9161->9162 9163 401e39 7 API calls 9162->9163 9164 40a02a 9163->9164 9165 4042bb 46 API calls 9164->9165 9171 40a047 9164->9171 9168 40a042 9165->9168 9166 40a058 StrStrIA 9166->9171 9167 40a09d 9167->8587 9169 401840 LocalFree 9168->9169 9169->9171 9170 4023b3 9 API calls 9170->9171 9171->9166 9171->9167 9171->9170 9172 4042bb 46 API calls 9171->9172 9173 401840 LocalFree 9171->9173 9172->9171 9173->9171 9175 40d91d 9174->9175 10588 40d8cf 9175->10588 9178 40d8cf 51 API calls 9179 40d934 9178->9179 9180 40d8cf 51 API calls 9179->9180 9181 40d93e 9180->9181 9182 404306 51 API calls 9181->9182 9183 40d955 9182->9183 9183->8587 9185 407d9c 9184->9185 10597 407b24 RegOpenKeyA 9185->10597 9188 407b24 14 API calls 9189 407dc4 9188->9189 9189->8587 9191 40691c 9190->9191 9192 404306 51 API calls 9191->9192 9193 406936 9192->9193 9193->8587 9195 408f9b 9194->9195 10608 408f3d 9195->10608 9198 408f3d 51 API calls 9199 408fb2 9198->9199 9200 408f3d 51 API calls 9199->9200 9201 408fbc 9200->9201 9201->8587 9203 401578 9202->9203 9204 40f79e GetCurrentDirectoryA 9203->9204 9205 409ba6 83 API calls 9204->9205 9206 40f7d9 9205->9206 9207 409ba6 83 API calls 9206->9207 9208 40f7f5 SetCurrentDirectoryA GetCurrentDirectoryA 9207->9208 9209 409ba6 83 API calls 9208->9209 9210 40f839 9209->9210 9211 409ba6 83 API calls 9210->9211 9212 40f855 SetCurrentDirectoryA 9211->9212 9213 40f86c 9212->9213 9213->8587 9215 40c299 9214->9215 9216 40c0a7 51 API calls 9215->9216 9217 40c2a9 9216->9217 9217->8587 9219 40a198 9218->9219 9220 404306 51 API calls 9219->9220 9221 40a1b2 9220->9221 9221->8587 9223 40cf17 9222->9223 10619 40cc44 9223->10619 9226 401e39 7 API calls 9227 40cf29 9226->9227 9228 404110 46 API calls 9227->9228 9229 40cf4b 9227->9229 9230 40cf46 9228->9230 9229->8587 9231 401840 LocalFree 9230->9231 9231->9229 9233 40de17 9232->9233 10642 40dbcc RegOpenKeyA 9233->10642 9236 40dbcc 14 API calls 9237 40de3f 9236->9237 9237->8587 9239 40e817 9238->9239 9240 40e7c7 51 API calls 9239->9240 9241 40e82c 9240->9241 9241->8587 9243 409f92 9242->9243 9244 401cf9 6 API calls 9243->9244 9245 409fac 9244->9245 9246 409fc9 9245->9246 9247 4042bb 46 API calls 9245->9247 9248 401cf9 6 API calls 9246->9248 9249 409fc4 9247->9249 9250 409fe0 9248->9250 9251 401840 LocalFree 9249->9251 9252 409ffd 9250->9252 9253 4042bb 46 API calls 9250->9253 9251->9246 9252->8587 9254 409ff8 9253->9254 9255 401840 LocalFree 9254->9255 9255->9252 9257 40d712 9256->9257 10653 40d52a RegOpenKeyA 9257->10653 9259 40d722 9259->8587 9261 406891 9260->9261 9262 404306 51 API calls 9261->9262 9263 4068ab 9262->9263 9264 401cf9 6 API calls 9263->9264 9267 4068c4 9264->9267 9265 4068ee 10664 4065f9 RegOpenKeyA 9265->10664 9267->9265 9269 401840 LocalFree 9267->9269 9268 4068fb 9268->8587 9269->9265 9271 404a11 9270->9271 10676 404885 RegOpenKeyA 9271->10676 9274 404885 14 API calls 9275 404a2e 9274->9275 9276 404885 14 API calls 9275->9276 9277 404a3b 9276->9277 10687 404777 RegOpenKeyA 9277->10687 9280 404777 10 API calls 9281 404a55 9280->9281 9282 404777 10 API calls 9281->9282 9283 404a62 9282->9283 9283->8587 9285 406c90 9284->9285 9286 404306 51 API calls 9285->9286 9287 406caa 9286->9287 9287->8587 9289 40f00f 9288->9289 9290 404306 51 API calls 9289->9290 9291 40f029 9290->9291 9292 404306 51 API calls 9291->9292 9293 40f040 9292->9293 9294 404306 51 API calls 9293->9294 9295 40f057 9294->9295 9296 404306 51 API calls 9295->9296 9297 40f06e 9296->9297 10696 40eed6 9297->10696 9303 40af8e 9302->9303 10737 40ae41 RegOpenKeyA 9303->10737 9305 40af9e 9305->8587 9307 401578 9306->9307 9308 409f0e GetCurrentDirectoryA 9307->9308 9309 409ba6 83 API calls 9308->9309 9310 409f49 9309->9310 9311 409ba6 83 API calls 9310->9311 9312 409f65 SetCurrentDirectoryA 9311->9312 9313 409f7c 9312->9313 9313->8587 9315 40c906 9314->9315 9316 401cf9 6 API calls 9315->9316 9317 40c91c 9316->9317 9318 40c943 9317->9318 9319 4023b3 9 API calls 9317->9319 9318->8587 9320 40c926 9319->9320 9320->9318 9321 4042bb 46 API calls 9320->9321 9322 40c93e 9321->9322 9323 401840 LocalFree 9322->9323 9323->9318 9325 407505 9324->9325 10825 407311 RegOpenKeyA 9325->10825 9328 407311 14 API calls 9329 40752d 9328->9329 9329->8587 9331 401578 9330->9331 9332 409e87 GetCurrentDirectoryA 9331->9332 9333 409ba6 83 API calls 9332->9333 9334 409ec2 9333->9334 9335 409ba6 83 API calls 9334->9335 9336 409ede SetCurrentDirectoryA 9335->9336 9337 409ef5 9336->9337 9337->8587 9339 40e883 9338->9339 9340 401cf9 6 API calls 9339->9340 9341 40e89d 9340->9341 9342 40e8ba 9341->9342 9343 4042bb 46 API calls 9341->9343 9344 401cf9 6 API calls 9342->9344 9345 40e8b5 9343->9345 9346 40e8d0 9344->9346 9347 401840 LocalFree 9345->9347 9348 40e8ed 9346->9348 9349 4042bb 46 API calls 9346->9349 9347->9342 9350 401cf9 6 API calls 9348->9350 9351 40e8e8 9349->9351 9352 40e904 9350->9352 9353 401840 LocalFree 9351->9353 9354 40e921 9352->9354 9355 4042bb 46 API calls 9352->9355 9353->9348 9356 401cf9 6 API calls 9354->9356 9357 40e91c 9355->9357 9358 40e937 9356->9358 9359 401840 LocalFree 9357->9359 9360 4042bb 46 API calls 9358->9360 9361 40e954 9358->9361 9359->9354 9362 40e94f 9360->9362 9361->8587 9363 401840 LocalFree 9362->9363 9363->9361 9365 407002 9364->9365 10836 406cb9 RegOpenKeyA 9365->10836 9368 401cf9 6 API calls 9369 407029 9368->9369 9370 407047 9369->9370 9371 401dd4 6 API calls 9369->9371 9372 401e39 7 API calls 9370->9372 9373 407038 9371->9373 9374 40704e 9372->9374 9375 406f25 20 API calls 9373->9375 9376 407077 9374->9376 9379 401dd4 6 API calls 9374->9379 9378 407042 9375->9378 9377 401e39 7 API calls 9376->9377 9380 40707e 9377->9380 9381 401840 LocalFree 9378->9381 9382 40705d 9379->9382 9383 4070a7 9380->9383 9385 401dd4 6 API calls 9380->9385 9381->9370 9384 401dd4 6 API calls 9382->9384 9386 401e39 7 API calls 9383->9386 9387 407068 9384->9387 9388 40708d 9385->9388 9389 4070ae 9386->9389 10847 406f25 9387->10847 9393 401dd4 6 API calls 9388->9393 9391 4070d7 9389->9391 9394 401dd4 6 API calls 9389->9394 9391->8587 9396 407098 9393->9396 9397 4070bd 9394->9397 9398 406f25 20 API calls 9396->9398 9407 407601 9406->9407 10873 40753c RegOpenKeyA 9407->10873 9410 40753c 9 API calls 9411 407629 9410->9411 9412 40753c 9 API calls 9411->9412 9413 40763c 9412->9413 9414 40753c 9 API calls 9413->9414 9415 40764e 9414->9415 9415->8587 9417 405e80 9416->9417 10881 405df5 9417->10881 9420 405df5 51 API calls 9421 405ea7 9420->9421 9421->8587 9423 401578 9422->9423 9424 409e00 GetCurrentDirectoryA 9423->9424 9425 409ba6 83 API calls 9424->9425 9426 409e3b 9425->9426 9427 409ba6 83 API calls 9426->9427 9428 409e57 SetCurrentDirectoryA 9427->9428 9429 409e6e 9428->9429 9429->8587 9431 40e57b 9430->9431 9432 404306 51 API calls 9431->9432 9433 40e595 9432->9433 9433->8587 9435 40c17b 9434->9435 9436 40c0a7 51 API calls 9435->9436 9437 40c18b 9436->9437 9437->8587 9439 4079fd 9438->9439 9440 407ad0 9439->9440 9441 407a15 StrStrA 9439->9441 9445 407a2e lstrlen 9439->9445 9448 4023b3 9 API calls 9439->9448 9450 4042bb 46 API calls 9439->9450 9455 401840 LocalFree 9439->9455 10896 40799d 9440->10896 9441->9439 9443 407a72 StrStrIA 9441->9443 9443->9439 9446 4023b3 9 API calls 9445->9446 9446->9439 9447 40799d 51 API calls 9449 407ae4 9447->9449 9448->9439 9451 40799d 51 API calls 9449->9451 9450->9439 9452 407aee 9451->9452 10907 407832 RegOpenKeyA 9452->10907 9455->9439 9456 407832 53 API calls 9457 407b13 9456->9457 9457->8587 9459 40457e 9458->9459 9460 40459f GetVersionExA 9459->9460 9461 4045c1 9460->9461 10918 4043d4 GetModuleHandleA 9461->10918 9463 404607 10924 401857 LocalAlloc 9463->10924 9465 40461a GetLocaleInfoA 10925 401527 9465->10925 9467 404649 GetLocaleInfoA 9468 404672 9467->9468 10927 40443c 9468->10927 9470 404677 9485 40caf0 9484->9485 9486 401cf9 6 API calls 9485->9486 9487 40cb06 9486->9487 9488 40cb0a StrStrIA 9487->9488 9491 40cb49 9487->9491 9489 40cb41 9488->9489 9490 40cb1e 9488->9490 9493 401840 LocalFree 9489->9493 9492 4023b3 9 API calls 9490->9492 9491->8587 9494 40cb26 9492->9494 9493->9491 9495 404110 46 API calls 9494->9495 9496 40cb3c 9495->9496 9497 401840 LocalFree 9496->9497 9497->9489 9499 40c66c 9498->9499 10971 40c5e9 9499->10971 9502 40c5e9 51 API calls 9503 40c683 9502->9503 9504 40c5e9 51 API calls 9503->9504 9505 40c68d 9504->9505 9505->8587 9507 40cb6a 9506->9507 9508 404306 51 API calls 9507->9508 9509 40cb84 9508->9509 9509->8587 9511 405569 9510->9511 10988 405432 9511->10988 9514 405432 24 API calls 9515 40559c 9514->9515 9516 405432 24 API calls 9515->9516 9517 4055b4 9516->9517 9518 405432 24 API calls 9517->9518 9519 4055cc 9518->9519 9520 405432 24 API calls 9519->9520 9521 4055e4 9520->9521 9522 405432 24 API calls 9521->9522 9523 4055fc 9522->9523 9524 405432 24 API calls 9523->9524 9551 40c268 9550->9551 9552 40c0a7 51 API calls 9551->9552 9553 40c278 9552->9553 9553->8587 9555 40c6e5 9554->9555 11035 40c69c 9555->11035 9558 40c69c 51 API calls 9559 40c6fc 9558->9559 9560 40c69c 51 API calls 9559->9560 9561 40c706 9560->9561 9561->8587 9563 401578 9562->9563 9564 407de8 GetWindowsDirectoryA 9563->9564 9565 407e00 9564->9565 9566 407e2c 9564->9566 9565->9566 9567 401d80 5 API calls 9565->9567 9566->8587 9568 407e18 9567->9568 9569 403fd6 16 API calls 9568->9569 9570 407e27 9569->9570 9571 401840 LocalFree 9570->9571 9571->9566 9573 406c5f 9572->9573 11044 406a85 RegOpenKeyA 9573->11044 9575 406c6f 9575->8587 9577 40dede 9576->9577 9578 401cf9 6 API calls 9577->9578 9579 40def8 9578->9579 9580 40df15 9579->9580 9581 4042bb 46 API calls 9579->9581 9582 404306 51 API calls 9580->9582 9583 40df10 9581->9583 9584 40df2c 9582->9584 9585 401840 LocalFree 9583->9585 9584->8587 9585->9580 9587 406a5c 9586->9587 9588 404306 51 API calls 9587->9588 9589 406a76 9588->9589 9589->8587 9591 4065da 9590->9591 11054 406367 RegOpenKeyA 9591->11054 9593 4065ea 9593->8587 9595 40db5a 9594->9595 11065 40d964 RegOpenKeyA 9595->11065 9598 40d964 14 API calls 9599 40db82 9598->9599 9599->8587 9601 4072da 9600->9601 11076 4070e6 RegOpenKeyA 9601->11076 9604 4070e6 14 API calls 9605 407302 9604->9605 9605->8587 9607 406957 9606->9607 9608 404306 51 API calls 9607->9608 9609 406978 9608->9609 9610 401cf9 6 API calls 9609->9610 9611 40698f 9610->9611 9612 4069b7 9611->9612 9613 401dd4 6 API calls 9611->9613 9612->8587 9614 40699e 9613->9614 9615 4042bb 46 API calls 9614->9615 9616 4069b2 9615->9616 9617 401840 LocalFree 9616->9617 9617->9612 9619 40d2d6 9618->9619 11087 40cfdc RegOpenKeyA 9619->11087 9622 40cfdc 16 API calls 9623 40d2fe 9622->9623 11099 40d235 9623->11099 9626 40d235 21 API calls 9627 40d319 9626->9627 9627->8587 9632 40c9d6 9628->9632 9629 40ca24 9631 401e39 7 API calls 9629->9631 9630 40c9e4 StrStrIA 9630->9632 9633 40ca2b 9631->9633 9632->9629 9632->9630 9634 4023b3 9 API calls 9632->9634 9639 4042bb 46 API calls 9632->9639 9645 401840 LocalFree 9632->9645 9635 40ca53 9633->9635 9636 401dd4 6 API calls 9633->9636 9634->9632 9637 401e39 7 API calls 9635->9637 9638 40ca3a 9636->9638 9642 40ca5a 9637->9642 9640 4042bb 46 API calls 9638->9640 9639->9632 9643 40ca4e 9640->9643 9641 40ca82 9641->8587 9642->9641 9644 401dd4 6 API calls 9642->9644 9646 401840 LocalFree 9643->9646 9647 40ca69 9644->9647 9645->9632 9646->9635 9648 4042bb 46 API calls 9647->9648 9649 40ca7d 9648->9649 9650 401840 LocalFree 9649->9650 9650->9641 9652 40a1d3 9651->9652 9653 404306 51 API calls 9652->9653 9654 40a1ed 9653->9654 9655 404306 51 API calls 9654->9655 9656 40a204 9655->9656 9656->8587 9670 401e39 9657->9670 9660 4076ba 9660->8677 9661 401dd4 6 API calls 9662 407677 9661->9662 9679 4042bb 9662->9679 9665 4042bb 46 API calls 9666 4076a1 9665->9666 9682 401857 LocalAlloc 9670->9682 9672 401e4a 9673 401e58 SHGetFolderPathA 9672->9673 9674 401e56 9672->9674 9673->9674 9675 401ea9 9673->9675 9676 401840 LocalFree 9674->9676 9675->9660 9675->9661 9677 401e76 9676->9677 9677->9675 9683 401cf9 9677->9683 9687 404110 9679->9687 9682->9672 9684 401d05 9683->9684 9685 401c15 6 API calls 9684->9685 9686 401d21 9685->9686 9686->9677 9688 40412f 9687->9688 9689 40412a 9687->9689 9690 401840 LocalFree 9688->9690 9689->9688 9692 404140 9689->9692 9693 40414f 9689->9693 9691 4042b7 9690->9691 9691->9665 9694 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9692->9694 9695 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9693->9695 9696 40414d 9694->9696 9695->9696 9697 404173 FindFirstFileA 9696->9697 9697->9688 9712 401e39 7 API calls 9711->9712 9713 40770e 9712->9713 9714 4077b9 9713->9714 9715 40772a 9713->9715 9716 401dd4 6 API calls 9713->9716 9714->8685 9717 401d80 5 API calls 9715->9717 9716->9715 9718 40773a 9717->9718 9742 403fd6 9718->9742 9721 401840 LocalFree 9722 40774e 9721->9722 9723 401d80 5 API calls 9722->9723 9724 40775b 9723->9724 9756 401f41 ExpandEnvironmentStringsA 9742->9756 9745 404043 9745->9721 9747 403ff5 9748 403ff9 9747->9748 9749 40403b 9747->9749 9769 401f85 9748->9769 9751 401840 LocalFree 9749->9751 9751->9745 9757 401f7a 9756->9757 9758 401f57 9756->9758 9757->9745 9763 401ebe 9757->9763 9759 401857 LocalAlloc 9758->9759 9760 401f5e ExpandEnvironmentStringsA 9759->9760 9760->9757 9761 401f72 9760->9761 9762 401840 LocalFree 9761->9762 9762->9757 9764 401ec9 9763->9764 9765 401ece 9763->9765 9764->9765 9766 401ed8 CreateFileA 9764->9766 9765->9747 9767 401f01 9766->9767 9768 401ef6 CloseHandle 9766->9768 9767->9747 9768->9767 9770 40186e 9769->9770 9791 4042d5 9784->9791 9787 4042d5 51 API calls 9788 40432f 9787->9788 9789 4042d5 51 API calls 9788->9789 9790 404342 9789->9790 9790->8698 9792 401e39 7 API calls 9791->9792 9793 4042e0 9792->9793 9794 404302 9793->9794 9795 401dd4 6 API calls 9793->9795 9794->9787 9796 4042ed 9795->9796 9797 4042bb 46 API calls 9796->9797 9798 4042fd 9797->9798 9799 401840 LocalFree 9798->9799 9799->9794 9801 401cf9 6 API calls 9800->9801 9802 40e7e2 9801->9802 9803 40e801 9802->9803 9807 40e77b 9802->9807 9803->8702 9806 401840 LocalFree 9806->9803 9814 40e745 9807->9814 9810 40e745 51 API calls 9811 40e7ac 9810->9811 9812 40e745 51 API calls 9811->9812 9813 40e7c3 9812->9813 9813->9806 9815 401e39 7 API calls 9814->9815 9816 40e750 9815->9816 9817 40e777 9816->9817 9818 401dd4 6 API calls 9816->9818 9817->9810 9819 40e75d 9818->9819 9820 404110 46 API calls 9819->9820 9821 40e772 9820->9821 9822 401840 LocalFree 9821->9822 9822->9817 9823->8706 9825 404bb7 9824->9825 9827 404a95 9824->9827 9825->8711 9826 404aae 9829 401cf9 6 API calls 9826->9829 9827->9826 9828 401dd4 6 API calls 9827->9828 9828->9826 9830 404ac8 9829->9830 9831 404aea 9830->9831 9833 401d80 5 API calls 9830->9833 9832 401cf9 6 API calls 9831->9832 9834 404b00 9832->9834 9835 404ad6 9833->9835 9836 404b22 9834->9836 9838 401d80 5 API calls 9834->9838 9837 404a71 16 API calls 9835->9837 9839 401cf9 6 API calls 9836->9839 9840 404ae0 9837->9840 9841 404b0e 9838->9841 9843 401840 LocalFree 9840->9843 9880 408d73 9879->9880 9887 408ca8 9879->9887 9880->8781 9881 408caf RegEnumKeyExA 9882 408cd8 RegCloseKey 9881->9882 9881->9887 9882->9880 9884 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9884->9887 9885 401cf9 6 API calls 9885->9887 9887->9881 9887->9884 9887->9885 9888 408c88 11 API calls 9887->9888 9889 401840 LocalFree 9887->9889 9905 403fad 9887->9905 9888->9887 9889->9887 9891 408eb5 9890->9891 9903 408d97 9890->9903 9891->8785 9892 408d9e RegEnumKeyExA 9893 408dc7 RegCloseKey 9892->9893 9892->9903 9893->9891 9895 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9895->9903 9896 401840 LocalFree 9896->9903 9897 401cf9 6 API calls 9897->9903 9900 408d77 55 API calls 9900->9903 9901 4042bb 46 API calls 9904 408e1b 9901->9904 9902 401840 LocalFree 9902->9903 9903->9892 9903->9895 9903->9896 9903->9897 9903->9900 9903->9904 9912 4023b3 9903->9912 9904->9901 9904->9902 9922 401f06 9904->9922 9906 403fd2 9905->9906 9907 403fb6 9905->9907 9906->9887 9907->9906 9909 401553 9907->9909 9910 40155c lstrlen 9909->9910 9911 401566 9909->9911 9910->9911 9911->9906 9913 401d80 5 API calls 9912->9913 9914 4023c2 lstrlen 9913->9914 9915 4023e0 StrStrIA 9914->9915 9916 4023d1 9914->9916 9917 4023f3 StrRChrIA 9915->9917 9918 4023ef 9915->9918 9916->9915 9919 402401 lstrlen 9917->9919 9918->9917 9921 402414 9919->9921 9921->9903 9923 401f10 9922->9923 9924 401f15 9922->9924 9923->9924 9925 401f1e GetFileAttributesA 9923->9925 9924->9904 9926 401f2b 9925->9926 9926->9904 9928 40e4e3 9927->9928 9929 40e4df 9927->9929 9938 401857 LocalAlloc 9928->9938 9929->8790 9931 40e4ed lstrlen 9933 40e517 9931->9933 9934 40e52c 9931->9934 9935 4042bb 46 API calls 9933->9935 9936 401840 LocalFree 9934->9936 9935->9934 9937 40e534 9936->9937 9937->8790 9938->9931 9952 40c071 9939->9952 9942 40c071 51 API calls 9943 40c0d8 9942->9943 9944 40c071 51 API calls 9943->9944 9945 40c0ef 9944->9945 9946 40c071 51 API calls 9945->9946 9947 40c106 9946->9947 9948 40c071 51 API calls 9947->9948 9949 40c11d 9948->9949 9950 40c071 51 API calls 9949->9950 9951 40c134 9950->9951 9953 401e39 7 API calls 9952->9953 9954 40c07c 9953->9954 9955 40c0a3 9954->9955 9956 401dd4 6 API calls 9954->9956 9955->9942 9957 40c089 9956->9957 9958 404110 46 API calls 9957->9958 9959 40c09e 9958->9959 9960 401840 LocalFree 9959->9960 9960->9955 9962 406332 9961->9962 9968 406171 9961->9968 9962->8806 9963 406178 RegEnumKeyExA 9964 4061a1 RegCloseKey 9963->9964 9963->9968 9964->9962 9966 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9966->9968 9967 401cf9 6 API calls 9967->9968 9968->9963 9968->9966 9968->9967 9969 401840 LocalFree 9968->9969 9970 401553 lstrlen 9968->9970 9971 40614e 11 API calls 9968->9971 9969->9968 9970->9968 9971->9968 9973 409c12 9972->9973 9974 409bbb 9972->9974 10003 401857 LocalAlloc 9973->10003 9975 401cf9 6 API calls 9974->9975 9977 409bcd 9975->9977 9977->9973 9981 4023b3 9 API calls 9977->9981 9978 409c1c RegOpenKeyA 9979 409ca2 9978->9979 9980 409c32 9978->9980 9982 401840 LocalFree 9979->9982 9983 409c39 RegEnumKeyExA 9980->9983 9988 401d80 5 API calls 9980->9988 9993 401dd4 6 API calls 9980->9993 9996 409ba6 79 API calls 9980->9996 10000 401840 LocalFree 9980->10000 9985 409bd8 9981->9985 9986 409caa 9982->9986 9983->9980 9984 409c5e RegCloseKey 9983->9984 9984->9979 9989 409c0d 9985->9989 9991 401e39 7 API calls 9985->9991 9986->8817 9988->9980 9990 401840 LocalFree 9989->9990 9990->9973 9992 409be6 9991->9992 9994 409c05 9992->9994 9995 401dd4 6 API calls 9992->9995 9993->9980 9997 401840 LocalFree 9994->9997 9998 409bf3 9995->9998 9996->9980 9997->9989 10004 409a2b 9998->10004 10000->9980 10003->9978 10005 401f06 GetFileAttributesA 10004->10005 10049 4060b1 10048->10049 10056 405ed9 10048->10056 10049->8831 10050 405ee0 RegEnumKeyExA 10051 405f09 RegCloseKey 10050->10051 10050->10056 10051->10049 10053 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10053->10056 10054 401cf9 6 API calls 10054->10056 10055 401840 LocalFree 10055->10056 10056->10050 10056->10053 10056->10054 10056->10055 10057 401553 lstrlen 10056->10057 10057->10056 10059 401583 10058->10059 10059->8836 10061 404dfc 10060->10061 10064 404df7 10060->10064 10062 401840 LocalFree 10061->10062 10063 404f65 10062->10063 10063->8859 10064->10061 10065 404e1c 10064->10065 10066 404e0d 10064->10066 10067 401d80 5 API calls 10065->10067 10068 401d80 5 API calls 10066->10068 10069 404e1a 10067->10069 10068->10069 10070 404e40 FindFirstFileA 10069->10070 10070->10061 10071 404e5f 10070->10071 10072 404ed2 StrStrIA 10071->10072 10073 404e6d lstrcmpiA 10071->10073 10077 401d80 5 API calls 10071->10077 10079 401dd4 6 API calls 10071->10079 10081 404f10 StrStrIA 10071->10081 10084 404f27 10071->10084 10072->10071 10077->10071 10079->10071 10081->10071 10089 401e39 7 API calls 10088->10089 10090 404f7e 10089->10090 10091 404f99 10090->10091 10093 401d80 5 API calls 10090->10093 10092 404ddd 31 API calls 10091->10092 10094 404fa9 10092->10094 10095 404f90 10093->10095 10096 401840 LocalFree 10094->10096 10097 401840 LocalFree 10095->10097 10098 404fb1 10096->10098 10097->10091 10147 4057ae 10102->10147 10148 401cf9 6 API calls 10147->10148 10149 4057c7 10148->10149 10150 401cf9 6 API calls 10149->10150 10151 4057dd 10150->10151 10152 401cf9 6 API calls 10151->10152 10153 4057f3 10152->10153 10154 401cf9 6 API calls 10153->10154 10155 40580b 10154->10155 10156 401cf9 6 API calls 10155->10156 10157 405821 10156->10157 10158 401cf9 6 API calls 10157->10158 10160 405839 10158->10160 10164 401553 lstrlen 10160->10164 10181 4058b5 10160->10181 10192 4042bb 46 API calls 10191->10192 10193 405bee 10192->10193 10194 4042bb 46 API calls 10193->10194 10195 405c03 10194->10195 10195->8917 10197 401e39 7 API calls 10196->10197 10198 405d5d 10197->10198 10199 405daf 10198->10199 10200 401dd4 6 API calls 10198->10200 10199->8938 10201 405d6c 10200->10201 10202 4042bb 46 API calls 10201->10202 10203 405d82 10202->10203 10204 4042bb 46 API calls 10203->10204 10205 405d96 10204->10205 10206 4042bb 46 API calls 10205->10206 10207 405daa 10206->10207 10208 401840 LocalFree 10207->10208 10208->10199 10210 40e2e6 10209->10210 10211 40e1be 10209->10211 10210->8946 10212 401cf9 6 API calls 10211->10212 10213 40e1d0 10212->10213 10214 401cf9 6 API calls 10213->10214 10215 40e1e5 10214->10215 10216 401cf9 6 API calls 10215->10216 10217 40e1fc 10216->10217 10218 401cf9 6 API calls 10217->10218 10219 40e211 10218->10219 10220 401cf9 6 API calls 10219->10220 10224 40e226 10220->10224 10221 40e2b6 10222 401840 LocalFree 10221->10222 10224->10221 10252 404346 10224->10252 10230 40e259 10230->10221 10243 40e30a 10242->10243 10244 40e3af 10242->10244 10245 40e311 RegEnumValueA 10243->10245 10248 401cf9 6 API calls 10243->10248 10249 40e36c StrStrIA 10243->10249 10251 401840 LocalFree 10243->10251 10258 40e068 10243->10258 10244->8950 10245->10243 10246 40e33f RegCloseKey 10245->10246 10246->10244 10248->10243 10249->10243 10251->10243 10253 4043cb 10252->10253 10254 40436f 10252->10254 10253->10230 10254->10253 10255 40438c CryptUnprotectData 10254->10255 10255->10253 10259 401ebe 2 API calls 10258->10259 10260 40e077 10259->10260 10261 40e07b 10260->10261 10262 401f85 7 API calls 10260->10262 10261->10243 10263 40e08c 10262->10263 10264 40e19a 10263->10264 10278 401857 LocalAlloc 10263->10278 10264->10243 10266 40e0b5 StrStrA 10267 40e0c9 lstrlen StrStrA 10266->10267 10269 40e0c4 10266->10269 10267->10269 10272 401840 LocalFree 10269->10272 10270 40e09c 10270->10266 10270->10269 10275 404346 2 API calls 10270->10275 10276 401840 LocalFree 10270->10276 10277 401553 lstrlen 10270->10277 10279 4029a5 lstrlen 10270->10279 10275->10270 10276->10270 10277->10270 10278->10270 10280 401857 LocalAlloc 10279->10280 10283 401e39 7 API calls 10282->10283 10284 405292 10283->10284 10285 405329 10284->10285 10286 401d80 5 API calls 10284->10286 10285->8967 10287 4052aa 10286->10287 10288 40514d 29 API calls 10287->10288 10289 4052b9 10288->10289 10290 401840 LocalFree 10289->10290 10291 4052be 10290->10291 10292 401d80 5 API calls 10291->10292 10293 4052cb 10292->10293 10294 40514d 29 API calls 10293->10294 10295 4052da 10294->10295 10296 401840 LocalFree 10295->10296 10312 401cf9 6 API calls 10311->10312 10314 405127 10312->10314 10313 405149 10314->10313 10315 401840 LocalFree 10314->10315 10315->10313 10317 405167 10316->10317 10318 40516c 10316->10318 10317->10318 10320 401d80 5 API calls 10317->10320 10319 401840 LocalFree 10318->10319 10321 405280 10319->10321 10322 40517c 10320->10322 10321->8961 10340 4050ec 10322->10340 10325 401840 LocalFree 10326 40518b 10325->10326 10327 401d80 5 API calls 10326->10327 10328 405198 10327->10328 10329 4051af FindFirstFileA 10328->10329 10329->10318 10330 4051ce 10329->10330 10331 405250 FindNextFileA 10330->10331 10332 4051dc lstrcmpiA 10330->10332 10331->10330 10333 40526a FindClose 10331->10333 10334 4051f6 lstrcmpiA 10332->10334 10338 4051f4 10332->10338 10333->10318 10334->10338 10338->10331 10341 403fd6 16 API calls 10340->10341 10342 4050ff 10341->10342 10342->10325 10360 401857 LocalAlloc 10343->10360 10345 40e976 RegOpenKeyA 10346 40ea9e 10345->10346 10359 40e993 10345->10359 10347 401840 LocalFree 10346->10347 10350 40eaa9 10347->10350 10348 40e99a RegEnumKeyExA 10349 40e9c3 RegCloseKey 10348->10349 10348->10359 10349->10346 10350->8991 10352 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10352->10359 10353 