Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6038732).vbs

Overview

General Information

Sample name:6038732).vbs
renamed because original name is a hash value
Original sample name: _(PO_46038732).vbs
Analysis ID:1419946
MD5:9ccb8c031d05f56b6f480305f2ab46af
SHA1:46b59f675728e4952912e707ad5c2b53d05bd5bf
SHA256:679f185b79a90236b1d85ef1fc7716dab2784ef51e0d3a0e36b9f0772aa6bb32
Tags:vbs
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected Lokibot
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Potential malicious VBS script found (has network functionality)
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to load missing DLLs
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6852 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • x.exe (PID: 5728 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 86428E9EEC10E20491350EBEF66CF118)
      • aspnet_compiler.exe (PID: 2760 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://bertol-metal.site/PWS/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
    00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
        • 0x187f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
        00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
        • 0x53bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
        