401cf9 6 API calls 10353->10359 10354 40e963 50 API calls 10354->10359 10355 401d80 5 API calls 10356 40ea24 GetPrivateProfileStringA 10355->10356 10356->10359 10357 401840 LocalFree 10357->10359 10358 4042bb 46 API calls 10358->10359 10359->10348 10359->10352 10359->10353 10359->10354 10359->10355 10359->10357 10359->10358 10360->10345 10362 401e39 7 API calls 10361->10362 10363 408b96 10362->10363 10364 408ba9 10363->10364 10391 408a4f 10363->10391 10364->8999 10367 401840 LocalFree 10367->10364 10369 4088ea 10368->10369 10372 4088e5 10368->10372 10370 401840 LocalFree 10369->10370 10371 408a4b 10370->10371 10372->10369 10373 40890a 10372->10373 10374 4088fb 10372->10374 10375 401d80 5 API calls 10373->10375 10376 401d80 5 API calls 10374->10376 10392 408a69 10391->10392 10393 408a6e 10391->10393 10392->10393 10395 401d80 5 API calls 10392->10395 10394 401840 LocalFree 10393->10394 10396 408b87 10394->10396 10397 408a80 10395->10397 10396->10367 10398 408a97 FindFirstFileA 10397->10398 10398->10393 10403 408ab6 10398->10403 10399 408b57 FindNextFileA 10402 408b71 FindClose 10399->10402 10399->10403 10400 408ac8 lstrcmpiA 10401 408ae2 lstrcmpiA 10400->10401 10400->10403 10401->10403 10402->10393 10403->10399 10403->10400 10404 401d80 5 API calls 10403->10404 10405 401dd4 6 API calls 10403->10405 10404->10403 10406 408b24 StrStrIA 10405->10406 10407 408b52 10406->10407 10408 408b3f 10406->10408 10410 401840 LocalFree 10407->10410 10409 4088cb 43 API calls 10408->10409 10409->10407 10410->10399 10456 40f667 10455->10456 10457 40f681 10455->10457 10456->10457 10479 40a3c8 10456->10479 10459 40f277 RegOpenKeyA 10457->10459 10460 40f312 10459->10460 10467 40f293 10459->10467 10460->9044 10461 40f29a RegEnumKeyExA 10462 40f2c3 RegCloseKey 10461->10462 10461->10467 10462->10460 10464 401d80 5 API calls 10464->10467 10465 401dd4 6 API calls 10465->10467 10467->10461 10467->10464 10467->10465 10468 401840 LocalFree 10467->10468 10487 40f0e2 10467->10487 10468->10467 10470 40f3bc 10469->10470 10478 40f336 10469->10478 10470->9048 10471 40f33d RegEnumKeyExA 10472 40f366 RegCloseKey 10471->10472 10471->10478 10472->10470 10474 401d80 5 API calls 10474->10478 10475 401dd4 6 API calls 10475->10478 10476 40f277 23 API calls 10476->10478 10477 401840 LocalFree 10477->10478 10478->10471 10478->10474 10478->10475 10478->10476 10478->10477 10481 40a3e8 10479->10481 10480 40a43d 10480->10457 10481->10480 10483 40a332 10481->10483 10484 40a355 10483->10484 10485 40a3b2 10484->10485 10486 40a2ac 757283B0 10484->10486 10485->10481 10486->10484 10490 40f0f2 10487->10490 10488 401cf9 6 API calls 10488->10490 10490->10488 10491 401840 LocalFree 10490->10491 10495 40f12e 10490->10495 10506 40f098 10490->10506 10491->10490 10492 401cf9 6 API calls 10492->10495 10493 401553 lstrlen 10493->10495 10494 401cf9 6 API calls 10501 40f185 10494->10501 10495->10492 10495->10493 10496 401840 LocalFree 10495->10496 10495->10501 10496->10495 10497 401840 LocalFree 10497->10501 10498 40f098 6 API calls 10498->10501 10499 401cf9 6 API calls 10504 40f206 10499->10504 10500 404346 2 API calls 10500->10501 10501->10494 10501->10497 10501->10498 10501->10500 10501->10504 10502 40f25d 10502->10467 10503 401553 lstrlen 10503->10504 10504->10499 10504->10502 10504->10503 10505 401840 LocalFree 10504->10505 10505->10504 10507 402a43 LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte IsTextUnicode 10506->10507 10509 40f0a9 10507->10509 10508 40f0d9 10508->10490 10509->10508 10510 401553 lstrlen 10509->10510 10511 40f0c6 10510->10511 10512 401553 lstrlen 10511->10512 10513 40f0d1 10512->10513 10514 401840 LocalFree 10513->10514 10514->10508 10515->9074 10516->9083 10518 40ee14 10517->10518 10524 40eb2d 10517->10524 10518->9110 10519 40eb34 RegEnumKeyExA 10520 40eb5d RegCloseKey 10519->10520 10519->10524 10520->10518 10522 401d80 5 API calls 10522->10524 10523 401dd4 6 API calls 10523->10524 10524->10519 10524->10522 10524->10523 10525 401cf9 6 API calls 10524->10525 10526 40eb0d 15 API calls 10524->10526 10527 401553 lstrlen 10524->10527 10528 401840 LocalFree 10524->10528 10525->10524 10526->10524 10527->10524 10528->10524 10530 40a8ae 10529->10530 10534 40a804 10529->10534 10531 40a67c 17 API calls 10530->10531 10532 40a8d3 10531->10532 10538 40a8d7 10532->10538 10533 40a866 StrStrIW 10533->10534 10534->10530 10534->10533 10547 40a67c lstrlenW 10534->10547 10536 40a896 757283B0 10536->10534 10537 40a8a4 757283B0 10536->10537 10537->10534 10540 40a8e7 10538->10540 10539 40aa0d 10539->9118 10540->10539 10541 40a92c CredEnumerateA 10540->10541 10541->10539 10544 40a957 10541->10544 10542 40aa04 CredFree 10542->10539 10543 40a973 lstrlenW CryptUnprotectData 10543->10544 10544->10539 10544->10542 10544->10543 10545 40a9e6 LocalFree 10544->10545 10571 40a48c 10544->10571 10545->10544 10548 40a68f 10547->10548 10553 40a694 10547->10553 10548->10536 10549 40a6f2 wsprintfA 10552 401dd4 6 API calls 10549->10552 10550 40a6c5 wsprintfA 10551 401dd4 6 API calls 10550->10551 10551->10553 10554 40a719 10552->10554 10553->10549 10553->10550 10555 401cf9 6 API calls 10554->10555 10556 40a733 10555->10556 10557 40a7d2 10556->10557 10559 40a748 lstrlenW 10556->10559 10560 40a7ca 10556->10560 10558 401840 LocalFree 10557->10558 10562 40a7da 10558->10562 10559->10560 10563 40a77a CryptUnprotectData 10559->10563 10561 401840 LocalFree 10560->10561 10561->10557 10562->10536 10563->10560 10564 40a798 10563->10564 10564->10560 10567 40a453 10564->10567 10568 4014f1 10567->10568 10575 4014f1 10571->10575 10573 40a49a lstrlen 10574 40a4af 10573->10574 10574->10545 10576 401502 10575->10576 10576->10573 10578 40808a 10577->10578 10585 407e96 10577->10585 10578->9128 10579 407e9d RegEnumKeyExA 10580 407ec6 RegCloseKey 10579->10580 10579->10585 10580->10578 10582 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10582->10585 10583 401840 LocalFree 10583->10585 10584 401cf9 6 API calls 10584->10585 10585->10579 10585->10582 10585->10583 10585->10584 10586 401553 lstrlen 10585->10586 10587 407e76 11 API calls 10585->10587 10586->10585 10587->10585 10589 401e39 7 API calls 10588->10589 10590 40d8da 10589->10590 10591 40d907 10590->10591 10592 401dd4 6 API calls 10590->10592 10591->9178 10593 40d8e9 10592->10593 10594 404110 46 API calls 10593->10594 10595 40d902 10594->10595 10596 401840 LocalFree 10595->10596 10596->10591 10598 407d86 10597->10598 10604 407b44 10597->10604 10598->9188 10599 407b4b RegEnumKeyExA 10600 407b74 RegCloseKey 10599->10600 10599->10604 10600->10598 10602 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10602->10604 10603 401cf9 6 API calls 10603->10604 10604->10599 10604->10602 10604->10603 10605 401553 lstrlen 10604->10605 10606 401840 LocalFree 10604->10606 10607 407b24 11 API calls 10604->10607 10605->10604 10606->10604 10607->10604 10609 401e39 7 API calls 10608->10609 10610 408f48 10609->10610 10611 408f85 10610->10611 10612 401dd4 6 API calls 10610->10612 10611->9198 10613 408f57 10612->10613 10614 4042bb 46 API calls 10613->10614 10615 408f6c 10614->10615 10616 4042bb 46 API calls 10615->10616 10617 408f80 10616->10617 10618 401840 LocalFree 10617->10618 10618->10611 10620 40ccd0 10619->10620 10621 40cc54 10619->10621 10620->9226 10621->10620 10622 40cc66 CredEnumerateA 10621->10622 10622->10620 10623 40cc8d 10622->10623 10623->10620 10624 40ccc7 CredFree 10623->10624 10626 40cb93 10623->10626 10624->10620 10627 40cba6 10626->10627 10628 401553 lstrlen 10627->10628 10629 40cbb1 10628->10629 10630 401553 lstrlen 10629->10630 10631 40cbbc 10630->10631 10632 40cbca StrStrIA 10631->10632 10633 40cbdb lstrlen StrStrIA 10632->10633 10638 40cc27 10632->10638 10634 40cbf9 10633->10634 10639 403730 inet_addr 10634->10639 10638->10623 10640 403740 gethostbyname 10639->10640 10641 40374c 10639->10641 10640->10641 10643 40de01 10642->10643 10649 40dbec 10642->10649 10643->9236 10644 40dbf3 RegEnumKeyExA 10645 40dc1c RegCloseKey 10644->10645 10644->10649 10645->10643 10647 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10647->10649 10648 401cf9 6 API calls 10648->10649 10649->10644 10649->10647 10649->10648 10650 40dbcc 11 API calls 10649->10650 10651 401553 lstrlen 10649->10651 10652 401840 LocalFree 10649->10652 10650->10649 10651->10649 10652->10649 10654 40d6fc 10653->10654 10661 40d54d 10653->10661 10654->9259 10655 40d554 RegEnumKeyExA 10656 40d57d RegCloseKey 10655->10656 10655->10661 10656->10654 10658 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10658->10661 10659 401cf9 6 API calls 10659->10661 10660 40d52a 11 API calls 10660->10661 10661->10655 10661->10658 10661->10659 10661->10660 10662 401553 lstrlen 10661->10662 10663 401840 LocalFree 10661->10663 10662->10661 10663->10661 10665 40687b 10664->10665 10670 40661c 10664->10670 10665->9268 10666 406623 RegEnumKeyExA 10667 40664c RegCloseKey 10666->10667 10666->10670 10667->10665 10669 401d80 5 API calls 10669->10670 10670->10666 10670->10669 10671 401dd4 6 API calls 10670->10671 10672 401cf9 6 API calls 10670->10672 10673 404346 2 API calls 10670->10673 10674 401840 LocalFree 10670->10674 10675 401553 lstrlen 10670->10675 10671->10670 10672->10670 10673->10670 10674->10670 10675->10670 10677 4049fb 10676->10677 10684 4048a8 10676->10684 10677->9274 10678 4048af RegEnumKeyExA 10679 4048d8 RegCloseKey 10678->10679 10678->10684 10679->10677 10681 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10681->10684 10682 401cf9 6 API calls 10682->10684 10683 401840 LocalFree 10683->10684 10684->10678 10684->10681 10684->10682 10684->10683 10685 401553 lstrlen 10684->10685 10686 404885 11 API calls 10684->10686 10685->10684 10686->10684 10688 404881 10687->10688 10693 40479a 10687->10693 10688->9280 10689 4047a1 RegEnumValueA 10690 4047cf RegCloseKey 10689->10690 10689->10693 10690->10688 10692 4047eb StrStrIA 10692->10693 10693->10689 10693->10692 10694 401cf9 6 API calls 10693->10694 10695 401840 LocalFree 10693->10695 10694->10693 10695->10693 10697 401cf9 6 API calls 10696->10697 10698 40eef0 10697->10698 10699 40ef0a 10698->10699 10724 40ee61 10698->10724 10701 401cf9 6 API calls 10699->10701 10703 40ef1e 10701->10703 10704 40ef38 10703->10704 10706 40ee61 46 API calls 10703->10706 10725 4042bb 46 API calls 10724->10725 10726 40ee7c 10725->10726 10727 4042bb 46 API calls 10726->10727 10738 40af78 10737->10738 10745 40ae64 10737->10745 10738->9305 10739 40ae6b RegEnumKeyExA 10740 40ae94 RegCloseKey 10739->10740 10739->10745 10740->10738 10742 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10742->10745 10743 401cf9 6 API calls 10743->10745 10744 40ae41 21 API calls 10744->10745 10745->10739 10745->10742 10745->10743 10745->10744 10747 401840 LocalFree 10745->10747 10748 40aba8 10745->10748 10747->10745 10811 401857 LocalAlloc 10748->10811 10750 40abb8 10812 401857 LocalAlloc 10750->10812 10752 40abc5 10813 401857 LocalAlloc 10752->10813 10754 40abd2 10814 401857 LocalAlloc 10754->10814 10756 40abdf 10815 401857 LocalAlloc 10756->10815 10758 40abec 10816 401857 LocalAlloc 10758->10816 10760 40abf9 10811->10750 10812->10752 10813->10754 10814->10756 10815->10758 10816->10760 10826 4074ef 10825->10826 10833 407331 10825->10833 10826->9328 10827 407338 RegEnumKeyExA 10828 407361 RegCloseKey 10827->10828 10827->10833 10828->10826 10830 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10830->10833 10831 401cf9 6 API calls 10831->10833 10832 401840 LocalFree 10832->10833 10833->10827 10833->10830 10833->10831 10833->10832 10834 401553 lstrlen 10833->10834 10835 407311 11 API calls 10833->10835 10834->10833 10835->10833 10837 406ea9 10836->10837 10843 406cdc 10836->10843 10837->9368 10838 406ce3 RegEnumKeyExA 10839 406d0c RegCloseKey 10838->10839 10838->10843 10839->10837 10841 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10841->10843 10842 401cf9 6 API calls 10842->10843 10843->10838 10843->10841 10843->10842 10844 401840 LocalFree 10843->10844 10845 404346 2 API calls 10843->10845 10846 401553 lstrlen 10843->10846 10844->10843 10845->10843 10846->10843 10848 401ebe 2 API calls 10847->10848 10849 406f34 10848->10849 10850 406f38 10849->10850 10851 406f3d 10849->10851 10874 4075eb 10873->10874 10880 40755c 10873->10880 10874->9410 10875 407563 RegEnumValueA 10876 40758c RegCloseKey 10875->10876 10875->10880 10876->10874 10878 401cf9 6 API calls 10878->10880 10879 401840 LocalFree 10879->10880 10880->10875 10880->10878 10880->10879 10882 401cf9 6 API calls 10881->10882 10883 405e0f 10882->10883 10884 405e28 10883->10884 10885 4042bb 46 API calls 10883->10885 10886 401cf9 6 API calls 10884->10886 10887 405e23 10885->10887 10888 405e3e 10886->10888 10889 401840 LocalFree 10887->10889 10890 405e57 10888->10890 10892 4042bb 46 API calls 10888->10892 10889->10884 10891 404306 51 API calls 10890->10891 10893 405e6a 10891->10893 10894 405e52 10892->10894 10893->9420 10895 401840 LocalFree 10894->10895 10895->10890 10897 401e39 7 API calls 10896->10897 10898 4079a8 10897->10898 10899 4079e5 10898->10899 10900 401dd4 6 API calls 10898->10900 10899->9447 10901 4079b7 10900->10901 10902 4042bb 46 API calls 10901->10902 10903 4079cc 10902->10903 10904 4042bb 46 API calls 10903->10904 10905 4079e0 10904->10905 10906 401840 LocalFree 10905->10906 10906->10899 10908 407852 10907->10908 10909 407999 10907->10909 10910 407859 RegEnumKeyExA 10908->10910 10913 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 10908->10913 10914 401840 LocalFree 10908->10914 10915 401cf9 6 API calls 10908->10915 10916 4042bb 46 API calls 10908->10916 10917 407832 50 API calls 10908->10917 10909->9456 10910->10908 10911 407882 RegCloseKey 10910->10911 10911->10909 10913->10908 10914->10908 10915->10908 10916->10908 10917->10908 10919 404432 10918->10919 10920 4043f4 GetProcAddress 10918->10920 10919->9463 10920->10919 10921 404403 GetProcAddress 10920->10921 10921->10919 10922 404414 GetCurrentProcess 10921->10922 10923 404422 10922->10923 10923->9463 10923->10919 10924->9465 10926 401535 10925->10926 10926->9467 10928 40444b 10927->10928 10929 40445d 10927->10929 10928->10929 10930 404464 AllocateAndInitializeSid 10928->10930 10929->9470 10931 4044a5 10930->10931 10932 4044a7 CheckTokenMembership 10930->10932 10931->9470 10972 401e39 7 API calls 10971->10972 10973 40c5f4 10972->10973 10974 40c621 10973->10974 10975 401dd4 6 API calls 10973->10975 10976 401e39 7 API calls 10974->10976 10977 40c603 10975->10977 10978 40c629 10976->10978 10979 404110 46 API calls 10977->10979 10980 40c656 10978->10980 10982 401dd4 6 API calls 10978->10982 10981 40c61c 10979->10981 10980->9502 10984 401840 LocalFree 10981->10984 10983 40c638 10982->10983 10985 404110 46 API calls 10983->10985 10984->10974 10986 40c651 10985->10986 10987 401840 LocalFree 10986->10987 10987->10980 10989 401cf9 6 API calls 10988->10989 10990 405448 10989->10990 10991 4054a8 10990->10991 10992 401d80 5 API calls 10990->10992 10991->9514 10993 40545c 10992->10993 11016 40540f 10993->11016 10996 401d80 5 API calls 10997 405477 10996->10997 10998 40540f 16 API calls 10997->10998 10999 405485 10998->10999 11000 401d80 5 API calls 10999->11000 11001 405492 11000->11001 11002 40540f 16 API calls 11001->11002 11017 405418 11016->11017 11018 40542e 11016->11018 11019 403fd6 16 API calls 11017->11019 11018->10996 11020 405426 11019->11020 11021 401840 LocalFree 11020->11021 11021->11018 11036 401e39 7 API calls 11035->11036 11037 40c6a7 11036->11037 11038 40c6cf 11037->11038 11039 401dd4 6 API calls 11037->11039 11038->9558 11040 40c6b6 11039->11040 11041 4042bb 46 API calls 11040->11041 11042 40c6ca 11041->11042 11043 401840 LocalFree 11042->11043 11043->11038 11045 406c49 11044->11045 11050 406aa8 11044->11050 11045->9575 11046 406aaf RegEnumKeyExA 11047 406ad8 RegCloseKey 11046->11047 11046->11050 11047->11045 11049 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11049->11050 11050->11046 11050->11049 11051 401cf9 6 API calls 11050->11051 11052 401840 LocalFree 11050->11052 11053 401553 lstrlen 11050->11053 11051->11050 11052->11050 11053->11050 11055 4065c4 11054->11055 11062 40638a 11054->11062 11055->9593 11056 406391 RegEnumKeyExA 11057 4063ba RegCloseKey 11056->11057 11056->11062 11057->11055 11059 401d80 5 API calls 11059->11062 11060 401dd4 6 API calls 11060->11062 11061 401cf9 6 API calls 11061->11062 11062->11056 11062->11059 11062->11060 11062->11061 11063 401840 LocalFree 11062->11063 11064 401553 lstrlen 11062->11064 11063->11062 11064->11062 11066 40db44 11065->11066 11075 40d984 11065->11075 11066->9598 11067 40d98b RegEnumKeyExA 11068 40d9b4 RegCloseKey 11067->11068 11067->11075 11068->11066 11070 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11070->11075 11071 401840 LocalFree 11071->11075 11072 401cf9 6 API calls 11072->11075 11073 40d964 11 API calls 11073->11075 11074 401553 lstrlen 11074->11075 11075->11067 11075->11070 11075->11071 11075->11072 11075->11073 11075->11074 11077 4072c4 11076->11077 11086 407106 11076->11086 11077->9604 11078 40710d RegEnumKeyExA 11079 407136 RegCloseKey 11078->11079 11078->11086 11079->11077 11081 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11081->11086 11082 401cf9 6 API calls 11082->11086 11083 401553 lstrlen 11083->11086 11084 401840 LocalFree 11084->11086 11085 4070e6 11 API calls 11085->11086 11086->11078 11086->11081 11086->11082 11086->11083 11086->11084 11086->11085 11088 40d231 11087->11088 11097 40cffc 11087->11097 11088->9622 11089 40d003 RegEnumKeyExA 11090 40d02c RegCloseKey 11089->11090 11089->11097 11090->11088 11092 401d80 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11092->11097 11093 401cf9 6 API calls 11093->11097 11094 404346 2 API calls 11094->11097 11095 401840 LocalFree 11095->11097 11096 40cfdc 13 API calls 11096->11097 11097->11089 11097->11092 11097->11093 11097->11094 11097->11095 11097->11096 11098 401553 lstrlen 11097->11098 11098->11097 11100 401cf9 6 API calls 11099->11100 11107 40d251 11100->11107 11101 40d2c0 11101->9626 11102 40d2bb 11103 401840 LocalFree 11102->11103 11103->11101 11104 40d273 wsprintfA 11105 401cf9 6 API calls 11104->11105 11105->11107 11106 403fd6 16 API calls 11106->11107 11107->11101 11107->11102 11107->11104 11107->11106 11108 401840 LocalFree 11107->11108 11108->11107 11110 401751 11109->11110 11111 401726 11109->11111 11110->8525 11112 40172e GlobalFix 11111->11112 11112->11110 11113 40173d 11112->11113 11116 40241f 11113->11116 11121 401857 LocalAlloc 11116->11121 11118 402433 11119 401840 LocalFree 11118->11119 11120 401749 GlobalUnWire 11119->11120 11120->11110 11121->11118 11122->8536 11162 401857 LocalAlloc 11130->11162 11132 403d6a 11163 401857 LocalAlloc 11132->11163 11134 403d77 11162->11132 11163->11134 11215->8467 11217 403ce4 11216->11217 11224 403b69 11217->11224 11220 403d1c 11220->8250 11221 403b69 25 API calls 11222 403d13 11221->11222 11223 401840 LocalFree 11222->11223 11223->11220 11251 401857 LocalAlloc 11224->11251 11226 403b7d 11252 401857 LocalAlloc 11226->11252 11228 403b8a 11253 401857 LocalAlloc 11228->11253 11230 403b97 InternetCrackUrlA 11231 403bde 11230->11231 11244 403be4 11230->11244 11232 403be9 InternetCreateUrlA 11231->11232 11231->11244 11233 403c0e InternetCrackUrlA 11232->11233 11232->11244 11235 403c4f 11233->11235 11233->11244 11234 401840 LocalFree 11236 403cbf 11234->11236 11237 403c57 wsprintfA 11235->11237 11235->11244 11238 401840 LocalFree 11236->11238 11240 40376a 5 API calls 11237->11240 11239 403cc7 11238->11239 11241 401840 LocalFree 11239->11241 11242 403c7c 11240->11242 11243 403ccf 11241->11243 11242->11244 11245 403c82 lstrlen 11242->11245 11243->11220 11243->11221 11244->11234 11246 4037ee send 11245->11246 11251->11226 11252->11228 11253->11230 11254->8265 11255->8287 11256->8289 11257->8291 11258->8293 11382 40bba0 11383 40bbb7 11382->11383 11384 40bbae 11382->11384 11384->11383 11385 40bc32 CryptUnprotectData 11384->11385 11385->11383 11386 40bc65 11385->11386 11386->11383 11387 40bc89 LocalFree 11386->11387 11387->11383 11388 40bca1 11387->11388 11388->11383 11397 401857 LocalAlloc 11388->11397 11390 40bcbd 11391 40bcce lstrlen StrCmpNIA 11390->11391 11392 40bd02 11391->11392 11393 40bcea lstrlen StrCmpNIA 11391->11393 11394 40bd06 lstrlen StrCmpNIA 11392->11394 11396 40bd1e 11392->11396 11393->11392 11394->11396 11395 401840 LocalFree 11395->11383 11396->11395 11397->11390 11467 40f4af 11468 40a213 2 API calls 11467->11468 11469 40f4ca 11468->11469 11486 40a25e 11469->11486 11472 40f552 11473 40f654 11472->11473 11474 40f56c lstrcmpiA 11472->11474 11475 40f581 lstrcmpiA 11474->11475 11476 40f59a lstrcmpiA 11474->11476 11475->11476 11477 40f649 757283B0 11475->11477 11478 40f5f7 11476->11478 11479 40f5b9 lstrcmpiA 11476->11479 11477->11473 11481 40f603 11478->11481 11482 40f627 11478->11482 11479->11478 11480 40f5d8 lstrcmpiA 11479->11480 11480->11477 11480->11478 11490 40f3c0 11481->11490 11484 40f3c0 7 API calls 11482->11484 11484->11477 11485 40f625 11485->11477 11487 40a27d 11486->11487 11488 40a281 WideCharToMultiByte 757283B0 11487->11488 11489 40a2a8 WideCharToMultiByte 11487->11489 11488->11489 11489->11472 11512 402a32 11490->11512 11493 40f3d3 11493->11485 11494 40f3d8 wsprintfA 11495 40f472 11494->11495 11496 40f429 11494->11496 11499 401553 lstrlen 11495->11499 11515 402a43 11496->11515 11498 40f434 11504 401553 lstrlen 11498->11504 11511 40f470 11498->11511 11500 40f488 11499->11500 11502 401553 lstrlen 11500->11502 11501 401840 LocalFree 11503 40f4aa 11501->11503 11502->11511 11503->11485 11505 40f451 11504->11505 11506 401553 lstrlen 11505->11506 11507 40f45d 11506->11507 11508 401553 lstrlen 11507->11508 11509 40f468 11508->11509 11510 401840 LocalFree 11509->11510 11510->11511 11511->11501 11524 4029c6 11512->11524 11514 402a3f 11514->11493 11514->11494 11516 402a52 11515->11516 11517 402a4c 11515->11517 11516->11498 11517->11516 11518 402a58 IsTextUnicode 11517->11518 11519 402a79 11518->11519 11520 402a69 11518->11520 11535 401857 LocalAlloc 11519->11535 11521 4029c6 4 API calls 11520->11521 11523 402a77 11521->11523 11523->11498 11525 4029d3 11524->11525 11526 4029da WideCharToMultiByte 11524->11526 11525->11514 11527 4029f7 11526->11527 11528 402a29 11526->11528 11534 401857 LocalAlloc 11527->11534 11528->11514 11530 402a02 11530->11528 11531 402a06 WideCharToMultiByte 11530->11531 11531->11528 11532 402a23 11531->11532 11533 401840 LocalFree 11532->11533 11533->11528 11534->11530 11535->11523 11543 40c4f1 11544 40c500 11543->11544 11545 40c504 MultiByteToWideChar 11543->11545 11555 401857 LocalAlloc 11545->11555 11547 40c521 MultiByteToWideChar StgOpenStorage 11550 40c555 11547->11550 11551 40c5ca 11547->11551 11548 401840 LocalFree 11549 40c5e5 11548->11549 11550->11551 11556 401857 LocalAlloc 11550->11556 11551->11548 11553 40c58a 11554 401840 LocalFree 11553->11554 11554->11551 11555->11547 11556->11553

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040EB20
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EB54
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EE0F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                        • API String ID: 1332880857-2111798378
                                        • Opcode ID: 5cdfa03e8256becee685f52169c972531b956c65bd473efa2e4e2f5bf7b0f79f
                                        • Instruction ID: 5872a348282b04e6e97501da28e04cb8c0a2e1f6fac920b18405b73d1ec69f56
                                        • Opcode Fuzzy Hash: 5cdfa03e8256becee685f52169c972531b956c65bd473efa2e4e2f5bf7b0f79f
                                        • Instruction Fuzzy Hash: A171973194011CBADF226F52DC02BDD7AB6BF04744F14C4BAB659740B1CE769BA1AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 200 40d328-40d346 call 401578 203 40d519-40d527 call 4015be 200->203 204 40d34c-40d353 200->204 204->203 205 40d359-40d360 204->205 205->203 207 40d366-40d36d 205->207 207->203 209 40d373-40d37a 207->209 209->203 210 40d380-40d387 209->210 210->203 211 40d38d-40d394 210->211 211->203 212 40d39a-40d3a1 211->212 212->203 213 40d3a7-40d3bb CertOpenSystemStoreA 212->213 213->203 214 40d3c1 213->214 215 40d3c3-40d3d1 CertEnumCertificatesInStore 214->215 216 40d3d3-40d513 CertCloseStore 215->216 217 40d3d8-40d3e6 215->217 216->203 219 40d509 217->219 220 40d3ec 217->220 219->215 221 40d4ff-40d503 220->221 221->219 222 40d3f1-40d3ff lstrcmp 221->222 223 40d405-40d409 222->223 224 40d4f9-40d4fc 222->224 223->224 225 40d40f-40d437 call 401857 call 40188e lstrcmp 223->225 224->221 230 40d4f1-40d4f4 call 401840 225->230 231 40d43d-40d454 CryptAcquireCertificatePrivateKey 225->231 230->224 231->230 233 40d45a-40d46c CryptGetUserKey 231->233 234 40d4e6-40d4eb CryptReleaseContext 233->234 235 40d46e-40d485 CryptExportKey 233->235 234->230 236 40d487-40d4aa call 401857 CryptExportKey 235->236 237 40d4dd-40d4e0 CryptDestroyKey 235->237 240 40d4d5-40d4d8 call 401840 236->240 241 40d4ac-40d4d0 call 4014f1 call 401527 * 2 236->241 237->234 240->237 241->240
                                        APIs
                                        • CertOpenSystemStoreA.CRYPT32(00000000,004168A4), ref: 0040D3AE
                                        • CertEnumCertificatesInStore.CRYPT32(00000000), ref: 0040D3C7
                                        • lstrcmp.KERNEL32(?,2.5.29.37), ref: 0040D3F8
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • lstrcmp.KERNEL32(?,004168B1), ref: 0040D430
                                        • CryptAcquireCertificatePrivateKey.CRYPT32(00000000,00000000,00000000,?,?,00000000), ref: 0040D44C
                                        • CryptGetUserKey.ADVAPI32(?,?,?), ref: 0040D464
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,00000000,?), ref: 0040D47D
                                        • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?,?), ref: 0040D4A2
                                        • CryptDestroyKey.ADVAPI32(?), ref: 0040D4E0
                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040D4EB
                                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 0040D513
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$CertStore$Exportlstrcmp$AcquireAllocCertificateCertificatesCloseContextDestroyEnumLocalOpenPrivateReleaseSystemUser
                                        • String ID: 2.5.29.37
                                        • API String ID: 2649496969-3842544949
                                        • Opcode ID: 260a90d77c377c55336eea3c72cc038089c46e56b772a7b89d36d4f8143e4344
                                        • Instruction ID: 84b30aeb7ad98722db966da1bf5ad5a913a958635eaf3e2438801624c5e0e283
                                        • Opcode Fuzzy Hash: 260a90d77c377c55336eea3c72cc038089c46e56b772a7b89d36d4f8143e4344
                                        • Instruction Fuzzy Hash: DC512431904209FBDF21AB90DC09BEEBB71AB48309F14853AFA11751F0C779AA94DF58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 292 404ddd-404df5 293 404df7-404dfa 292->293 294 404dfc 292->294 293->294 295 404e01-404e0b call 402531 293->295 296 404f5a-404f66 call 401840 294->296 301 404e1c-404e24 call 401d80 295->301 302 404e0d-404e1a call 401d80 295->302 305 404e29-404e59 call 40186e FindFirstFileA 301->305 302->305 305->296 309 404e5f-404e6b 305->309 310 404ed2-404eed StrStrIA 309->310 311 404e6d-404e7d lstrcmpiA 309->311 312 404f35-404f49 FindNextFileA 310->312 313 404eef-404f0e call 401d80 call 401dd4 310->313 314 404e84-404e9a lstrcmpiA 311->314 315 404e7f 311->315 312->309 316 404f4f-404f55 FindClose 312->316 326 404f10-404f1b StrStrIA 313->326 327 404f1d 313->327 318 404ea1-404ed0 call 401d80 call 401dd4 call 404ddd call 401840 314->318 319 404e9c 314->319 315->312 316->296 318->312 319->312 329 404f22-404f25 326->329 327->329 331 404f30 call 401840 329->331 332 404f27-404f2b call 404dc6 329->332 331->312 332->331
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 00404E4D
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 00404E76
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 00404E93
                                        • FindNextFileA.KERNEL32(?,?,?,.ini,00000000,?,?,0000013E,?,*.*,?), ref: 00404F42
                                        • FindClose.KERNEL32(?,?,?,?,.ini,00000000,?,?,0000013E,?,*.*,?), ref: 00404F55
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$.ini$Sites\$\*.*
                                        • API String ID: 3040542784-999409347
                                        • Opcode ID: e1b3541782865d086890281bc8e6355eb265398b6da5a4db2899a02257b019a5
                                        • Instruction ID: 946114e3cbcb973e76e8ccb1141be432eb652bac24e3449ea367a70d700628f9
                                        • Opcode Fuzzy Hash: e1b3541782865d086890281bc8e6355eb265398b6da5a4db2899a02257b019a5
                                        • Instruction Fuzzy Hash: 3A3150B0510219BADF11BF21CC02BEEB7A9AF80344F1041B7BA08B51E1DB799ED19F58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetVersionExA.KERNEL32(0000009C), ref: 004045B0
                                        • GetLocaleInfoA.KERNEL32(00000400,00001002,?,000003FF,00000400,?,00000000,?,00000000,00000000,0000009C), ref: 00404635
                                        • GetLocaleInfoA.KERNEL32(00000400,00001001,?,000003FF,?,?,00000000,00000400,00001002,?,000003FF,00000400,?,00000000,?,00000000), ref: 0040465E
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,?,00000000,00000000,HWID,?,?,00000000,?,?,00000000,00000400,00001001,?), ref: 00404713
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404732
                                        • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll,?,00000000,?,00000000,00000000,HWID,?,?,00000000,?,?,00000000), ref: 00404742
                                        • GetSystemInfo.KERNEL32(?,kernel32.dll,?,00000000,?,00000000,00000000,HWID,?,?,00000000,?,?,00000000,00000400,00001001), ref: 00404750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Info$LocaleSystem$AddressHandleModuleNativeProcVersion
                                        • String ID: GetNativeSystemInfo$HWID$kernel32.dll
                                        • API String ID: 1787888500-92997708
                                        • Opcode ID: c03fc7fa8ed8e8c039f72d055e181a59c8cda34764d1350e271c86cedc51e686
                                        • Instruction ID: f2dbb714d3b0804c937ff92670f5e205ceb4c9ab90b9c94e6585d74bee2b7241
                                        • Opcode Fuzzy Hash: c03fc7fa8ed8e8c039f72d055e181a59c8cda34764d1350e271c86cedc51e686
                                        • Instruction Fuzzy Hash: 41518371A00218BEDF21BB61CC46F9D7A35AF82304F0040BAB749790E1DBB94AD19F1A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,\*.*), ref: 00408AA4
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 00408AD7
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 00408AF1
                                        • StrStrIA.SHLWAPI(?,opera,00000000,00000000,?,?,00414878,00414FB9,?,00414FB7,?,00000000,?,?,0000013E,?), ref: 00408B36
                                        • FindNextFileA.KERNEL32(?,?,00000000,?,?,0000013E,?,\*.*), ref: 00408B64
                                        • FindClose.KERNEL32(?,?,?,00000000,?,?,0000013E,?,\*.*), ref: 00408B77
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*$opera$wand.dat
                                        • API String ID: 3663067366-3278183560
                                        • Opcode ID: 9862ff7f52af266a39a022fdbc21e4fcba6df7798ef041eab8f4f468ca276024
                                        • Instruction ID: 7cc82b31b5a83ab5f52fe7b5ce05e30b79ae97800c24b695cfe0815147d7e53b
                                        • Opcode Fuzzy Hash: 9862ff7f52af266a39a022fdbc21e4fcba6df7798ef041eab8f4f468ca276024
                                        • Instruction Fuzzy Hash: D3312F70900219AADF20AB61CD02BEEB7B5AB44344F5044FBB448B51E1DB789FC0DF58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 00404180
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 004041AD
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 004041CA
                                        • FindNextFileA.KERNEL32(?,?,?,00000000,00000000,?,?,0000013E,?,*.*,?), ref: 00404294
                                        • FindClose.KERNEL32(?,?,?,?,00000000,00000000,?,?,0000013E,?,*.*,?), ref: 004042A7
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: 1668a86da0a11c543266ea31b0932b1fd5df1935911e266c40dfb37622084168
                                        • Instruction ID: 71dc150577332a6ea9f4f0efe233f703b564e9a29810bed22a524e1ca9e1537f
                                        • Opcode Fuzzy Hash: 1668a86da0a11c543266ea31b0932b1fd5df1935911e266c40dfb37622084168
                                        • Instruction Fuzzy Hash: 14417470500209BADF11AF61CC06AEE7B69AF90384F1041BBFA08B41F1D7799ED19F59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlenW.KERNEL32(?), ref: 0040A686
                                        • wsprintfA.USER32 ref: 0040A705
                                        • lstrlenW.KERNEL32(?,Software\Microsoft\Internet Explorer\IntelliForms\Storage2,?,?,?,?,?,?), ref: 0040A74B
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A78E
                                        • LocalFree.KERNEL32(00000000,?,?), ref: 0040A7C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotectwsprintf
                                        • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                        • API String ID: 1926481713-2450551051
                                        • Opcode ID: 9c20aadd822a88e2c3e6f41c20adc5fa6ae772e8f4377b017dac4be71d12314f
                                        • Instruction ID: 8af7b36c123668128c606e2ab033df41cbf4071d0a43d7b9cf8741f2e00074fa
                                        • Opcode Fuzzy Hash: 9c20aadd822a88e2c3e6f41c20adc5fa6ae772e8f4377b017dac4be71d12314f
                                        • Instruction Fuzzy Hash: 8F41597281021CEBDF11EFA1DC05AEEBB7AEF04314F04803AF910B51A1D7B99A61DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 004051BC
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 004051EB
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 00405205
                                        • FindNextFileA.KERNEL32(?,?,00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 0040525D
                                        • FindClose.KERNEL32(?,?,?,00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 00405270
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpi$CloseFirstNext
                                        • String ID: \*.*
                                        • API String ID: 3663067366-1173974218
                                        • Opcode ID: 17d0ebb5889fccea655d6d39ac1bc36bc9954570420f56ba0753fdc985178715
                                        • Instruction ID: 52128acd16f511aaf3689c78e3949de5d3f3961e8f9d712b313535cbdc7ab976
                                        • Opcode Fuzzy Hash: 17d0ebb5889fccea655d6d39ac1bc36bc9954570420f56ba0753fdc985178715
                                        • Instruction Fuzzy Hash: 2231FC71900219AADF21AB61CC02BEE77B9EF00348F5045AAB808B51A1DB799ED09F58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 0040292B
                                        • GetCurrentProcess.KERNEL32 ref: 00402935
                                        • OpenProcessToken.ADVAPI32(00000000,00000020,00000000), ref: 00402943
                                        • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 00402985
                                        • CloseHandle.KERNEL32(00000000), ref: 00402999
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                        • String ID:
                                        • API String ID: 3038321057-0
                                        • Opcode ID: 6cd35e1ec0b8568d459acc08a740fee80c8e80c65011669c67074823fc3bbed9
                                        • Instruction ID: 752786acf4088748a6f16755c620852e1f65e3ce455aca53885acb762e6531be
                                        • Opcode Fuzzy Hash: 6cd35e1ec0b8568d459acc08a740fee80c8e80c65011669c67074823fc3bbed9
                                        • Instruction Fuzzy Hash: 60116D71A04208EBEB119FA4DD4DBEEBBB5FB40319F108036A151B51E0D7F89A84CF18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 00410371
                                        • GetUserNameA.ADVAPI32(00000101,00000101), ref: 004103C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InitializeNameUser
                                        • String ID: het2563783920299393
                                        • API String ID: 2272643758-2945140937
                                        • Opcode ID: 1623c35c32e608347af548d751fc151d36db7e749d737152979c8a145b01a264
                                        • Instruction ID: 8b1f34e50527271bfedb7881bb8bfe892eb4f1fdf18e706de9c14e32afef3f22
                                        • Opcode Fuzzy Hash: 1623c35c32e608347af548d751fc151d36db7e749d737152979c8a145b01a264
                                        • Instruction Fuzzy Hash: 99F044705142086EDB107BA3AD077D936A45B4034CF50803FB824E51E2DEFD5580D66D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0040449B
                                        • CheckTokenMembership.KERNELBASE(00000000,?,00000000), ref: 004044B7
                                        • FreeSid.ADVAPI32(?), ref: 004044CB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                        • String ID:
                                        • API String ID: 3429775523-0
                                        • Opcode ID: ea0b4cd33dcb887dcbcb3c3d5d700a9ced92f42c5d5974ed7f83f7deb8a77e10
                                        • Instruction ID: 59c9fe2139827fc3dbe319486bddf3b4a80d281f4546e2cb44af971f627c1ef3
                                        • Opcode Fuzzy Hash: ea0b4cd33dcb887dcbcb3c3d5d700a9ced92f42c5d5974ed7f83f7deb8a77e10
                                        • Instruction Fuzzy Hash: 7B1148B0904248DEEF11CB94DC4DBDA7BF4AB55308F0581A5D114AA2E1D3F9D508CB5A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryA.KERNEL32(00414B2E,?,?,?,?,004024C7,ole32.dll,00414B2E,0041037B), ref: 00402467
                                        • GetProcAddress.KERNEL32(00000000,00414B2E), ref: 00402495
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID:
                                        • API String ID: 2574300362-0
                                        • Opcode ID: 182901e3aac0acb518893847d7cc03d78d3ef11046aa55f447fac592f991a4b6
                                        • Instruction ID: 5755110d68d0671c78c9020215ced64c70a73d535768fdcf64a7a9712953a9c7
                                        • Opcode Fuzzy Hash: 182901e3aac0acb518893847d7cc03d78d3ef11046aa55f447fac592f991a4b6
                                        • Instruction Fuzzy Hash: 05F0B4333040052AD7106A39AD8499F6F88E7E3378B105137F945A72C1E1FDDD81C3A4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GetTickCount.KERNEL32 ref: 0040FF03
                                        • wsprintfA.USER32 ref: 0040FF11
                                        • GetModuleFileNameA.KERNEL32(?,00000104,00000105,00000105,00000105,?,?,00000105), ref: 0040FF71
                                        • GetTempPathA.KERNEL32(00000104,?,?,00000104,00000105,00000105,00000105,?,?,00000105), ref: 0040FF87
                                        • lstrcat.KERNEL32(?,?), ref: 0040FF9B
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104,00000105,00000105,00000105), ref: 0040FFB4
                                        • lstrcpy.KERNEL32(?,?), ref: 0040FFCB
                                        • StrRChrIA.SHLWAPI(?,00000000,0000005C,?,?,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104), ref: 0040FFD7
                                        • lstrcpy.KERNEL32(00000001,?), ref: 0040FFE5
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,00000000,0000005C,?,?,?,C0000000,00000003,00000000), ref: 0040FFFC
                                        • lstrlen.KERNEL32( :ktk del %1 if exist %1 goto ktk del %0 ,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104,00000105,00000105,00000105), ref: 0041000C
                                        • CloseHandle.KERNEL32(?,00000000,?, :ktk del %1 if exist %1 goto ktk del %0 ,00000000, :ktk del %1 if exist %1 goto ktk del %0 ,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?), ref: 00410023
                                        • wsprintfA.USER32 ref: 0041003A
                                        • LoadLibraryA.KERNEL32(shell32.dll,00000105,00000105,00000105,?,?,00000105), ref: 00410047
                                        • GetProcAddress.KERNEL32(00000000,ShellExecuteA), ref: 00410056
                                        • ShellExecuteA.SHELL32(00000000,open,?,?,00000000,00000000,00000000,ShellExecuteA,shell32.dll,00000105,00000105,00000105,?,?,00000105), ref: 00410070
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Createlstrcpywsprintf$AddressAllocCloseCountExecuteHandleLibraryLoadLocalModuleNamePathProcShellTempTicklstrcatlstrlen
                                        • String ID: :ktk del %1 if exist %1 goto ktk del %0 $ "%s" $%d.bat$ShellExecuteA$open$shell32.dll
                                        • API String ID: 2116904195-4169620016
                                        • Opcode ID: 6f4908035ec8cb4b628ec564ede86aefcf7037eddad4daabd9cbdfa083509d3c
                                        • Instruction ID: de26498704618d1656750a5e168cfd676922b365631f1691106e9a1bfd73c9ad
                                        • Opcode Fuzzy Hash: 6f4908035ec8cb4b628ec564ede86aefcf7037eddad4daabd9cbdfa083509d3c
                                        • Instruction Fuzzy Hash: 67414230B442057BDF2876A69C02FEF7A67AB84704F20903E7215F62E1DEB95DD05A1C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 004059AE
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004059DE
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405A2C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Last Server Host$Last Server Pass$Last Server Path$Last Server Port$Last Server Type$Last Server User$Pass$Path$Port$Remote Dir$Server Type$Server.Host$Server.Pass$Server.Port$Server.User$ServerType$User
                                        • API String ID: 1332880857-44262141
                                        • Opcode ID: 70bd939766c9f760e92b821c939c84b187204c1e43a864424d0a4a74b6b24a4e
                                        • Instruction ID: 3749a9db32c4b1563b841dd80bd055b533a48c519498eb5124c5c046765c62ea
                                        • Opcode Fuzzy Hash: 70bd939766c9f760e92b821c939c84b187204c1e43a864424d0a4a74b6b24a4e
                                        • Instruction Fuzzy Hash: 76213D34680A0CFADB11AA51CD03FDE7A6AAB84B05F20C063B505750E1DABD5AD0AF4C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,004103E4), ref: 004020AE
                                        • RegEnumKeyExA.ADVAPI32(004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 004020EE
                                        • lstrlen.KERNEL32(?,00000000,00000000,80000002,?,DisplayName,?,?,00000000,?,00000000,80000002,?,UninstallString,?,00000000), ref: 004021A1
                                        • lstrlen.KERNEL32(?,80000002,?,DisplayName,?,?,00000000,?,00000000,80000002,?,UninstallString,?,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall), ref: 004021DA
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        • RegCloseKey.ADVAPI32(004103E4,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00402211
                                        • 756D19A0.OLE32(?,?,?,00000000,?,00000000,?,?,?,?,?,004103E4), ref: 0040223D
                                        • GlobalFix.KERNEL32(?), ref: 0040226D
                                        • GlobalUnWire.KERNEL32(?), ref: 0040228C
                                        • 756D19A0.OLE32(?,?,?,?,?,00000000,?,00000000,?,?,?,?,?,004103E4), ref: 0040229E
                                        • GlobalFix.KERNEL32(?), ref: 004022CE
                                        • GlobalUnWire.KERNEL32(?), ref: 004022ED
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$LocalWirelstrlen$AllocCloseEnumFreeOpen
                                        • String ID: DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                        • API String ID: 3331298335-981893429
                                        • Opcode ID: 638be5dfb57a565d336b185d0523d82be2957367dfd3ec9eefcae292eeba3a90
                                        • Instruction ID: 08dd40a3e5dae8a0bad9d8a75200fccf60eadea40099cdf2be1d799f06a1f1c2
                                        • Opcode Fuzzy Hash: 638be5dfb57a565d336b185d0523d82be2957367dfd3ec9eefcae292eeba3a90
                                        • Instruction Fuzzy Hash: E9614F718001A8BADF31BB61CD05BEA7679AB44345F0040FAB688B11E1D7BD5EC4EE68
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 248 40fcf4-40fd0b 249 40fd11-40fd19 call 403cd7 248->249 250 40fedc-40fedf 248->250 252 40fd1e-40fd20 249->252 253 40fd26-40fd2d 252->253 254 40feca-40fed6 252->254 253->254 255 40fd33-40fd4d call 401710 253->255 254->249 254->250 258 40fd86-40fd89 255->258 259 40fd8b-40fdb6 call 401261 call 401101 258->259 260 40fd4f-40fd85 wsprintfA call 401dd4 258->260 267 40feb4-40fec5 call 401840 call 401017 259->267 268 40fdbc-40fdc6 259->268 260->258 267->254 268->267 270 40fdcc-40fddf GetTempPathA 268->270 270->267 271 40fde5-40fdea 270->271 271->267 273 40fdf0-40fe26 GetTickCount wsprintfA CreateDirectoryA call 402531 271->273 277 40fe48-40fe56 call 401d80 273->277 278 40fe28-40fe46 call 401d80 call 401dd4 273->278 282 40fe5b-40fe74 call 4013eb 277->282 278->282 287 40fe76-40fea4 lstrlen call 402665 ShellExecuteA 282->287 288 40fea9-40feaf call 401840 282->288 287->288 288->267
                                        APIs
                                          • Part of subcall function 00401710: 756D19A0.OLE32(?,?), ref: 0040171D
                                          • Part of subcall function 00401710: GlobalFix.KERNEL32(?), ref: 00401734
                                          • Part of subcall function 00401710: GlobalUnWire.KERNEL32(?), ref: 0040174C
                                        • wsprintfA.USER32 ref: 0040FD65
                                        • GetTempPathA.KERNEL32(00000104,?,?,00000000,00000002), ref: 0040FDD8
                                        • GetTickCount.KERNEL32 ref: 0040FDF0
                                        • wsprintfA.USER32 ref: 0040FE02
                                        • CreateDirectoryA.KERNEL32(?,00000000), ref: 0040FE13
                                        • lstrlen.KERNEL32(true,?,?,?,?,?,?,00000000), ref: 0040FE7B
                                        • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0040FEA4
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Globalwsprintf$CountCreateDirectoryExecutePathShellTempTickWirelstrcatlstrcpy
                                        • String ID: %02X$%d.exe$http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php$open$true
                                        • API String ID: 2046336982-2314549783
                                        • Opcode ID: 941e83e344cc6860ffb520b6e94969517b22a403d0126689117f68caba4614b3
                                        • Instruction ID: 3c039ec134d7ce4010dbf872b881317b3fd1ac2be2cbd8dee052789ab6ffcd6a
                                        • Opcode Fuzzy Hash: 941e83e344cc6860ffb520b6e94969517b22a403d0126689117f68caba4614b3
                                        • Instruction Fuzzy Hash: 04414171900228AADB30AB61CC46FEEB7789B45705F1005F7B648B11E2DBBC5EC48F98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 400 402b7f-402b91 401 402b93-402b9a 400->401 402 402ba5-402ba9 400->402 401->402 403 402b9c-402ba3 401->403 403->402 404 402baa-402bc0 GetCurrentProcess OpenProcessToken 403->404 405 402c56-402c5a 404->405 406 402bc6-402be2 GetTokenInformation 404->406 407 402be4-402bec GetLastError 406->407 408 402c4e-402c51 CloseHandle 406->408 407->408 409 402bee-402bf2 407->409 408->405 409->408 410 402bf4-402c16 call 401857 GetTokenInformation 409->410 413 402c46-402c49 call 401840 410->413 414 402c18-402c2a ConvertSidToStringSidA 410->414 413->408 414->413 415 402c2c-402c3b lstrcmp 414->415 417 402c3d 415->417 418 402c3e-402c41 LocalFree 415->418 417->418 418->413
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00402BAC
                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 00402BB8
                                        • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00402BDA
                                        • GetLastError.KERNEL32 ref: 00402BE4
                                        • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,00000000), ref: 00402C0E
                                        • ConvertSidToStringSidA.ADVAPI32(?,?), ref: 00402C22
                                        • lstrcmp.KERNEL32(?,S-1-5-18), ref: 00402C34
                                        • LocalFree.KERNEL32(?,?,?), ref: 00402C41
                                        • CloseHandle.KERNEL32(?), ref: 00402C51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Token$InformationProcess$CloseConvertCurrentErrorFreeHandleLastLocalOpenStringlstrcmp
                                        • String ID: S-1-5-18
                                        • API String ID: 795010888-4289277601
                                        • Opcode ID: 36515c749170abb860dd3c67fea4b3fd00c7623ca2813102fb0c76df3f57f51a
                                        • Instruction ID: bdd3f126c014c621d48c9bcb1f04be72404d12141371039d74620685035d047b
                                        • Opcode Fuzzy Hash: 36515c749170abb860dd3c67fea4b3fd00c7623ca2813102fb0c76df3f57f51a
                                        • Instruction Fuzzy Hash: B6211031904109BBEF11AFA4DD4ABEE77B5FB40305F104476A111B51E4D7B9AA80DB1C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 419 4065f9-406616 RegOpenKeyA 420 40687b-40687c 419->420 421 40661c 419->421 422 406623-40664a RegEnumKeyExA 421->422 423 406651-40670f call 401d80 call 401dd4 call 401cf9 * 5 422->423 424 40664c-406876 RegCloseKey 422->424 440 406711-406718 423->440 441 406724 423->441 424->420 440->441 442 40671a-406722 440->442 443 40672e-406753 call 401840 call 401cf9 441->443 442->443 448 406755-40675c 443->448 449 406768 443->449 448->449 451 40675e-406766 448->451 450 406772-40677f call 401840 449->450 454 4067c0-4067c7 450->454 455 406781-406788 450->455 451->450 457 406834-40686e call 401840 * 5 454->457 458 4067c9-4067d0 454->458 455->454 456 40678a-4067a0 call 404346 455->456 465 4067a2-4067a9 456->465 466 4067ab-4067b6 call 401840 456->466 457->422 458->457 461 4067d2-4067d9 458->461 461->457 464 4067db-40682f call 4014f1 call 401553 * 2 call 401527 call 4014f1 call 401553 461->464 464->457 465->454 465->466 466->454
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040660F
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406643
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406876
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$InitialPath$Login$Password$PasswordType$Port
                                        • API String ID: 1332880857-4069465341
                                        • Opcode ID: 84345bfc68a64b25a190d13fdbbc86dd649292805299842e1fadc721dbb1f0e3
                                        • Instruction ID: 878f0c8ae7a6c9400d3b253364e2bd7f4d064004aa8922325b96e6fe1a9462ad
                                        • Opcode Fuzzy Hash: 84345bfc68a64b25a190d13fdbbc86dd649292805299842e1fadc721dbb1f0e3
                                        • Instruction Fuzzy Hash: BF51E831940118EADF21BB51DC01BE97ABABF44748F10C0BAB549751B1CB7A5BA1EF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 488 40cfdc-40cff6 RegOpenKeyA 489 40d231-40d232 488->489 490 40cffc 488->490 491 40d003-40d02a RegEnumKeyExA 490->491 492 40d031-40d0c8 call 401d80 * 2 call 401840 call 401cf9 * 4 491->492 493 40d02c-40d22c RegCloseKey 491->493 509 40d0e3-40d0e5 492->509 510 40d0ca-40d0d1 492->510 493->489 512 40d0e7-40d0e8 call 401840 509->512 513 40d0ed 509->513 510->509 511 40d0d3-40d0e1 call 401840 510->511 514 40d0f7-40d134 call 401cf9 * 2 511->514 512->513 513->514 522 40d13a-40d150 call 404346 514->522 523 40d1ce-40d224 call 401840 * 5 call 40cfdc call 401840 514->523 522->523 528 40d152-40d156 522->528 523->491 528->523 530 40d158-40d15f 528->530 530->523 532 40d161-40d168 530->532 532->523 534 40d16a-40d1c9 call 4014f1 call 401553 * 2 call 401527 call 4014f1 call 401553 * 2 532->534 534->523
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040CFEF
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D023
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D22C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: InitialDirectory$Password$PortNumber$ServerName$ServerType$UserID
                                        • API String ID: 1332880857-2649023343
                                        • Opcode ID: 8b6f605d331ed2eb21dd8c45bc62cd68acc31ccb83cfb8b85bcfbb77218c75a1
                                        • Instruction ID: b084cf9da2bdd287e3e1080d31f42b2e71d0dceb83c6c61ab017eaa017c6baff
                                        • Opcode Fuzzy Hash: 8b6f605d331ed2eb21dd8c45bc62cd68acc31ccb83cfb8b85bcfbb77218c75a1
                                        • Instruction Fuzzy Hash: 1851A631940118BADF216F91CC02BDD7ABABF04348F14C0BAB549750B1CF7A9B95AF99
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 557 407b24-407b3e RegOpenKeyA 558 407b44 557->558 559 407d86-407d87 557->559 560 407b4b-407b72 RegEnumKeyExA 558->560 561 407b74-407d81 RegCloseKey 560->561 562 407b79-407c2c call 401d80 * 2 call 401840 call 401cf9 * 5 560->562 561->559 580 407c47-407c49 562->580 581 407c2e-407c35 562->581 583 407c51 580->583 584 407c4b-407c4c call 401840 580->584 581->580 582 407c37-407c45 call 401840 581->582 587 407c5b-407c82 call 401cf9 582->587 583->587 584->583 591 407d23-407d79 call 401840 * 5 call 407b24 call 401840 587->591 592 407c88-407c8f 587->592 591->560 592->591 594 407c95-407c9c 592->594 594->591 596 407ca2-407cfc call 4014f1 call 401553 * 3 call 4014f1 call 401553 594->596 621 407d19-407d1e call 4014f1 596->621 622 407cfe-407d05 596->622 621->591 622->621 623 407d07-407d17 call 4014f1 622->623 623->591
                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407B37
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407B6B
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407D81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FSProtocol$HostName$Password$PortNumber$RemoteDirectory$UserName
                                        • API String ID: 1332880857-3874328862
                                        • Opcode ID: 65d403c67bbe0a054c1484cbcf03ac541fc213f814df095ff6efd5f2d87731f5
                                        • Instruction ID: f805444a8a64015e573bfb1de7972a85676777f0e267872700d8a7a72d5561cf
                                        • Opcode Fuzzy Hash: 65d403c67bbe0a054c1484cbcf03ac541fc213f814df095ff6efd5f2d87731f5
                                        • Instruction Fuzzy Hash: 6C51A73194411CEADF216F51CC01BED7AB9BF04344F10C0BAB649751B1DB7AAB91AF89
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DBDF
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DC13
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DDFC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FTP destination catalog$FTP destination password$FTP destination port$FTP destination server$FTP destination user$FTP profiles
                                        • API String ID: 1332880857-3620412361
                                        • Opcode ID: 5a8e3768825524a2e99e9cfe0fe42f4ea31c44571ad2d014b2a231d556178f05
                                        • Instruction ID: 853624f4fa92df84ede45b07656b96259bd83cd000f47ef9506ca94c475e3085
                                        • Opcode Fuzzy Hash: 5a8e3768825524a2e99e9cfe0fe42f4ea31c44571ad2d014b2a231d556178f05
                                        • Instruction Fuzzy Hash: 74516531950118EADF226F91CC02BDD7AB6BF04344F1084BAB549751B1CE7A9BA5AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407E89
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407EBD
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408085
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: PassWord$Port$RootDirectory$ServerType$Url$UserName
                                        • API String ID: 1332880857-2128033141
                                        • Opcode ID: 07b26acbe88f52de618a0be8a6e636aa3ca99ca38f778b9515488a6349ad238c
                                        • Instruction ID: 70b2bd0d1af28af51c7f8960c38eb232a343b8d8856aae17bf274a6d209453ed
                                        • Opcode Fuzzy Hash: 07b26acbe88f52de618a0be8a6e636aa3ca99ca38f778b9515488a6349ad238c
                                        • Instruction Fuzzy Hash: 3D517531940118FADF216F51CC02BDD7AB9BF04344F14C0BAB659740B1DB7A9B91AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 746 402665-402687 RegCreateKeyA 747 402689-4026a0 RegSetValueExA 746->747 748 4026ab-4026ad 746->748 749 4026a2 747->749 750 4026a3-4026a6 RegCloseKey 747->750 751 4026b3-4026c6 GetTempPathA 748->751 752 402778-40277c 748->752 749->750 750->748 751->752 753 4026cc-4026d1 751->753 753->752 754 4026d7-4026f3 CreateDirectoryA call 402531 753->754 757 402711-40271b call 401d80 754->757 758 4026f5-40270f call 401d80 call 401dd4 754->758 761 402720-402744 CreateFileA 757->761 758->761 763 402746-402759 call 4013aa CloseHandle 761->763 764 40275e-402760 761->764 763->764 767 402762-402768 DeleteFileA 764->767 768 40276d-402773 call 401840 764->768 767->768 768->752
                                        APIs
                                        • RegCreateKeyA.ADVAPI32(Software\WinRAR,?), ref: 00402680
                                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,00000000,?,0040FCE6,Client Hash,?,00000010,00000000,?,00000000,out.bin), ref: 00402699
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000003,?,00000000,?,0040FCE6,Client Hash,?,00000010,00000000,?,00000000,out.bin), ref: 004026A6
                                        • GetTempPathA.KERNEL32(00000104,?,?,0040FCE6,Client Hash,?,00000010,00000000,?,00000000,out.bin), ref: 004026BF
                                        • CreateDirectoryA.KERNEL32(?,00000000,00000104,?,?,0040FCE6,Client Hash,?,00000010,00000000,?,00000000,out.bin), ref: 004026E0
                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00000104,?,?,0040FCE6), ref: 0040273B
                                        • CloseHandle.KERNEL32(?,?,?,00000000,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000), ref: 00402759
                                        • DeleteFileA.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00000104,?), ref: 00402768
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Create$CloseFile$DeleteDirectoryHandlePathTempValue
                                        • String ID: Software\WinRAR
                                        • API String ID: 3443402316-224198155
                                        • Opcode ID: 60be2eb34dc850eeae92880680489a053bb4ce950e80636a5ad3e24dee92d46f
                                        • Instruction ID: 8325f711e9590314f160a872c62a1e1bd33f9c487bbd8686b8ebefcfde768a06
                                        • Opcode Fuzzy Hash: 60be2eb34dc850eeae92880680489a053bb4ce950e80636a5ad3e24dee92d46f
                                        • Instruction Fuzzy Hash: 7D218131A4020DBBDF21BFE1CD86FDE7A69AB04748F104476B704B50E1D6F99AD09B58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E986
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040E9BA
                                        • GetPrivateProfileStringA.KERNEL32(Program,DataPath,0041487A,?,00000104,00000000), ref: 0040EA40
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040EA99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocCloseEnumLocalOpenPrivateProfileString
                                        • String ID: DataPath$Path$Program$\PocoSystem.ini$accounts.ini
                                        • API String ID: 1343824468-2495907966
                                        • Opcode ID: bbd8532d5a3ca6f3a854f878ec97e99659a8773a8d88ee58fd439b5b4db76608
                                        • Instruction ID: 065ea3b02407bdf2a25c53734ac3e7a6de9906891c903f9d88a0898bd299829e
                                        • Opcode Fuzzy Hash: bbd8532d5a3ca6f3a854f878ec97e99659a8773a8d88ee58fd439b5b4db76608
                                        • Instruction Fuzzy Hash: 2B310E71940118BADF11BB62CC02FDE7AB9BF04344F10C4BAB655740E1DEB99B919F98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00404FD9
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DIR,0041487A,?,00000104,?), ref: 00405029
                                        • GetPrivateProfileStringA.KERNEL32(WS_FTP,DEFDIR,0041487A,?,00000104,?), ref: 00405064
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: PrivateProfileStringlstrlen$DirectoryWindowslstrcatlstrcpy
                                        • String ID: DEFDIR$DIR$WS_FTP$\Ipswitch$\Ipswitch\WS_FTP$\win.ini
                                        • API String ID: 2508676433-45949541
                                        • Opcode ID: 19aeb1cea9ddfc88884726efda8fe400dfc8fc0eac1c30a3f564b0a5d6fb1485
                                        • Instruction ID: ab3c31a5c4c249bdb520c908c148d3b099145b77129a910e1eddc1aa6619180a
                                        • Opcode Fuzzy Hash: 19aeb1cea9ddfc88884726efda8fe400dfc8fc0eac1c30a3f564b0a5d6fb1485
                                        • Instruction Fuzzy Hash: F2211271A80608BADF22BA61CC43FDD7629AB54744F100477B718B41E2D6F99AD09A9C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040637D
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004063B1
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004065BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Port$PthR$SSH$User
                                        • API String ID: 1332880857-1643752846
                                        • Opcode ID: 60ecbcf5d00f9412a0a0a975d5bf3858ab11a02a7709e7a56bc09fb87b84d95f
                                        • Instruction ID: 01ae609f72be3265498426662d59751bf6be68cab83ae5e2f3ad3239e34ac037
                                        • Opcode Fuzzy Hash: 60ecbcf5d00f9412a0a0a975d5bf3858ab11a02a7709e7a56bc09fb87b84d95f
                                        • Instruction Fuzzy Hash: 5651B731940118FADF21BB51DC02BDD7AB9BF44744F10C0BAB549741B1CE7A9BA1AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00405ECC
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405F00
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004060AC
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: HostAdrs$Password$Port$RemoteDir$UserName
                                        • API String ID: 3369285772-3748300950
                                        • Opcode ID: 3eef46e855b5de74e47a1e3bafaa353cf08f647c0ea7cb50f90dd4b14aed3e52
                                        • Instruction ID: 39ca36e60b618003e931d6f2294aafb7eef81d7a4abdb7cbbabd05731a406633
                                        • Opcode Fuzzy Hash: 3eef46e855b5de74e47a1e3bafaa353cf08f647c0ea7cb50f90dd4b14aed3e52
                                        • Instruction Fuzzy Hash: F7419931940118EADF217B91DC02BDD7ABABF44348F14C0BAB549741B1CE7A9B91AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004070F9
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040712D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004072BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Directory$Password$Server$UserName$_Password
                                        • API String ID: 1332880857-3317168126
                                        • Opcode ID: 91a3430297682f1515cf5639edcee885a8a2173a02c3f2d271bff4e8f18c4c5a
                                        • Instruction ID: 609de703010df0139157c9bf80d0129cbe541510f610675190dbdb5970859ea4
                                        • Opcode Fuzzy Hash: 91a3430297682f1515cf5639edcee885a8a2173a02c3f2d271bff4e8f18c4c5a
                                        • Instruction Fuzzy Hash: B841B73194411CBADF21AF51CC02BDD7AB9BF04348F10C1BAB659741B1CB7A5B91AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040D977
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D9AB
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DB3F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$PortNumber$TerminalType$UserName
                                        • API String ID: 1332880857-1017491782
                                        • Opcode ID: b0428f9079e510ebe99fc0758f1cff2203469d3d283a4d01df23076d9d268fc8
                                        • Instruction ID: f8484dbc3babf97c2c1a5d20cc61e3d4d66e17aaea75947d27f541899551e878
                                        • Opcode Fuzzy Hash: b0428f9079e510ebe99fc0758f1cff2203469d3d283a4d01df23076d9d268fc8
                                        • Instruction Fuzzy Hash: 40417771950118FADF616F51CC02BDDBAB5BF04348F10C0BAB649741B1CE7A9BA5AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407324
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407358
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004074EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: FtpDirectory$FtpPassword$FtpServer$FtpUserName$_FtpPassword
                                        • API String ID: 1332880857-980612798
                                        • Opcode ID: fc2f6b1155d9c414315b957c8c91863a1290ae2606c3669dfa302148dd6ac8a0
                                        • Instruction ID: bd274eef2e46a4ff76715892e6b75a2180ea3a08c7d11dab128668f5ec6988b3
                                        • Opcode Fuzzy Hash: fc2f6b1155d9c414315b957c8c91863a1290ae2606c3669dfa302148dd6ac8a0
                                        • Instruction Fuzzy Hash: 3941B63194011CBADF21AF51CC02BDD7AB9BF04344F10C1BABA59750B1CB7A9B91AF99
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406164
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406198
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040632D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostDirName$HostName$Password$Port$Username
                                        • API String ID: 1332880857-791697221
                                        • Opcode ID: c81139fcbf56941dcaf60ac0b767e2ad163483dd27e740059d073d05bb458d1f
                                        • Instruction ID: cb269819793aedec253ab9809a349585ec349e437966f923a3b307ae1727fb08
                                        • Opcode Fuzzy Hash: c81139fcbf56941dcaf60ac0b767e2ad163483dd27e740059d073d05bb458d1f
                                        • Instruction Fuzzy Hash: 7041A931940118FADF217B91DC02BDD7ABABF44344F14C0BAB659740B1DB7A5BA1AF88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,?), ref: 00403BD5
                                        • InternetCreateUrlA.WININET(?,80000000,?,?), ref: 00403C00
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,?), ref: 00403C46
                                        • wsprintfA.USER32 ref: 00403C65
                                        • lstrlen.KERNEL32(?,?,00000000,?), ref: 00403C88
                                        • closesocket.WSOCK32(?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00403CB2
                                        Strings
                                        • http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php, xrefs: 00403B6F
                                        • GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403C5D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlenwsprintf
                                        • String ID: GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)$http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php
                                        • API String ID: 4072649068-3295216763
                                        • Opcode ID: 50a609664e81cea622340f05941c93683e1650f6c5f05debcd6013568c06ae2f
                                        • Instruction ID: 21aff8abfa636648981e863fbffbe30260a0c72b04b14aad0c6b52ef7d14ebbd
                                        • Opcode Fuzzy Hash: 50a609664e81cea622340f05941c93683e1650f6c5f05debcd6013568c06ae2f
                                        • Instruction Fuzzy Hash: D941F972D04209EAEF11AFA1CC05BEEBF79EF04349F10403AF510B52A1D7B95A56DB19
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040D540
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D574
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D6F7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: Host$Pass$Port$Remote Dir$User
                                        • API String ID: 1332880857-1775099961
                                        • Opcode ID: 80d1a0e8c1c8a423298d716e21dabcb31e230ccbb27751e2697dd51d03cf2139
                                        • Instruction ID: 7b223506985f7e9993881f89488d5220dd2ac385c586e2f2613014f328bb2d28
                                        • Opcode Fuzzy Hash: 80d1a0e8c1c8a423298d716e21dabcb31e230ccbb27751e2697dd51d03cf2139
                                        • Instruction Fuzzy Hash: 96419731940118BADF117B91DC02BDD7AB6BF44348F10C0BAB649740B1DF7A9B95AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B2290,BlazeFtp), ref: 0040C7B4
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: BlazeFtp$LastAddress$LastPassword$LastPort$LastUser$Software\FlashPeak\BlazeFtp\Settings$\BlazeFtp$site.dat
                                        • API String ID: 1884169789-2976447346
                                        • Opcode ID: b909fb7a81e82e5df682445722ac9d9212a923162b23fabcc3bb23a564e12e57
                                        • Instruction ID: 86f57633c918004cb591647fbe494c1de5fca40327017356163d7bee477b7d32
                                        • Opcode Fuzzy Hash: b909fb7a81e82e5df682445722ac9d9212a923162b23fabcc3bb23a564e12e57
                                        • Instruction Fuzzy Hash: E531FC31940105FADF126BA5DC42FEE7A72AB80748F10813AB505751F1D77A9AA1AB4C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B2290,CUTEFTP), ref: 00405354
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        • Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar, xrefs: 004053E5
                                        • Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar, xrefs: 004053D8
                                        • Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar, xrefs: 004053BE
                                        • \sm.dat, xrefs: 00405368
                                        • CUTEFTP, xrefs: 0040534E
                                        • Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar, xrefs: 004053B1
                                        • Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar, xrefs: 004053CB
                                        • Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar, xrefs: 004053F2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: CUTEFTP$Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar$\sm.dat
                                        • API String ID: 1884169789-2738976122
                                        • Opcode ID: 990a038c71756545bbfcbf175bd01af30a517b02b1770d04a70bdb0593dbbc04
                                        • Instruction ID: 4af4e5b1d5efac7b425d03862d1557ab60b4bce52fbe80c0be0418ddd032b2c9
                                        • Opcode Fuzzy Hash: 990a038c71756545bbfcbf175bd01af30a517b02b1770d04a70bdb0593dbbc04
                                        • Instruction Fuzzy Hash: DA11ED31640909BADF127B61DC03FDE3E61EF40788F10457AB914780F2DBB98A919E8C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406CCF
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406D03
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406EA4
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: Hostname$Password$Port$Username
                                        • API String ID: 3369285772-1811172798
                                        • Opcode ID: 76a297ae803e78fc5009afd27baac82bceae9e3d315fc6ba3098b49659398310
                                        • Instruction ID: 27c77d28138e57c2a30f99cccdabf8977cef2fc3a32f2554e889b233b07969ab
                                        • Opcode Fuzzy Hash: 76a297ae803e78fc5009afd27baac82bceae9e3d315fc6ba3098b49659398310
                                        • Instruction Fuzzy Hash: 0D410B3194011CEADF216B51CC01BDD7AB9BF44344F10C0BAB549740B1CF7A9BA19F98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 00406A9B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406ACF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406C44
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumFreeLocalOpen
                                        • String ID: FtpPort$Password$Server$Username
                                        • API String ID: 3369285772-1828875246
                                        • Opcode ID: caab9b254be9c79d17985836d461de59f53e76dc8b9d2d38f31d2bcadcfba6e1
                                        • Instruction ID: 3286875724ba92266753070bf47cb5da6056a0bf67defb327aa2e9fe9a0f604f
                                        • Opcode Fuzzy Hash: caab9b254be9c79d17985836d461de59f53e76dc8b9d2d38f31d2bcadcfba6e1
                                        • Instruction Fuzzy Hash: 0341E971940118EADF217B91DC02BDD7AB9BF44344F14C0BAB549740B1CF7A9BA1AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E1B1
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,?,Folder,00000000,?,?,Port,00000000,?,?), ref: 0040E2E1
                                          • Part of subcall function 00404346: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404392
                                          • Part of subcall function 00404346: LocalFree.KERNEL32(00000000), ref: 004043C6
                                          • Part of subcall function 00401553: lstrlen.KERNEL32(00000000), ref: 0040155F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCryptDataFreeLocalOpenUnprotectlstrlen
                                        • String ID: Folder$Port$Site$UserID$xflags
                                        • API String ID: 2167297517-269738940
                                        • Opcode ID: 19422a3692644d5846d23386d42f0614ed746a009e9e54ad14f287abc9c52d33
                                        • Instruction ID: 2bbafa08a87d1715754746c4693ba5e37664914531330f1544f8fdf4342e45a7
                                        • Opcode Fuzzy Hash: 19422a3692644d5846d23386d42f0614ed746a009e9e54ad14f287abc9c52d33
                                        • Instruction Fuzzy Hash: F0318A31944119BADF12AF96CC02BEE7B76BF04348F10847ABA15741F1C77A9A61EB48
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407845
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407879
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407994
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: DataDir$InstallPath$sites.dat$sites.ini
                                        • API String ID: 1332880857-3870687875
                                        • Opcode ID: b607c7218d273e235bee287dba754a438cc388fc63986edf39bc6145e0bc45a6
                                        • Instruction ID: c2f424ccbec97aba35c716fbdd499ad5300c54a28e64bab09e935c7b4cda2cb2
                                        • Opcode Fuzzy Hash: b607c7218d273e235bee287dba754a438cc388fc63986edf39bc6145e0bc45a6
                                        • Instruction Fuzzy Hash: C731C67194411DFADF11AB51CC02FDD7ABABF44344F10C4BAB644740A1CBB9AA91AF89
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040F7B7
                                          • Part of subcall function 00409BA6: StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                          • Part of subcall function 00409BA6: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                          • Part of subcall function 00409BA6: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                          • Part of subcall function 00409BA6: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 0040F7FC
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?), ref: 0040F817
                                        • SetCurrentDirectoryA.KERNEL32(?,?,?,?), ref: 0040F85C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                        • API String ID: 3062143572-138716004
                                        • Opcode ID: 323c0b8fe7e650e381a57aa7a469d6cabfb40a715b13c541e397debd312dd2a4
                                        • Instruction ID: f7a818ba144afe3988f6d5d1a30e7f029c99f2ebb97cea8546427059eb2b5726
                                        • Opcode Fuzzy Hash: 323c0b8fe7e650e381a57aa7a469d6cabfb40a715b13c541e397debd312dd2a4
                                        • Instruction Fuzzy Hash: 3E112E74684204BACB10AFA2DC47FD93B75AB04748F2084ABB644750E3D7FD9AD19B4C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrA.SHLWAPI(006B2290,unleap.exe), ref: 00407A1B
                                        • lstrlen.KERNEL32(unleap.exe,00000001,006B2290,unleap.exe), ref: 00407A34
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        • StrStrIA.SHLWAPI(006B25B0,leapftp,006B2290,unleap.exe), ref: 00407A78
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: SOFTWARE\LeapWare$leapftp$sites.dat$sites.ini$unleap.exe
                                        • API String ID: 1884169789-1497043051
                                        • Opcode ID: 980a2e6b94e9ad0189f352591ddbad2366ceabc1c20bda3e702ad34cad73ce1c
                                        • Instruction ID: d6484a80ca3a95d74444ee2f97a37d77460b90fcf7660b27fdc1b4f5ea77e9e1
                                        • Opcode Fuzzy Hash: 980a2e6b94e9ad0189f352591ddbad2366ceabc1c20bda3e702ad34cad73ce1c
                                        • Instruction Fuzzy Hash: B121C570A04104BAEB113B31CC06FEE3E59ABC1744F20403BB904B51E2D7BD6E9196AD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        • wsprintfA.USER32 ref: 0040EFAB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: Count$Default$Dir #%d$ProgramDir$Software\RIT\The Bat!$Software\RIT\The Bat!\Users depot$Working Directory
                                        • API String ID: 988369812-1921698578
                                        • Opcode ID: 5a964b982966c428b87894e531f1a1fea3a43d0966c5195dbdc2028882686e59
                                        • Instruction ID: 4784d8f210aec7d8ae8286e4dc0b6a4445b2fc317a01857379e7b1a9fb786f93
                                        • Opcode Fuzzy Hash: 5a964b982966c428b87894e531f1a1fea3a43d0966c5195dbdc2028882686e59
                                        • Instruction Fuzzy Hash: 5A31ED31940209FBDF11ABA2DC42ADE7A75AF00744F20887BF514B51E1DB799B60AB48
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104,00000105), ref: 00404BE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocDirectoryLocalWindows
                                        • String ID: FtpIniName$InstallDir$Software\Ghisler\Total Commander$Software\Ghisler\Windows Commander$\GHISLER
                                        • API String ID: 3186838798-3636168975
                                        • Opcode ID: 13010d47b2780862f12abacb2e686663d96792badc841982bec806e383a15c07
                                        • Instruction ID: f7871ea3d4240a9e3ba7bd5f46dda144531476c67df709ceb90a832ffc830c87
                                        • Opcode Fuzzy Hash: 13010d47b2780862f12abacb2e686663d96792badc841982bec806e383a15c07
                                        • Instruction Fuzzy Hash: 1141D074E80508BAEF127BA2CC07FED7A699F90748F11813F7A04741F2CABD99509A5C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040489B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004048CF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004049F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: HostName$Password$User
                                        • API String ID: 1332880857-1253078594
                                        • Opcode ID: 6113d21654f3104bb46cbf4d82035a399164de67f8c9261a7bdc1784f9249a68
                                        • Instruction ID: 0df7185746bdd5bc412cedecf3d61c71ab4e3b4de0fdac9e9948e631594cfb2d
                                        • Opcode Fuzzy Hash: 6113d21654f3104bb46cbf4d82035a399164de67f8c9261a7bdc1784f9249a68
                                        • Instruction Fuzzy Hash: 5C31C871940118BADF217B61DC42BDD7ABABF40348F10C0BAB649741B1CB795B92AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408D8A
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408DBE
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408EB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: wiseftp.ini$wiseftpsrvs.bin$wiseftpsrvs.ini
                                        • API String ID: 1332880857-3184955129
                                        • Opcode ID: 4d6e70b4ab50bc67791a00e1b25179a0773e3a4a363494b9b96d6e41787a4268
                                        • Instruction ID: d3478e2a471555fe06b631a4cc13415ba238c64a6c4b1044b2d174fd7e034d7c
                                        • Opcode Fuzzy Hash: 4d6e70b4ab50bc67791a00e1b25179a0773e3a4a363494b9b96d6e41787a4268
                                        • Instruction Fuzzy Hash: 2531187190011DBACF11AF61CC02FDE7ABABF00344F10C5BAB644B40E1CE799A91AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • 756FE550.OLE32(004162F2,00000000,00000005,00416302,?), ref: 0040A7F7
                                        • StrStrIW.SHLWAPI(00000000,00416322), ref: 0040A86E
                                        • 757283B0.OLE32(00000000,00000000,00416322), ref: 0040A899
                                        • 757283B0.OLE32(00000000,00000000,00000000,00416322), ref: 0040A8A7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: 757283$E550
                                        • String ID: ($http://www.facebook.com/
                                        • API String ID: 1310012808-3677894361
                                        • Opcode ID: 9a7c5c0daee02aeb3aa0a651ff1e1b5389b763415f787bff53803292f13218b0
                                        • Instruction ID: 07647751d7e6e847d4d03b9b2cf335b733e0ef860eb9b9f2d0ca62f1729122c7
                                        • Opcode Fuzzy Hash: 9a7c5c0daee02aeb3aa0a651ff1e1b5389b763415f787bff53803292f13218b0
                                        • Instruction Fuzzy Hash: C5314971900208FBDF00EF90CC85BCEFBB5BF04304F208166E500B62A0D7799A96DB99
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409D92
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409DD7
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DF5
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000), ref: 00401DFF
                                          • Part of subcall function 00401DD4: lstrcpy.KERNEL32(00000000,?), ref: 00401E13
                                          • Part of subcall function 00401DD4: lstrcat.KERNEL32(00000000,?), ref: 00401E1C
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen$FreeLocallstrcatlstrcpy
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\$fireFTPsites.dat
                                        • API String ID: 3007406096-624000163
                                        • Opcode ID: 546172b5acdf1ea1aad6dde161a3faaed030af3c782d229cb69f39b5eb439197
                                        • Instruction ID: 18047dae9285ce2798a79d6f69f23a44ce7d60987fa051ef70a0d4c4a017fd84
                                        • Opcode Fuzzy Hash: 546172b5acdf1ea1aad6dde161a3faaed030af3c782d229cb69f39b5eb439197
                                        • Instruction Fuzzy Hash: 2B015270680204BADB10BF61CC07FD97A259B44748F11802A7A05750E3DBBD9A90965C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00403F65: WSAStartup.WSOCK32(00000101,?,?,0040FBF8), ref: 00403F7A
                                        • DeleteFileA.KERNEL32(out.bin), ref: 0040FBFD
                                          • Part of subcall function 00401000: 756A4620.OLE32(00000000,00000001,?,?,00402094,?,?,?,?,004103E4), ref: 0040100E
                                        • Sleep.KERNEL32(00001388,00000000,http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php,00000000,00000000,00000000,?,00000000,out.bin), ref: 0040FCB9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: A4620DeleteFileSleepStartup
                                        • String ID: Client Hash$http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php$out.bin
                                        • API String ID: 1134967436-4076469128
                                        • Opcode ID: 564f58b4ffaaafae1cdbee3fdc97b58fef5d1dcc03025d2e21f577c87d8226e3
                                        • Instruction ID: 09f8760c8b5a76081fb371085a20cc9ebf829c0e7c070a1cd3aa8e5b74bb238a
                                        • Opcode Fuzzy Hash: 564f58b4ffaaafae1cdbee3fdc97b58fef5d1dcc03025d2e21f577c87d8226e3
                                        • Instruction Fuzzy Hash: EC31467191824E9AEF31ABE189477BF7A78BB00348F10003BE50071AD1D6BD4989D76A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DF5
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000), ref: 00401DFF
                                          • Part of subcall function 00401DD4: lstrcpy.KERNEL32(00000000,?), ref: 00401E13
                                          • Part of subcall function 00401DD4: lstrcat.KERNEL32(00000000,?), ref: 00401E1C
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CloseEnumFreeLocalOpenlstrcatlstrcpy
                                        • String ID: PathToExe
                                        • API String ID: 3012581338-1982016430
                                        • Opcode ID: cacc51e63eff8bc27502df48bef2ca2e162a879b432f6904293fcb735aa6e41a
                                        • Instruction ID: f405e869f91df3b5bd0393db00b4c4018cd157ad6fbf54ccf9ea2cbad7995da0
                                        • Opcode Fuzzy Hash: cacc51e63eff8bc27502df48bef2ca2e162a879b432f6904293fcb735aa6e41a
                                        • Instruction Fuzzy Hash: 0A31DB71954109BADF11AFA2CD02FEE7E75AF04348F10443AB610740E2DB7A9A60AB69
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTempPathA.KERNEL32(00000104,?,Software\WinRAR,?,?,?,?,0040FAAA,Client Hash,?,?,?), ref: 004027B5
                                          • Part of subcall function 00401000: 756A4620.OLE32(00000000,00000001,?,?,00402094,?,?,?,?,004103E4), ref: 0040100E
                                        • 756D19A0.OLE32(?,?,?,00000000,?,00000000,?,?,?,?,00000104,?,Software\WinRAR,?,?), ref: 00402837
                                        • GlobalFix.KERNEL32(?), ref: 00402843
                                        • GlobalUnWire.KERNEL32(?), ref: 00402865
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DF5
                                          • Part of subcall function 00401DD4: lstrlen.KERNEL32(?,?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000), ref: 00401DFF
                                          • Part of subcall function 00401DD4: lstrcpy.KERNEL32(00000000,?), ref: 00401E13
                                          • Part of subcall function 00401DD4: lstrcat.KERNEL32(00000000,?), ref: 00401E1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Globallstrcatlstrcpy$A4620PathTempWire
                                        • String ID: Software\WinRAR
                                        • API String ID: 736744956-224198155
                                        • Opcode ID: 1bc4a5afd911ec56f7c296e2f58174c65cd95b73ef1e1d2cda9ce479f616601f
                                        • Instruction ID: 6de8235985a4e012031a15d511cfb711ca9816c49f2bad4b93719ad3a4c48ce6
                                        • Opcode Fuzzy Hash: 1bc4a5afd911ec56f7c296e2f58174c65cd95b73ef1e1d2cda9ce479f616601f
                                        • Instruction Fuzzy Hash: 81212C7690010DBADF05BBA2CD4ADDE7A7DAF04348F108576BA04F10E1DBB9DE909B18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040478D
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 004047C6
                                        • StrStrIA.SHLWAPI(?,Line), ref: 004047F7
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000001,00000000,00000000,?,Line), ref: 0040487C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: Line
                                        • API String ID: 4012628704-1898322888
                                        • Opcode ID: 00f49f2164cfccc038cfa0bf51d9e808ffcedcf99f1b24101f4ab87a3df4a7b6
                                        • Instruction ID: 96b309fa3d8d30f1d5783b5218dd4bef2efb828f215c902116ecbc2af092ee0c
                                        • Opcode Fuzzy Hash: 00f49f2164cfccc038cfa0bf51d9e808ffcedcf99f1b24101f4ab87a3df4a7b6
                                        • Instruction Fuzzy Hash: FF214B7580011CFADF21AB91CC41BEEBBB9BF44304F10C4B6B644B11A0CB799B919F99
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E2FD
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E336
                                        • StrStrIA.SHLWAPI(?,.wjf,00000000,000007FF,?,?), ref: 0040E37D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E3AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID: .wjf
                                        • API String ID: 4012628704-198459012
                                        • Opcode ID: 7df8208f6d8b9fbd9f03756490d0bef1432451b6ad5a77d764c6cd9b028255f7
                                        • Instruction ID: a39f0cc25358ef3fe378c5470b51181d1204abcc80f0feab624c8e793c0f5b93
                                        • Opcode Fuzzy Hash: 7df8208f6d8b9fbd9f03756490d0bef1432451b6ad5a77d764c6cd9b028255f7
                                        • Instruction Fuzzy Hash: B7112C3191010CBADF11AB92CC01BEEBFB9BF00304F0484B6B904B10A0DBB99BA19F95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0040277F: GetTempPathA.KERNEL32(00000104,?,Software\WinRAR,?,?,?,?,0040FAAA,Client Hash,?,?,?), ref: 004027B5
                                          • Part of subcall function 0040277F: 756D19A0.OLE32(?,?,?,00000000,?,00000000,?,?,?,?,00000104,?,Software\WinRAR,?,?), ref: 00402837
                                          • Part of subcall function 0040277F: GlobalFix.KERNEL32(?), ref: 00402843
                                          • Part of subcall function 0040277F: GlobalUnWire.KERNEL32(?), ref: 00402865
                                        • 756C6F40.OLE32(?,00000000,HWID,?), ref: 004044F9
                                        • wsprintfA.USER32 ref: 00404540
                                        • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,HWID,?), ref: 0040454C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$PathTempWirelstrlenwsprintf
                                        • String ID: HWID${%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                                        • API String ID: 1250355450-1100116640
                                        • Opcode ID: 313ff0071286941cb880cc1c36ba716fa840869ebded599ce7aff12e9312e8a8
                                        • Instruction ID: 3095b530aed22146c5ad806403ae0e42f89d383abe0f1a9f1724f7095cfc90b4
                                        • Opcode Fuzzy Hash: 313ff0071286941cb880cc1c36ba716fa840869ebded599ce7aff12e9312e8a8
                                        • Instruction Fuzzy Hash: 1C115BA68041987DCB61E6F64C05EFFBAFC5D0C205B1400ABB7A0E20C2D57DD7409B38
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409CDC
                                          • Part of subcall function 00409BA6: StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                          • Part of subcall function 00409BA6: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                          • Part of subcall function 00409BA6: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                          • Part of subcall function 00409BA6: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409D21
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\
                                        • API String ID: 3062143572-2631691096
                                        • Opcode ID: 894ffc9cf653845bb4616532f4e8c5797a19884fb5ffe7d35fcafcbfd7067fdd
                                        • Instruction ID: ac8f48867af314f8120b7c81e644b7f5cce5841a03552995b2f05bc08e48feab
                                        • Opcode Fuzzy Hash: 894ffc9cf653845bb4616532f4e8c5797a19884fb5ffe7d35fcafcbfd7067fdd
                                        • Instruction Fuzzy Hash: 23F01D71680208BACB10AF91CC43FC97B65AB54758F618066BA05750E3DBBD9AD09B5C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409E19
                                          • Part of subcall function 00409BA6: StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                          • Part of subcall function 00409BA6: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                          • Part of subcall function 00409BA6: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                          • Part of subcall function 00409BA6: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409E5E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: SeaMonkey$Software\Mozilla$\Mozilla\SeaMonkey\
                                        • API String ID: 3062143572-164276155
                                        • Opcode ID: cabea9b5cee6c2f4a086e29282497f301371a421d3fa787b8fb0a948d5f26e0c
                                        • Instruction ID: 1a02e282308be8e293e02f173dc651cb04350ae71c26ba7f143dd056e4a95337
                                        • Opcode Fuzzy Hash: cabea9b5cee6c2f4a086e29282497f301371a421d3fa787b8fb0a948d5f26e0c
                                        • Instruction Fuzzy Hash: 06F030B0A80208BACB10AF91CC43FDD3A69AB44748F114166B648750E3DBB9DAD19B5C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409EA0
                                          • Part of subcall function 00409BA6: StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                          • Part of subcall function 00409BA6: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                          • Part of subcall function 00409BA6: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                          • Part of subcall function 00409BA6: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409EE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Flock$Software\Mozilla$\Flock\Browser\
                                        • API String ID: 3062143572-1276807325
                                        • Opcode ID: 12ae3cc360cc347b6ed7f42ad4a061b79ba278fb8cf64f622ff722e30480d196
                                        • Instruction ID: a1154479a53383609def9f1c5618678725f64423bda0b2487eecab4fa5f649e3
                                        • Opcode Fuzzy Hash: 12ae3cc360cc347b6ed7f42ad4a061b79ba278fb8cf64f622ff722e30480d196
                                        • Instruction Fuzzy Hash: CCF03A70A80248BEEF10EF91CC47FCD3A65AB44748F214166BA08750E3DBB9DAD09B5C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409F27
                                          • Part of subcall function 00409BA6: StrStrIA.SHLWAPI(?,?), ref: 00409BB2
                                          • Part of subcall function 00409BA6: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409C29
                                          • Part of subcall function 00409BA6: RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C55
                                          • Part of subcall function 00409BA6: RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000800,?,?), ref: 00409C9D
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00409F6C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectory$CloseEnumOpen
                                        • String ID: Mozilla$Software\Mozilla$\Mozilla\Profiles\
                                        • API String ID: 3062143572-2716603926
                                        • Opcode ID: dec9201f8b07fefaa26df5f619087dd1d83cd244068640bdecf8cdb5474dbdfa
                                        • Instruction ID: 856e83eb3368eacf35aedb28de63341b0b3bd2119f8fd71623a28586f55a65dc
                                        • Opcode Fuzzy Hash: dec9201f8b07fefaa26df5f619087dd1d83cd244068640bdecf8cdb5474dbdfa
                                        • Instruction Fuzzy Hash: F7F03070680208BACB10AF91DC47FCD3A79AB44748F114066BA04750E3DBB9DBD49B5C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B2290,3D-FTP), ref: 0040C9EA
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: 3D-FTP$\3D-FTP$\SiteDesigner$sites.ini
                                        • API String ID: 1884169789-4074339522
                                        • Opcode ID: e730872d66c1f5c9dd6b490c5f7fd60bb1f98691bce16d44a80439a71d1d54ef
                                        • Instruction ID: 8192517b5594e50964869f632d02b595f24cc106a1d64f8e283138a1e08fffc8
                                        • Opcode Fuzzy Hash: e730872d66c1f5c9dd6b490c5f7fd60bb1f98691bce16d44a80439a71d1d54ef
                                        • Instruction Fuzzy Hash: 161151B0600105B9DB11BB728C43FAF3E599B8178CF11413B7914B55E3DBBCDA5196AC
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?), ref: 0040AE57
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AE8B
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AF73
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC14
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC27
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC3A
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC4D
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC60
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC73
                                          • Part of subcall function 0040ABA8: wsprintfA.USER32 ref: 0040AC86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$CloseEnumOpen
                                        • String ID: SiteServers
                                        • API String ID: 1693054222-2402683488
                                        • Opcode ID: 58bd38f031dc513c390d68e5366677cee3399b2056e8071abc0a33e61efa7b84
                                        • Instruction ID: 8459014f039a0a84bd9aa5f3e094c7e6e2aadf1454260e4fbffc6eb5301dd480
                                        • Opcode Fuzzy Hash: 58bd38f031dc513c390d68e5366677cee3399b2056e8071abc0a33e61efa7b84
                                        • Instruction Fuzzy Hash: 7C311E7190021CEADF21AB91CC02BDEBAB9BF04344F14C0B6B144710A1CF795B929F9A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408C9B
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408CCF
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408D6E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID: MRU
                                        • API String ID: 1332880857-344939820
                                        • Opcode ID: 76c651e43131b734bd85b2e6db83d97133d120864182c8ee642e878c4378d59b
                                        • Instruction ID: 0084d24c220240b52ec936078940ff440fafe8c638699adad89ba2b41403c2d0
                                        • Opcode Fuzzy Hash: 76c651e43131b734bd85b2e6db83d97133d120864182c8ee642e878c4378d59b
                                        • Instruction Fuzzy Hash: 5121183194410CBADF11AF51CD02BDEBABABF00344F1085BAB554B50A1DFB99B91AF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00401C5A
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401C75
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,00000000,?,?,?,00000000), ref: 00401CAB
                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,?,?,?,00000000,?,?), ref: 00401CCD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: QueryValue$CloseOpen
                                        • String ID:
                                        • API String ID: 1586453840-0
                                        • Opcode ID: 3506204eec1300c9fd2521453c2ae32e1fc0146e8e5aaca90c259f7dded7bded
                                        • Instruction ID: 360f4102227be2a7bea43436c032bb289b6fc87370e38f427ef6ca43fb260b94
                                        • Opcode Fuzzy Hash: 3506204eec1300c9fd2521453c2ae32e1fc0146e8e5aaca90c259f7dded7bded
                                        • Instruction Fuzzy Hash: 60215931648109FBEF11DEA0CD46AEF7BAAEB41344F104036F910A62A0E778CE91DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrcmpiA.KERNEL32(00000000,logins), ref: 0040BDB3
                                        • lstrcmp.KERNEL32(table,?), ref: 0040BDE8
                                          • Part of subcall function 0040BA61: StrStrIA.SHLWAPI(?,() ), ref: 0040BA71
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmplstrcmpi
                                        • String ID: logins$table
                                        • API String ID: 3524194181-3800951466
                                        • Opcode ID: fa18e4dd0982b67242fe996442a32f625b3320ce83fbbff7b722e99f140c80bd
                                        • Instruction ID: 3a40c41565500e902701e1848d039f58d080df20437b0215aab75c5c9d5ede82
                                        • Opcode Fuzzy Hash: fa18e4dd0982b67242fe996442a32f625b3320ce83fbbff7b722e99f140c80bd
                                        • Instruction Fuzzy Hash: 3A31E97280020DFACF21DF90CC45EDE7B79EB05324F10467AB620B11E1D7799A599B9C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "password" : "
                                        • API String ID: 0-2310853927
                                        • Opcode ID: 7650465f5cf3c874b7e65bb6c3d8d2b77c1dfef899e0c979675bf05806f7e479
                                        • Instruction ID: 45aba81232741d314ac5a34a4e752bc44468cee2c465cabd3be2dbe885248bde
                                        • Opcode Fuzzy Hash: 7650465f5cf3c874b7e65bb6c3d8d2b77c1dfef899e0c979675bf05806f7e479
                                        • Instruction Fuzzy Hash: B021A13290404ABACF01AB61DC02DFF7E69AF45354F114037F802B51A1D7794EA0A7AA
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,0040281B,00000000,?,00000000,?,?,?,?), ref: 004011E6
                                        • ReadFile.KERNEL32(00000001,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?,0040281B,00000000,?), ref: 0040120A
                                        • CloseHandle.KERNEL32(00000001,00000001,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?,0040281B,00000000), ref: 00401216
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleRead
                                        • String ID:
                                        • API String ID: 1035965006-0
                                        • Opcode ID: 50cf0d4a8abcb61ab1f7dbba7f21a5e0faee21dc4003284f941313b7acaaea2d
                                        • Instruction ID: 9a8629f224f69e54f689e61892df27772ad9712273c938ebafa7b15970847946
                                        • Opcode Fuzzy Hash: 50cf0d4a8abcb61ab1f7dbba7f21a5e0faee21dc4003284f941313b7acaaea2d
                                        • Instruction Fuzzy Hash: 34016D31A8010CBAEF21AA91CC42FDDBA68EB14749F104067B640B81E0DAF59BE49B58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • wsprintfA.USER32 ref: 0040D27F
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocalwsprintf
                                        • String ID: FTP Count$FTP File%d$SOFTWARE\Robo-FTP 3.7\Scripts
                                        • API String ID: 988369812-376751567
                                        • Opcode ID: 838302b0cbbaf92f0ec7b52adb3b95b28ebc4cce17ba5b2e21be763f73931f6d
                                        • Instruction ID: 733166de7694fff61650cae4219a8b91f3663e04ca220c69e26ca0c91532b7c9
                                        • Opcode Fuzzy Hash: 838302b0cbbaf92f0ec7b52adb3b95b28ebc4cce17ba5b2e21be763f73931f6d
                                        • Instruction Fuzzy Hash: 96015E70D40109FAEF10AAD0CC45EEE7A79AF00358F1080BBF910B11D0DBB9CB889A19
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000105), ref: 00401E64
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00401E99
                                        • KA, xrefs: 00401E7D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocFolderLocalPath
                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$KA
                                        • API String ID: 1254228173-2615768160
                                        • Opcode ID: d5d357410ab83e98cf9bbd3f5a2a5c0ffe0def8a915ad7b865be8bdc77fa2d19
                                        • Instruction ID: 6fd8fff447d07906f10b5f8dbf392f76df401ed06715ae1cca096ad24fd244de
                                        • Opcode Fuzzy Hash: d5d357410ab83e98cf9bbd3f5a2a5c0ffe0def8a915ad7b865be8bdc77fa2d19
                                        • Instruction Fuzzy Hash: 83017176A04209EBDF10DB50DD01F9EBBA5AB40754F208277E905BA2E0D778AA40DB8D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B25B0,Odin), ref: 0040A05E
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID: Odin$SiteInfo.QFP
                                        • API String ID: 2826327444-4277389770
                                        • Opcode ID: 4c7248ef04e8f1490200b2f0e740a78defcc5c193a6946ac1caef0c963654f21
                                        • Instruction ID: d439cf8bf0481c86074634a938aa210d067d705921936e6cd1a06c5d2c247eac
                                        • Opcode Fuzzy Hash: 4c7248ef04e8f1490200b2f0e740a78defcc5c193a6946ac1caef0c963654f21
                                        • Instruction Fuzzy Hash: A90184705002087AD7217A318C06FBB3E55AB82394F24417BBD45751E2DA7C9A9196EE
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040754F
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407583
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004075E6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpenValue
                                        • String ID:
                                        • API String ID: 4012628704-0
                                        • Opcode ID: db33a7c6a886425c088a00926d5cd44eaeee36640faa36180f72b49ad5f95758
                                        • Instruction ID: ff976bc959ca2582d7f9fb6c7aa1900dc22499e6707232f63fb9872b5199db0c
                                        • Opcode Fuzzy Hash: db33a7c6a886425c088a00926d5cd44eaeee36640faa36180f72b49ad5f95758
                                        • Instruction Fuzzy Hash: 2C110A3190410CFADF21AF90CC41BDEBBBABF04304F1085B6B554B11A0DBB9AB919F99
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00403779
                                        • connect.WSOCK32(00000000,00000002,00000010,00000000,00403E6F,00000010,00000002,00000001,00000006,00000000), ref: 004037D5
                                        • closesocket.WSOCK32(00000000,00000000,00000002,00000010,00000000,00403E6F,00000010,00000002,00000001,00000006,00000000), ref: 004037E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: closesocketconnectsocket
                                        • String ID:
                                        • API String ID: 643388700-0
                                        • Opcode ID: e54a13f195557317363138ba1c468d66cb1ca040bdcacf83dc864eb48c4e15a9
                                        • Instruction ID: a1857349bc829c1bc20843199a046abb25a1bdb55ef10f43378bc7cb5178758d
                                        • Opcode Fuzzy Hash: e54a13f195557317363138ba1c468d66cb1ca040bdcacf83dc864eb48c4e15a9
                                        • Instruction Fuzzy Hash: 330144F1910208AADF109E658C81FEE766C6B10729F10C63BF921A71D1D7BC9B849A1A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F329
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F35D
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F3B7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: 8574643922b93c115619fa754c947736bc9450eabf62dfeac87d4b84afb7821b
                                        • Instruction ID: 462c752db9e27f47ae53204000debf6e585b0193fea08707f7ce4c04aeeaebcb
                                        • Opcode Fuzzy Hash: 8574643922b93c115619fa754c947736bc9450eabf62dfeac87d4b84afb7821b
                                        • Instruction Fuzzy Hash: 5411523191010CBACF11AF91CC02FEE7B79BF04304F1081B6B910B41E1DBB99A959F98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F28A
                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F2BA
                                        • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F30D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumOpen
                                        • String ID:
                                        • API String ID: 1332880857-0
                                        • Opcode ID: 8d0953e888e0d619827c180b3e218068bec35f8f5354f062792c62cfbc32bfbb
                                        • Instruction ID: ad9791ee34dc053147e0e202f980dc9d486fdf301f14b13ae9b05856cabc288a
                                        • Opcode Fuzzy Hash: 8d0953e888e0d619827c180b3e218068bec35f8f5354f062792c62cfbc32bfbb
                                        • Instruction Fuzzy Hash: 5911613590010CBADF21AF51CC02FEEBB79BF00304F1080B6B514751E1DBB99A949F98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(?,EasyFTP,80000002,SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32,00000000,00000000), ref: 0040CB15
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        • SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32, xrefs: 0040CAF7
                                        • EasyFTP, xrefs: 0040CB0D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: EasyFTP$SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
                                        • API String ID: 1884169789-2776585315
                                        • Opcode ID: 0653eb3be4ab3f6b26213f4cfba9692d49c28e75d2c1db3c20ed1d3e16125c4c
                                        • Instruction ID: b39278b18dbf8c26ca4307c2e89347ed2fbb3e3fb77695099482c5910f249660
                                        • Opcode Fuzzy Hash: 0653eb3be4ab3f6b26213f4cfba9692d49c28e75d2c1db3c20ed1d3e16125c4c
                                        • Instruction Fuzzy Hash: 9DF03670A40208FADF117BA2DC43F9D7D259B40748F20417ABA14781F2DAB9AB90965C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00407DF7
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$DirectoryFreeLocalWindowslstrcatlstrcpy
                                        • String ID: \32BitFtp.ini
                                        • API String ID: 2776971706-1260517637
                                        • Opcode ID: 5f27a85529b51448f4a4cfa6a7ad899e7577aa2ea05404c79be7375b835871cc
                                        • Instruction ID: 1389ecb65f354701ace5dcb0f9ef147cc3b7d0dfef94225e7727ab2b5740e0a4
                                        • Opcode Fuzzy Hash: 5f27a85529b51448f4a4cfa6a7ad899e7577aa2ea05404c79be7375b835871cc
                                        • Instruction Fuzzy Hash: 03F01270A00108BADB10BB61CC42FDE7A699B40784F504077B644B91F2DAB9AF909A9D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: .xml
                                        • API String ID: 1659193697-2937849440
                                        • Opcode ID: e6cce209fdb9d1f3e95dca0f6ca33f6c3ccdce671c612e0a0f5651d69d88af7a
                                        • Instruction ID: c45dfb1794c4f98016c9ca4be0e2f08c057de663647413feea2da31215a0b00a
                                        • Opcode Fuzzy Hash: e6cce209fdb9d1f3e95dca0f6ca33f6c3ccdce671c612e0a0f5651d69d88af7a
                                        • Instruction Fuzzy Hash: D8F03031800108FACF11FFD1CC46ECDBA75AB54318F108066B610B11E1C7799B60EB48
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileA.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401EEA
                                        • CloseHandle.KERNEL32(00000000,?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401EF7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateFileHandle
                                        • String ID:
                                        • API String ID: 3498533004-0
                                        • Opcode ID: fa646eff9556507df081fc50559438c4630db0e396a331f2fe6041c822879479
                                        • Instruction ID: ae53e0fa8e9e6530ccfc04697b2f27395322c80062e4a93ded0919953aad80eb
                                        • Opcode Fuzzy Hash: fa646eff9556507df081fc50559438c4630db0e396a331f2fe6041c822879479
                                        • Instruction Fuzzy Hash: 36E04F7239034437FB311669DC83F5A39C85711758F104432B741BD2E1D5E9E9C1425C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • inet_addr.WSOCK32(00000006,?,004037C4,00000000,00403E6F,00000010,00000002,00000001,00000006,00000000), ref: 00403736
                                        • gethostbyname.WSOCK32(00000006,00000006,?,004037C4,00000000,00403E6F,00000010,00000002,00000001,00000006,00000000), ref: 00403743
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: gethostbynameinet_addr
                                        • String ID:
                                        • API String ID: 1594361348-0
                                        • Opcode ID: 7aab4fff7dc92cfc0c5571e637043328c6e422358fab4e9098a4952ffd73172e
                                        • Instruction ID: fdc356c81ba0950dfb6492ac3d983a2c0d3c8ba02eba1d65fe839404965df06e
                                        • Opcode Fuzzy Hash: 7aab4fff7dc92cfc0c5571e637043328c6e422358fab4e9098a4952ffd73172e
                                        • Instruction Fuzzy Hash: A8E046B42086059BCA20AE3CC9508553B98AB223B9B10C332F135EB2F1E7B8DA915649
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTickCount.KERNEL32 ref: 0041045A
                                        • ExitProcess.KERNEL32(00000000), ref: 00410478
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CountExitProcessTick
                                        • String ID:
                                        • API String ID: 232575682-0
                                        • Opcode ID: 1601a99006e50a2f21b94e678d2f417ae5db69e4e24824a71b1a815281a00afd
                                        • Instruction ID: 76dbcd441a10d5e0a871c7e97b5f494e5c4a0d931a8fcfb06eb2bf694422bdfd
                                        • Opcode Fuzzy Hash: 1601a99006e50a2f21b94e678d2f417ae5db69e4e24824a71b1a815281a00afd
                                        • Instruction Fuzzy Hash: A6C08C3030830881D54872A348C67FA320747C1704F60801BE78A0068B5CDC8CD2105F
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,0040FBA3,?,out.bin,?,?,?,?,?,het2563783920299393,?), ref: 004013C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: bf7dddda83a23b081a6631e27631dc37d4935e9c7fd66d2cd68a7ebe89652b8f
                                        • Instruction ID: 4126e1cfcb80788e4bd4fd358d88d7f4ec4d3cc9a087a1ea26b0b77c28cea769
                                        • Opcode Fuzzy Hash: bf7dddda83a23b081a6631e27631dc37d4935e9c7fd66d2cd68a7ebe89652b8f
                                        • Instruction Fuzzy Hash: EAE0A932900118ABDF10CAA99C00BCE37A8AB01368F000126BE00E22D0E2B4DB50C7A8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00410365: OleInitialize.OLE32(00000000), ref: 00410371
                                          • Part of subcall function 00410365: GetUserNameA.ADVAPI32(00000101,00000101), ref: 004103C1
                                          • Part of subcall function 0040FBE5: DeleteFileA.KERNEL32(out.bin), ref: 0040FBFD
                                          • Part of subcall function 0040FCF4: GetTempPathA.KERNEL32(00000104,?,?,00000000,00000002), ref: 0040FDD8
                                          • Part of subcall function 0040FCF4: GetTickCount.KERNEL32 ref: 0040FDF0
                                          • Part of subcall function 0040FCF4: wsprintfA.USER32 ref: 0040FE02
                                          • Part of subcall function 0040FCF4: CreateDirectoryA.KERNEL32(?,00000000), ref: 0040FE13
                                          • Part of subcall function 0040FCF4: lstrlen.KERNEL32(true,?,?,?,?,?,?,00000000), ref: 0040FE7B
                                          • Part of subcall function 0040FCF4: ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0040FEA4
                                        • RevertToSelf.ADVAPI32(00410476), ref: 00410436
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CountCreateDeleteDirectoryExecuteFileInitializeNamePathRevertSelfShellTempTickUserlstrlenwsprintf
                                        • String ID:
                                        • API String ID: 163229844-0
                                        • Opcode ID: 43a47021052f348c67490d8baaaef851d14be7feaee73a82a7c7b13bb8f783ba
                                        • Instruction ID: c2b2c459d4f3131f17968ebac81e274493c59280bd2fcc7cfa71c51367c22b11
                                        • Opcode Fuzzy Hash: 43a47021052f348c67490d8baaaef851d14be7feaee73a82a7c7b13bb8f783ba
                                        • Instruction Fuzzy Hash: 5ED0E2340081498AD634BBE7E40B7D97264AB8030DF40403FAA28195A38EFD64C8CA7F
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • 756A4620.OLE32(00000000,00000001,?,?,00402094,?,?,?,?,004103E4), ref: 0040100E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: A4620
                                        • String ID:
                                        • API String ID: 934745325-0
                                        • Opcode ID: 694c167474c0dfd59027bfa7c2f8b8999a17ec50b574406e1e4598e2457a9e08
                                        • Instruction ID: 0e1ccdeaae2e50ef4e3fbd726c8f2877eddf4e537a0dea00bc73588f11d81fdc
                                        • Opcode Fuzzy Hash: 694c167474c0dfd59027bfa7c2f8b8999a17ec50b574406e1e4598e2457a9e08
                                        • Instruction Fuzzy Hash: 6EB0923229830C73D900A6C79C03F9ABB8E8712BDDF404022FB04195C2A8E7F49045FE
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?,?,0040FBF8), ref: 00403F7A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: 7df5d39bd2bc21a575aa06a073d27cb6af8f425282ba96693159ee74942c5319
                                        • Instruction ID: aba3f0e108bbccd6d8ca16cf18e3eb1068e5b9bd50e50806624e825c33f7b6ca
                                        • Opcode Fuzzy Hash: 7df5d39bd2bc21a575aa06a073d27cb6af8f425282ba96693159ee74942c5319
                                        • Instruction Fuzzy Hash: 3EB092716502082AEA60A2959C439D6729C4784748F4001A22A59D12C2EAE5AAD046EA
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLocal
                                        • String ID:
                                        • API String ID: 2826327444-0
                                        • Opcode ID: e8b050af7f5d4fe545539575eef37c7cc8d28c8bcebf108ac9adcdc01ee4e4a6
                                        • Instruction ID: 0d8446eb084247163ccf276440f997019e00a14f4af04307f291ee44eff1aacc
                                        • Opcode Fuzzy Hash: e8b050af7f5d4fe545539575eef37c7cc8d28c8bcebf108ac9adcdc01ee4e4a6
                                        • Instruction Fuzzy Hash: 0DC09B3210050C95DB017E29C94979A7AD49B1034CF40C13A670A545B1D6B8D6D0C5D8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocLocal
                                        • String ID:
                                        • API String ID: 3494564517-0
                                        • Opcode ID: aba469e8528c38fbaab4b91b12f2fc01ae083fd98e22b8c0648389a00a9df608
                                        • Instruction ID: 1e41da6711c349d1d124233a92d60bce5fcb9c2ff25215b5fa1125c3ceaaafcc
                                        • Opcode Fuzzy Hash: aba469e8528c38fbaab4b91b12f2fc01ae083fd98e22b8c0648389a00a9df608
                                        • Instruction Fuzzy Hash: 87B092B120020866E250AA4ACC43F5A738C9B10B4CF008025BB89A6282C8ACF89042AD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 0040980C
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 00409839
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 00409856
                                        • FindNextFileA.KERNEL32(?,?,00000000,00000000,?,?,00414878,00000000,?,signons2.txt,00000000,?,signons.txt,?,?,signons.sqlite), ref: 004099EC
                                        • FindClose.KERNEL32(?,?,?,00000000,00000000,?,?,00414878,00000000,?,signons2.txt,00000000,?,signons.txt,?,?), ref: 004099FF
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*$prefs.js$signons.sqlite$signons.txt$signons2.txt$signons3.txt
                                        • API String ID: 3040542784-1405255088
                                        • Opcode ID: c0e3445f6c7bf564489c4521663a8725be2fbb8e8ef013301ba80350ce93a115
                                        • Instruction ID: 7546c2d62aa80fe2aa9564e1f970277903f6330b81d1b4f844cbc22609c5f1f3
                                        • Opcode Fuzzy Hash: c0e3445f6c7bf564489c4521663a8725be2fbb8e8ef013301ba80350ce93a115
                                        • Instruction Fuzzy Hash: A1513371515109BADF21BF21CD02EEE7A69AF44344F1080BBB808B51F2DB799EE09B5D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WTSGetActiveConsoleSessionId.KERNEL32(?,?,00410393), ref: 00402C94
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00402CAB
                                        • Process32First.KERNEL32(?,00000128), ref: 00402CCC
                                        • StrStrIA.SHLWAPI(?,explorer.exe), ref: 00402CE5
                                        • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe), ref: 00402D09
                                        • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402D33
                                        • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402D4B
                                        • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402D58
                                        • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402D79
                                        • CloseHandle.KERNEL32(?), ref: 00402DD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: OpenProcess$SessionUser$ActiveCloseConsoleCreateCurrentFirstHandleImpersonateLoggedProcess32SnapshotTokenToolhelp32
                                        • String ID: explorer.exe
                                        • API String ID: 4004126742-3187896405
                                        • Opcode ID: f137f71e0cf7206a0a9841fe11de0cbdf895c44152ebb0cc8a0c6cd9c5e5f0c7
                                        • Instruction ID: 80f96a81feff115561b21dd2c5c1f781314d07a2527130def0814cdd83e5aabb
                                        • Opcode Fuzzy Hash: f137f71e0cf7206a0a9841fe11de0cbdf895c44152ebb0cc8a0c6cd9c5e5f0c7
                                        • Instruction Fuzzy Hash: 01312830904218ABEF219BA1DD49BEEBBB5AF04304F1440B6A109B11E1DBF99ED0DF58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrcmpiA.KERNEL32(?), ref: 004101DA
                                        • LogonUserA.ADVAPI32(?,00000000,?,00000002,00000000,00000000), ref: 004101FF
                                        • lstrlen.KERNEL32(?,?), ref: 0041021C
                                        • LCMapStringA.KERNEL32(00000400,00000100,?,00000000,?,00000000,?,?), ref: 00410233
                                        • LogonUserA.ADVAPI32(?,00000000,?,00000002,00000000,00000000), ref: 00410253
                                        • 74781B10.USERENV(00000000,00000020,?,?), ref: 004102D4
                                        • ImpersonateLoggedOnUser.ADVAPI32(00000000,00000000,00000020,?,?), ref: 004102FF
                                        • RevertToSelf.ADVAPI32 ref: 00410317
                                        • 74775030.USERENV(00000000,00000000), ref: 00410333
                                        • CloseHandle.KERNEL32(00000000), ref: 0041033B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: User$Logon$7477503074781CloseHandleImpersonateLoggedRevertSelfStringlstrcmpilstrlen
                                        • String ID: 123456
                                        • API String ID: 2044773668-158520161
                                        • Opcode ID: 38ac66364ed91d90a3bac56536676a16fde9495ed8b40369ce38bc4c01b687b5
                                        • Instruction ID: fb1762dc24d166e9a50452407b7b7654efa4ec112ac7bb4c164af592c2f49943
                                        • Opcode Fuzzy Hash: 38ac66364ed91d90a3bac56536676a16fde9495ed8b40369ce38bc4c01b687b5
                                        • Instruction Fuzzy Hash: 11514D70904208EBEF119F91DD4ABEEBBB4EB44304F148066E914A91A1C7F99AC4DF6D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0040A213: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A24C
                                          • Part of subcall function 0040A213: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A255
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A4F5
                                        • lstrcmpiA.KERNEL32(?,Internet Explorer), ref: 0040A57F
                                        • lstrcmpiA.KERNEL32(?,WininetCacheCredentials), ref: 0040A59E
                                        • lstrcmpiA.KERNEL32(?,MS IE FTP Passwords), ref: 0040A5BD
                                        • StrStrIA.SHLWAPI(?,DPAPI: ,?,Internet Explorer), ref: 0040A5D6
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A61C
                                        • LocalFree.KERNEL32(?), ref: 0040A649
                                        • 757283B0.OLE32(00000000,?,DPAPI: ,?,Internet Explorer), ref: 0040A673
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpi$757283ByteCharMultiWide$CryptDataFreeLocalUnprotect
                                        • String ID: DPAPI: $Internet Explorer$MS IE FTP Passwords$WininetCacheCredentials
                                        • API String ID: 627727140-3076635702
                                        • Opcode ID: 60b1f32297af17e4e10a32dd4bc549fbb0ba2bfe9cc4c7d87dc6be52430ef8f8
                                        • Instruction ID: 794cdaff84bda6d365b61e9a8852a29cff5631a3b904cff23ad5b8ebcc9ad4bd
                                        • Opcode Fuzzy Hash: 60b1f32297af17e4e10a32dd4bc549fbb0ba2bfe9cc4c7d87dc6be52430ef8f8
                                        • Instruction Fuzzy Hash: C041087190021DEADF219E50CC06FDA7BBABF04304F0884A5B68875190DBB69AE59FD9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040BC57
                                        • LocalFree.KERNEL32(00000000,?), ref: 0040BC92
                                        • lstrlen.KERNEL32(ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BCD3
                                        • StrCmpNIA.SHLWAPI(?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BCE1
                                        • lstrlen.KERNEL32(http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BCEF
                                        • StrCmpNIA.SHLWAPI(?,http://,00000000,http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BCFD
                                        • lstrlen.KERNEL32(https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD0B
                                        • StrCmpNIA.SHLWAPI(?,https://,00000000,https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD19
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$CryptDataFreeLocalUnprotect
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 3968356742-2804853444
                                        • Opcode ID: 331f3d6d67d61976f4712a64636ed4c548e403247095080d7d4a29aee9b52a40
                                        • Instruction ID: 8351e5f6c6a0477d6aeecf54171f9faea76a1fb005a52368d20adab0c64d5811
                                        • Opcode Fuzzy Hash: 331f3d6d67d61976f4712a64636ed4c548e403247095080d7d4a29aee9b52a40
                                        • Instruction Fuzzy Hash: 0B51D832900109FACF11AFA1ED41EEEBB76EF48314F10803AF511B11B1DBB99A90DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 0040893B
                                        • lstrcmpiA.KERNEL32(00414FB7,?), ref: 00408964
                                        • lstrcmpiA.KERNEL32(00414FB9,?), ref: 00408981
                                        • FindNextFileA.KERNEL32(?,?,?,?,00000000,?,?,0000013E,?,*.*,?), ref: 00408A28
                                        • FindClose.KERNEL32(?,?,?,?,?,00000000,?,?,0000013E,?,*.*,?), ref: 00408A3B
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                        • String ID: *.*$\*.*
                                        • API String ID: 3040542784-1692270452
                                        • Opcode ID: 889b49942b60e717c5dfdc58fd796fc3f27b44c717d640296b66b767db5a688c
                                        • Instruction ID: 0aac3493151d849b9660535c2e8f243adfcc3abc402c78e02e81f0dcabda1697
                                        • Opcode Fuzzy Hash: 889b49942b60e717c5dfdc58fd796fc3f27b44c717d640296b66b767db5a688c
                                        • Instruction Fuzzy Hash: 11314971500219AADF10BF21CD02AEE77A9AF40358F5085BBB848B41F2DF789AD19F59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlen.KERNEL32(00000000), ref: 0040CE4C
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040CEB2
                                        • LocalFree.KERNEL32(00000000), ref: 0040CED9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID: full address:s:$password 51:b:$username:s:
                                        • API String ID: 2920030623-2945746679
                                        • Opcode ID: 0e9fddc388509d62ac9ca2bb52fbf3cf92f52818fd0bb13f240246181c19d271
                                        • Instruction ID: 0984a1be6890704ebbff172737cff0cfc94e19684cbfdf0b232a4fc0267eb49e
                                        • Opcode Fuzzy Hash: 0e9fddc388509d62ac9ca2bb52fbf3cf92f52818fd0bb13f240246181c19d271
                                        • Instruction Fuzzy Hash: 0F415C72900109EADF11ABE1CD46BEEBB76EB48354F10413AF200751E0D7794A92EBAD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CredEnumerateA.ADVAPI32(Microsoft_WinInet_*,00000000,00000000,00000000), ref: 0040A949
                                        • lstrlenW.KERNEL32(0041639C,?,?,00000000), ref: 0040A987
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A9B7
                                        • LocalFree.KERNEL32(00000000), ref: 0040A9E9
                                        • CredFree.ADVAPI32(00000000), ref: 0040AA07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CredFree$CryptDataEnumerateLocalUnprotectlstrlen
                                        • String ID: Microsoft_WinInet_*
                                        • API String ID: 3891647360-439986189
                                        • Opcode ID: 6bc5565b68c3fab29fc41d8dd35a86a5111eb9588d1cefe63ec32a6628ce454e
                                        • Instruction ID: ae180cc94281e80a9b3f510bb0b8c6b5d159eb8324337d50b50576de84fed9ba
                                        • Opcode Fuzzy Hash: 6bc5565b68c3fab29fc41d8dd35a86a5111eb9588d1cefe63ec32a6628ce454e
                                        • Instruction Fuzzy Hash: 75310B72900319EBDF208F80D906BEEBAB4EB04315F154437E551B22D0D7B9AAD4DF5A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlen.KERNEL32(?), ref: 0040AAA3
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AB5B
                                        • LocalFree.KERNEL32(00000000), ref: 0040AB8E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotectlstrlen
                                        • String ID:
                                        • API String ID: 2920030623-0
                                        • Opcode ID: aca203fca2c292c3878eb53a2403bbf756569052ad600388594fca40a24639fc
                                        • Instruction ID: 6d2d069e92f2cc43aa6f5316afe46d378ce3715e6c7e2418831a2ac0e8414c5e
                                        • Opcode Fuzzy Hash: aca203fca2c292c3878eb53a2403bbf756569052ad600388594fca40a24639fc
                                        • Instruction Fuzzy Hash: AC31C772700205DEEF10DE94D8447DEB776EB85374F504033EA55A62C4D2BCAA92CB5E
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404392
                                        • LocalFree.KERNEL32(00000000), ref: 004043C6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataFreeLocalUnprotect
                                        • String ID:
                                        • API String ID: 1561624719-0
                                        • Opcode ID: 419006c8269edb1e464a434cdab2c8d40ef7aacc427657610423dade58205d01
                                        • Instruction ID: 64ccaad8e84a739c418eb17eda20de40f92f4d60509c99c6112d7b47e1b31eaf
                                        • Opcode Fuzzy Hash: 419006c8269edb1e464a434cdab2c8d40ef7aacc427657610423dade58205d01
                                        • Instruction Fuzzy Hash: 57112875A04208EBDF11CE94DC85BDEBB74FB84321F04A16AFA15662D0C3B8AA50CB58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                        • Instruction ID: b7e3113e8801cfbcad074f1540c8a22c696d16e2493e177de40566de1df7e52d
                                        • Opcode Fuzzy Hash: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                        • Instruction Fuzzy Hash: C8121E73405A015BE75DCE2ECCC0692B3E3BBD826435BD63DC46AC3A45FE74B61A8648
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b26ebc4c7d77bafc6c35da520b3d1324df530f5d9ff365d266474bf427b053c
                                        • Instruction ID: 585ed6edc08be7f31ae12c7c837fed29d0e6329ec7f184bb6c581b3135195a8f
                                        • Opcode Fuzzy Hash: 7b26ebc4c7d77bafc6c35da520b3d1324df530f5d9ff365d266474bf427b053c
                                        • Instruction Fuzzy Hash: 8271B137F5063647E7588DAA8881155E7E2ABCC330B1B827DDE19B7381C9B4BD12C6C0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: #2c$#2d$#2e$---$ftp.$ftp://$http://$https://
                                        • API String ID: 0-1526611526
                                        • Opcode ID: c372d982930eb1be75027a304718f6181a674625a34993b384a8363f7841d544
                                        • Instruction ID: 51592c5461e711964ebbd6ab28f0f9b1264f80a8c139525cc44f247c9abd7eca
                                        • Opcode Fuzzy Hash: c372d982930eb1be75027a304718f6181a674625a34993b384a8363f7841d544
                                        • Instruction Fuzzy Hash: C5913871910109FADF11AFA1CC46BEEBAB1AF40348F24403BF101721E2D7B94E91DB49
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins$ftp.$ftp://$http://$https://$mozsqlite3.dll$sqlite3.dll
                                        • API String ID: 0-3560805513
                                        • Opcode ID: 4b4ab0abe1af05efa19a305ad9a7510dba107dc022380ad11772837395dd05cf
                                        • Instruction ID: 1dcba70c7437c6143af35969b0408e9c31eeae21ca1c03492374e53ac29062d3
                                        • Opcode Fuzzy Hash: 4b4ab0abe1af05efa19a305ad9a7510dba107dc022380ad11772837395dd05cf
                                        • Instruction Fuzzy Hash: FC512E30900109BADF11ABA1DC46BEF7B75AB48348F118437B911B01E3DBBD8EA1DA5D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • wsprintfA.USER32 ref: 0040AC14
                                        • wsprintfA.USER32 ref: 0040AC27
                                        • wsprintfA.USER32 ref: 0040AC3A
                                        • wsprintfA.USER32 ref: 0040AC4D
                                        • wsprintfA.USER32 ref: 0040AC60
                                        • wsprintfA.USER32 ref: 0040AC73
                                        • wsprintfA.USER32 ref: 0040AC86
                                          • Part of subcall function 0040AA8E: lstrlen.KERNEL32(?), ref: 0040AAA3
                                          • Part of subcall function 0040AA8E: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040AB5B
                                          • Part of subcall function 0040AA8E: LocalFree.KERNEL32(00000000), ref: 0040AB8E
                                          • Part of subcall function 00401553: lstrlen.KERNEL32(00000000), ref: 0040155F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wsprintf$Locallstrlen$AllocCryptDataFreeUnprotect
                                        • String ID: %s\Keychain$SiteServer %d-User$SiteServer %d-User PW$SiteServer %d\Host$SiteServer %d\Remote Directory$SiteServer %d\SFTP$SiteServer %d\WebUrl
                                        • API String ID: 3846021373-1012938452
                                        • Opcode ID: 980e5504d8c115ad4e21079b8b69587aa3f2b5bb8ea418ef85d838cf9be7efe8
                                        • Instruction ID: 75919cae40a4d2d709e4aa0b5e63dbbe22f6960ca7ee49d7892696dfe970731f
                                        • Opcode Fuzzy Hash: 980e5504d8c115ad4e21079b8b69587aa3f2b5bb8ea418ef85d838cf9be7efe8
                                        • Instruction Fuzzy Hash: C0617932840209BBDF027F91DC06BED7E72AF04349F14803AF615341B2DB7A5A60EB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 0040A213: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A24C
                                          • Part of subcall function 0040A213: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A255
                                          • Part of subcall function 0040A25E: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A29A
                                          • Part of subcall function 0040A25E: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A2A3
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040F4F8
                                        • lstrcmpiA.KERNEL32(?,identification), ref: 0040F578
                                        • lstrcmpiA.KERNEL32(?,identitymgr), ref: 0040F58D
                                        • lstrcmpiA.KERNEL32(?,inetcomm server passwords), ref: 0040F5B0
                                        • lstrcmpiA.KERNEL32(?,outlook account manager passwords), ref: 0040F5CF
                                        • lstrcmpiA.KERNEL32(?,identities), ref: 0040F5EE
                                        • 757283B0.OLE32(00000000,?,inetcomm server passwords,?,identification), ref: 0040F64F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpi$757283ByteCharMultiWide
                                        • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                                        • API String ID: 70865654-4287852900
                                        • Opcode ID: b3ed34c4ef78ed893cb30f717b6821dbf54382717ddac9e1049adf005edbe619
                                        • Instruction ID: a0ab9d88b1f10c463517a237764fde3d1ce25513b77a4bf1dbd62d82b8744c41
                                        • Opcode Fuzzy Hash: b3ed34c4ef78ed893cb30f717b6821dbf54382717ddac9e1049adf005edbe619
                                        • Instruction Fuzzy Hash: 36416B3184021CBBEF219F50CD41FDA777ABB05304F0041BABA08751A1DB799AD9DF98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(?,explorer.exe), ref: 00402CE5
                                        • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe), ref: 00402D09
                                        • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402D33
                                        • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402D4B
                                        • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402D58
                                        • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402D79
                                        • CloseHandle.KERNEL32(?), ref: 00402D9E
                                        • CloseHandle.KERNEL32(?,?), ref: 00402DA6
                                        • CloseHandle.KERNEL32(?), ref: 00402DB0
                                        • Process32Next.KERNEL32(?,00000128), ref: 00402DC2
                                        • CloseHandle.KERNEL32(?), ref: 00402DD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$OpenProcess$User$CurrentImpersonateLoggedNextProcess32SessionToken
                                        • String ID: explorer.exe
                                        • API String ID: 3144406365-3187896405
                                        • Opcode ID: 2c3a6b3b18d1fcf3669920605c3fee46c97806abe90232a462653ee64428c0ca
                                        • Instruction ID: 61759fd9a12f878b3820a4f3c1b866933e0d6fabdd712de451ce6ca25805fb19
                                        • Opcode Fuzzy Hash: 2c3a6b3b18d1fcf3669920605c3fee46c97806abe90232a462653ee64428c0ca
                                        • Instruction Fuzzy Hash: 86213D30910118EADF229B61DD49BEEBBB5AF48344F5444B2E209B11D0DBB89E90DF58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00402886: lstrlen.KERNEL32(?), ref: 004028BA
                                        • StrStrIA.SHLWAPI(?,004164F4), ref: 0040B9BA
                                        • lstrcmpiA.KERNEL32(CONSTRAINT,?), ref: 0040B9DC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcmpilstrlen
                                        • String ID: CONSTRAINT$origin_url$password_value$username_value
                                        • API String ID: 3649823140-2401479949
                                        • Opcode ID: a8764ea77b61e29b8e5a6e4171f6d1d9797fc09401321421f18521d2bdc65dc3
                                        • Instruction ID: f685491af45cc0edf845bf23aec539453f18404267560d711e037803d2abf3a9
                                        • Opcode Fuzzy Hash: a8764ea77b61e29b8e5a6e4171f6d1d9797fc09401321421f18521d2bdc65dc3
                                        • Instruction Fuzzy Hash: 13112436610105BACF116B25ED029DE7E92EB553D8B108137F904A81E2E7FDC9D1DB9C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403DC2
                                        • InternetCreateUrlA.WININET(0000003C,80000000,?,00000FFF), ref: 00403DED
                                        • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403E33
                                        • wsprintfA.USER32 ref: 00403E58
                                          • Part of subcall function 00403D21: 6F7013D0.WSOCK32(00000000,0000FFFF,00000080,00000001,00000004), ref: 00403D46
                                        • lstrlen.KERNEL32(?,?,?,00000000,?,00001000,00001000,00001000,?,http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php), ref: 00403E83
                                        • closesocket.WSOCK32(?,?,?,00000000,?,?,?,00000000,?,00001000,00001000,00001000,?,http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php), ref: 00403ECE
                                        Strings
                                        • http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php, xrefs: 00403D55
                                        • POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403E50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$Crack$AllocCreateF7013Localclosesocketlstrlenwsprintf
                                        • String ID: POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)$http://assuredexpresscourierservice.com/ponzy/Panelnew/gate.php
                                        • API String ID: 2517972182-3868779159
                                        • Opcode ID: bb3e3b4fd3ec5c1ff5c88ca5596cb1cfdb1a3769d735cd724bc80ca0a184d7a3
                                        • Instruction ID: 99dd0531e5b50bd1ca442355d66483c78bf3825efe148b4941b465404c6eb75e
                                        • Opcode Fuzzy Hash: bb3e3b4fd3ec5c1ff5c88ca5596cb1cfdb1a3769d735cd724bc80ca0a184d7a3
                                        • Instruction Fuzzy Hash: A4411771D00209EADF11AFE1CC02BEEBF79AF0834AF10843AF510B51A1DBB95A55DB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IsRelative$Path$Profile$profiles.ini
                                        • API String ID: 0-4107377610
                                        • Opcode ID: c317263945a844b6323ef6b7038bb48236796fd01312d34b7ada260587488d7a
                                        • Instruction ID: d49d151cd00c8449482fd7066ba74ba1d1f42644035631f5e2f7a3949e9f9dcd
                                        • Opcode Fuzzy Hash: c317263945a844b6323ef6b7038bb48236796fd01312d34b7ada260587488d7a
                                        • Instruction Fuzzy Hash: D4412C31A00145BADF22BB619C02EAE7F72AF40354F10857BF510741F2DBB99EA0AA0C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                          • Part of subcall function 00401000: 756A4620.OLE32(00000000,00000001,?,?,00402094,?,?,?,?,004103E4), ref: 0040100E
                                        • StrStrIA.SHLWAPI(?,Content-Length:), ref: 00403A6A
                                        • lstrlen.KERNEL32(Content-Length:,00000000,?,Content-Length:), ref: 00403A7B
                                        • StrToIntA.SHLWAPI(00000001,00000001,00000000,Content-Length:,00000000,?,Content-Length:), ref: 00403A9C
                                        • StrStrIA.SHLWAPI(?,Location:,?,Content-Length:), ref: 00403AB3
                                        • lstrlen.KERNEL32(Location:,00000000,?,Location:,?,Content-Length:), ref: 00403AC4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$A4620AllocLocal
                                        • String ID: Content-Length:$Location:
                                        • API String ID: 1693019524-2400408565
                                        • Opcode ID: 5a81746410196628eacdf4b0b69d3752541f29e8998123741318a4ab2e9f68ba
                                        • Instruction ID: 1c31b5951b0d4a1fea606432ab76704204899d64c0837fce94a8943c545e2ffb
                                        • Opcode Fuzzy Hash: 5a81746410196628eacdf4b0b69d3752541f29e8998123741318a4ab2e9f68ba
                                        • Instruction Fuzzy Hash: 4741D731A00109BBDB10AFA5CC45F9EFF79EF84348F208177B510B62D2DB799E519A18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004043E2
                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004043FA
                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040440B
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,IsWow64Process,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0040441A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                        • String ID: GetNativeSystemInfo$IsWow64Process$kernel32.dll
                                        • API String ID: 977827838-3073145729
                                        • Opcode ID: d89bf223b516b2b5c3bf7b5c6859306d62a0f163648f40d30ca2940edfcde853
                                        • Instruction ID: a29710691b65247f7f358f9775bec8096cec6cfe148fbc4112c463d630bd321e
                                        • Opcode Fuzzy Hash: d89bf223b516b2b5c3bf7b5c6859306d62a0f163648f40d30ca2940edfcde853
                                        • Instruction Fuzzy Hash: 8BF0547275020566C710B6B95C85BDB3998ABC07A9F640477B301E32C1E9FCDDC156B8
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <setting name="$value="
                                        • API String ID: 0-3468128162
                                        • Opcode ID: 568c91be562d3e1df9af82e9fa7545178b2b982b68e4bc6011ef3cde071d8f43
                                        • Instruction ID: 64e65757d8a37c5a5f9911f77b1fa4fa96c74c21bc44b6a91aa3e6444326f239
                                        • Opcode Fuzzy Hash: 568c91be562d3e1df9af82e9fa7545178b2b982b68e4bc6011ef3cde071d8f43
                                        • Instruction Fuzzy Hash: 6231A472D042599EDF11BBA18C41AEE7FB09F19358F24807BF810B72A1D27C8A44D7A9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,00000010), ref: 00401FA6
                                        • GetFileSize.KERNEL32(00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?,00000010), ref: 00401FB3
                                        • CreateFileMappingA.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00401FC7
                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?,00000010), ref: 00401FDC
                                        • CloseHandle.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 00401FEB
                                        • CloseHandle.KERNEL32(?,?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00401FF2
                                        • CloseHandle.KERNEL32(?,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,?,00000010), ref: 00402001
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$Create$MappingSizeView
                                        • String ID:
                                        • API String ID: 3733816638-0
                                        • Opcode ID: 5402e36d897fe00d6c5eda343ae42a3c5a999aea72ee2717090a1a605893d8f0
                                        • Instruction ID: 70f0788b45e56b44b6f65b14faa8049f33ab5b7f6ec7609eed77a17493459cc4
                                        • Opcode Fuzzy Hash: 5402e36d897fe00d6c5eda343ae42a3c5a999aea72ee2717090a1a605893d8f0
                                        • Instruction Fuzzy Hash: 5E110C70280300BAFB313F758CC7F557A95AB11B18F208667B714BD1E6D6F9A8909B2D
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ftp://$http://$https://
                                        • API String ID: 0-2804853444
                                        • Opcode ID: f925647f1f0ea18c36a96e8f7c32391451ded1c47e08f317bdc124b70499a044
                                        • Instruction ID: 9617f7fa89dc7d90dcf64577492be8de2fb61544bb98ccf0a348361b01d63dae
                                        • Opcode Fuzzy Hash: f925647f1f0ea18c36a96e8f7c32391451ded1c47e08f317bdc124b70499a044
                                        • Instruction Fuzzy Hash: 7661E536800108FADF11AF91CD45AEEBBB9EF00348F10847AB941B51A1DB799B95DB98
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "/>$winex="
                                        • API String ID: 0-1498080979
                                        • Opcode ID: cb3e7aacaace6dc8c572e8db98ef2a31cb4e8caad440a50edb48dcac4a2a1b9c
                                        • Instruction ID: d7502f7128f9e22f9db50603c6b45870a41d1199c3b8ea06a20df3d29db1909c
                                        • Opcode Fuzzy Hash: cb3e7aacaace6dc8c572e8db98ef2a31cb4e8caad440a50edb48dcac4a2a1b9c
                                        • Instruction Fuzzy Hash: AA311E32D00119BADF12ABA2CC029EE7F76AF45344F108436F504BA1B1D77D4A61EBA9
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B2290,FTPCON), ref: 00408105
                                        • StrStrIA.SHLWAPI(006B25B0,FTP CONTROL,00000000,006B2290,FTPCON), ref: 00408111
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .prf$FTP CONTROL$FTPCON$\Profiles
                                        • API String ID: 0-2908215140
                                        • Opcode ID: af7678ea54c6d7e83370da1709093329bd211e4838e9484d4a95d65fd3992d42
                                        • Instruction ID: 11fd9ce4be86486324026821f99b54408b2214f25c7d40684eee46501fa31574
                                        • Opcode Fuzzy Hash: af7678ea54c6d7e83370da1709093329bd211e4838e9484d4a95d65fd3992d42
                                        • Instruction Fuzzy Hash: E7019274600505B9EB116B21AE06FEF3A59DFC5354F24803BB980751E2DF7C5A92839C
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlen.KERNEL32(?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DF5
                                        • lstrlen.KERNEL32(?,?,?,?,00402121,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000), ref: 00401DFF
                                        • lstrcpy.KERNEL32(00000000,?), ref: 00401E13
                                        • lstrcat.KERNEL32(00000000,?), ref: 00401E1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID: zHA$zHA
                                        • API String ID: 2414487701-480364551
                                        • Opcode ID: ab86ba303397b9f2348f48aeaa521f6aefbf09b07a80a4300d47dbbe4f98d049
                                        • Instruction ID: 8b37fdabcf36789b156c54182cd8e00d2e5b157c566c2e2177da2ae7ce6b411f
                                        • Opcode Fuzzy Hash: ab86ba303397b9f2348f48aeaa521f6aefbf09b07a80a4300d47dbbe4f98d049
                                        • Instruction Fuzzy Hash: 4DF01D75100208BBDF007F62CCC5ADA3A99AB1439DF00D03AB90918162D7BDCAD4CB48
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                        • lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                        • lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                        • lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID: zHA$zHA
                                        • API String ID: 2414487701-480364551
                                        • Opcode ID: 43a9188ad48df52fcd211765efbcd998f03af9dab7f5a4a44919339bc32caac1
                                        • Instruction ID: bac4a1e7535149610e86cff04dae95b0c1e00a8dfa7a2735dff3dc94aa57c328
                                        • Opcode Fuzzy Hash: 43a9188ad48df52fcd211765efbcd998f03af9dab7f5a4a44919339bc32caac1
                                        • Instruction Fuzzy Hash: F2F01C75100208BBDF007F62CCC1BAA3B98AB1436DF00D43AB91A19152D7BDC9D48B58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • 756D19A0.OLE32(?,?,?,?,0040FB47,?,het2563783920299393,?,?,?,?,?,?,?), ref: 004019C2
                                        • GlobalFix.KERNEL32(?), ref: 004019DD
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GlobalUnWire.KERNEL32(?), ref: 00401A05
                                        • lstrlen.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,0040FB47,?,het2563783920299393,?), ref: 00401A0D
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: GlobalLocal$AllocFreeWirelstrlen
                                        • String ID: CRYPTED0YUI1.0
                                        • API String ID: 165658394-1217275205
                                        • Opcode ID: d5b2edf301e0b19e7f9d926448e9ee749efd36a87a527b2f9109211bfae2f530
                                        • Instruction ID: e66fff3640afbef68db500a5f6a3419cd31f49da7f2248a0ca716e1f74be16f5
                                        • Opcode Fuzzy Hash: d5b2edf301e0b19e7f9d926448e9ee749efd36a87a527b2f9109211bfae2f530
                                        • Instruction Fuzzy Hash: 4911997190010CBEDF02BFA2CC469DD7F76AF04348F00817AB915B51B2D77A9BA5AB58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • 756D19A0.OLE32(?,?), ref: 0040F9D6
                                        • StrStrIA.SHLWAPI(00000000,STATUS-IMPORT-OK,?,?,?), ref: 0040FA2A
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GlobalFix.KERNEL32(?), ref: 0040F9F7
                                        • GlobalUnWire.KERNEL32(?), ref: 0040FA0F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Global$AllocLocalWire
                                        • String ID: STATUS-IMPORT-OK
                                        • API String ID: 1001023476-1591331578
                                        • Opcode ID: 3b79bee3aad427c17b5cbb5ec1259b4c648c36121bfd20428410bd6b7f9e2157
                                        • Instruction ID: 0345fb9e22b96943ae5b273897e63c39bffcc8a70edd58180d66b1a2d0bdc23e
                                        • Opcode Fuzzy Hash: 3b79bee3aad427c17b5cbb5ec1259b4c648c36121bfd20428410bd6b7f9e2157
                                        • Instruction Fuzzy Hash: A2015271E0020CBBCF11BBA6CC42ADE7B79AB01348F00817AB914B11A1DB7D9A909F58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DA1
                                          • Part of subcall function 00401D80: lstrlen.KERNEL32(?,?,?,?,0040210A,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,00414878,004103E4,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00401DAB
                                          • Part of subcall function 00401D80: lstrcpy.KERNEL32(00000000,?), ref: 00401DBF
                                          • Part of subcall function 00401D80: lstrcat.KERNEL32(00000000,?), ref: 00401DC8
                                        • lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                        • StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                        • StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                        • lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$lstrcatlstrcpy
                                        • String ID: .exe
                                        • API String ID: 2414487701-4119554291
                                        • Opcode ID: eadaedbb1cfc7f83df8ada029020d54368334349577809477187e1cfe4a1502b
                                        • Instruction ID: 36a56975336c099ffd2d8b31021cc982b1ea5de44761deb063e6c4def44b5941
                                        • Opcode Fuzzy Hash: eadaedbb1cfc7f83df8ada029020d54368334349577809477187e1cfe4a1502b
                                        • Instruction Fuzzy Hash: C4F0A43120418169DB2122258D45B6FBE859B92794F240077F500AA2C2DBFC9892D2AD
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: <POP3_Password2
                                        • API String ID: 0-2923094552
                                        • Opcode ID: f40e378ea3deaea659920f8b1a8c06c3522a4e58d0ba40cf07cf61ba3bea1e0d
                                        • Instruction ID: 85e2fa67560d9302a211698be468c48ee400464bf04242985954bf7aad8feac9
                                        • Opcode Fuzzy Hash: f40e378ea3deaea659920f8b1a8c06c3522a4e58d0ba40cf07cf61ba3bea1e0d
                                        • Instruction Fuzzy Hash: 9A414F32D00019EACF126FA2DC018EE7E75EF58354F144836F500B61B1D77A9E61EB69
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CD05
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 0040CD2B
                                        • StrStrIA.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CD4F
                                        • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CD71
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CD5C
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharLocalMultiWidelstrlen$AllocFree
                                        • String ID:
                                        • API String ID: 1890766102-0
                                        • Opcode ID: 578418fc7bcd325b5c328d84ee3871d199b7bb3c6e674be6750e99564a1c833b
                                        • Instruction ID: 950733df85081b8baef2ce3e821bd38e555ba366813178238e01664e0b4b5f12
                                        • Opcode Fuzzy Hash: 578418fc7bcd325b5c328d84ee3871d199b7bb3c6e674be6750e99564a1c833b
                                        • Instruction Fuzzy Hash: E4213E75904208FEEF116BA5CC46F9E7F65EF04314F20817AF214B91E1D6B95A90DB18
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B25B0,FTP Navigator), ref: 00405B58
                                        • StrStrIA.SHLWAPI(006B25B0,FTP Commander,006B25B0,FTP Navigator), ref: 00405B86
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(?,?,00000000), ref: 004023C7
                                          • Part of subcall function 004023B3: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000), ref: 004023E6
                                          • Part of subcall function 004023B3: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 004023F8
                                          • Part of subcall function 004023B3: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000), ref: 0040240A
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$FreeLocal
                                        • String ID: FTP Commander$FTP Navigator$ftplist.txt
                                        • API String ID: 1884169789-2424314702
                                        • Opcode ID: b5105679f145d7d8e6eec2e0b52da286a011aa3134454faa6819a7f3f03d7e7a
                                        • Instruction ID: fe82fe6e90897ec5cd13b343a9372e5f1a85e7b3ceb16ddb2802c156e8cf4ffb
                                        • Opcode Fuzzy Hash: b5105679f145d7d8e6eec2e0b52da286a011aa3134454faa6819a7f3f03d7e7a
                                        • Instruction Fuzzy Hash: BC01A170500514BAD7127A318C02FEF3EAADB81394F24417BB941B11E6DABCBB8196AC
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • StrStrIA.SHLWAPI(006B2290,FTPNow), ref: 0040CF81
                                        • StrStrIA.SHLWAPI(006B2290,FTP Now,006B2290,FTPNow), ref: 0040CF92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: FTP Now$FTPNow$sites.xml
                                        • API String ID: 0-284577462
                                        • Opcode ID: 36e7f9c5659af322cc4604641f50b424a1c2f773f3706934a5ffef1e65d3d5b0
                                        • Instruction ID: 213c2a5bc47c119f791ab7f98c1af6563890b02d517a402ea43778fe9881e924
                                        • Opcode Fuzzy Hash: 36e7f9c5659af322cc4604641f50b424a1c2f773f3706934a5ffef1e65d3d5b0
                                        • Instruction Fuzzy Hash: 14F0F971604106F6DB113B308C82FAF7E675B82754F14023BB914B11E2EBBDC991935E
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000001,?,?,0000001B), ref: 00408355
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00408376
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$FreeLocal
                                        • String ID: =]A$=]A
                                        • API String ID: 2558778219-2356571529
                                        • Opcode ID: f5392809da4e97842b6c0a124a11a289fb2760198d93a2d6872ef86484b84526
                                        • Instruction ID: a07e87b81fbf63e1f7cd2b55d4491ea6016a46608c31ce1bd3c6608630a26919
                                        • Opcode Fuzzy Hash: f5392809da4e97842b6c0a124a11a289fb2760198d93a2d6872ef86484b84526
                                        • Instruction Fuzzy Hash: 19518C72900218AFDF10AEA5DC05BDE7BA5FB80354F14843AF950B72E1DBB99A41CA54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C511
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C533
                                        • StgOpenStorage.OLE32(?,00000000,00000012,00000000,00000000,?,00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?), ref: 0040C547
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$OpenStorage
                                        • String ID: Settings
                                        • API String ID: 2489594185-473154195
                                        • Opcode ID: a125fe5c6889891c2edec72a8b9da39d0711abbc8f6fd8be8313648f20cad14a
                                        • Instruction ID: 1412ce5b06427f1e7f2d1f9f269c5891ac56a43792e0d13f6f6fe7247e384bbc
                                        • Opcode Fuzzy Hash: a125fe5c6889891c2edec72a8b9da39d0711abbc8f6fd8be8313648f20cad14a
                                        • Instruction Fuzzy Hash: C931FB31A40119FBDF11AF91CC42F9EBB72EF04704F208166B611791F1D775AA60EB58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • 756D19A0.OLE32(?,?), ref: 0040176D
                                        • GlobalFix.KERNEL32(?), ref: 00401788
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GlobalUnWire.KERNEL32(?), ref: 004017E6
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Strings
                                        • PKDFILE0YUICRYPTED0YUI1.0, xrefs: 004017F5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: GlobalLocal$AllocFreeWire
                                        • String ID: PKDFILE0YUICRYPTED0YUI1.0
                                        • API String ID: 3297799765-258907703
                                        • Opcode ID: 5e09e2bf95299194e7cdf3c8928cec3bfb1b3111da40aee99d994fb1cf1c5239
                                        • Instruction ID: c4d1b6a3fd02974b16804ec155f0a4c8182cffeec8d1a58f5097f2fdb6db5798
                                        • Opcode Fuzzy Hash: 5e09e2bf95299194e7cdf3c8928cec3bfb1b3111da40aee99d994fb1cf1c5239
                                        • Instruction Fuzzy Hash: 0221EC72D00109BBDF017FA1CC42AEE7E75EF10344F10817ABA15B51B1E77A9AA0AB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: http://$https://
                                        • API String ID: 0-1916535328
                                        • Opcode ID: c4307a9287bec6a90849f8bf961f39c0404a1c8c24e60cd3e7331d5c173a9fc4
                                        • Instruction ID: 41ce756acc717e199ee392518a78b021118ff23315c0196b1d538706b8c3fa3f
                                        • Opcode Fuzzy Hash: c4307a9287bec6a90849f8bf961f39c0404a1c8c24e60cd3e7331d5c173a9fc4
                                        • Instruction Fuzzy Hash: 71410431800109FADF12AF91DE05BEE7B72AF00348F10807AB955391F1CB7A5BA0EB59
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00401A7E
                                        • 756D19A0.OLE32(?,?,?,?,0040FB71,?,?,?,?,het2563783920299393,?,?,?,?,?,?), ref: 00401A97
                                        • GlobalFix.KERNEL32(?), ref: 00401AB2
                                          • Part of subcall function 00401857: LocalAlloc.KERNEL32(00000040,-00000080,?,00402BFC,00000000), ref: 00401865
                                        • GlobalUnWire.KERNEL32(?), ref: 00401ADA
                                          • Part of subcall function 00401840: LocalFree.KERNEL32(00000000,?,00402C4E), ref: 0040184C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: GlobalLocal$AllocCountFreeTickWire
                                        • String ID:
                                        • API String ID: 2192416133-0
                                        • Opcode ID: d9f248c6715539e0d7a973d98ddf4c427bdc0a4b663e31ea1848b9a53d8a9627
                                        • Instruction ID: ac97b9097a96585b02e242887629d9e56a2fc451f1bd220e0e1e9af6774a4305
                                        • Opcode Fuzzy Hash: d9f248c6715539e0d7a973d98ddf4c427bdc0a4b663e31ea1848b9a53d8a9627
                                        • Instruction Fuzzy Hash: 1521BB7190010CBEDF01AFE2CC429DDBB7AAF04348F0081BAB615B5171DB799BA5AB58
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                          • Part of subcall function 00401553: lstrlen.KERNEL32(00000000), ref: 0040155F
                                        • StrStrIA.SHLWAPI(?,004167D2,?,?,?,?,BEEF0000), ref: 0040CBD2
                                        • lstrlen.KERNEL32(TERMSRV/,?,004167D2,?,?,?,?,BEEF0000), ref: 0040CBE0
                                        • StrStrIA.SHLWAPI(?,TERMSRV/,TERMSRV/,?,004167D2,?,?,?,?,BEEF0000), ref: 0040CBF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: TERMSRV/
                                        • API String ID: 1659193697-3001602198
                                        • Opcode ID: 3308349c2c745b9c98c75ff8abcedb94289f5204497221864e12c9f5c3b68721
                                        • Instruction ID: b543e856546b57c185fba9a240777293963b9a97424846c08820ecae6b6d1267
                                        • Opcode Fuzzy Hash: 3308349c2c745b9c98c75ff8abcedb94289f5204497221864e12c9f5c3b68721
                                        • Instruction Fuzzy Hash: 70116A31410109FBCF026F65CC429DE3F62AF54798F10853AB925751F1DB7ADAB1AB88
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • lstrlen.KERNEL32(?), ref: 00408FDE
                                        • SetCurrentDirectoryA.KERNEL32(?,?), ref: 00408FFF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentDirectorylstrlen
                                        • String ID: nss3.dll
                                        • API String ID: 2713697268-2492180550
                                        • Opcode ID: 2704a775cf98d981e9e5d31d1997e689d11d62f77da8a69e01f38d93aee08f7f
                                        • Instruction ID: bb59387fe3b84fef708d5d902a87d96e659b25fa5f879baa748375427f6edae3
                                        • Opcode Fuzzy Hash: 2704a775cf98d981e9e5d31d1997e689d11d62f77da8a69e01f38d93aee08f7f
                                        • Instruction Fuzzy Hash: 21118470900115DBDB106F34EC49BDA7FA1BB48348F108036F806B42E2E7B98995DA4E
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CredEnumerateA.ADVAPI32(TERMSRV/*,00000000,00000000,00000000), ref: 0040CC83
                                        • CredFree.ADVAPI32(00000000), ref: 0040CCCA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1635081490.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1635057083.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635121114.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1635143318.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_820.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Cred$EnumerateFree
                                        • String ID: TERMSRV/*
                                        • API String ID: 3403564193-275249402
                                        • Opcode ID: 7754422b856914a7ef7ea4e0f41e5edee12a2a7f001b95978b4fbc810bcf661c
                                        • Instruction ID: bf1fb700776914984d8e825650e55169ba0e85d0ae4d6ead4279b935a8f1250c
                                        • Opcode Fuzzy Hash: 7754422b856914a7ef7ea4e0f41e5edee12a2a7f001b95978b4fbc810bcf661c
                                        • Instruction Fuzzy Hash: 5B112131408208EBEF318F98D989BDEB7B5EB04315F14427BD545722E0D379AE84EB99
                                        Uniqueness

                                        Uniqueness Score: -1.00%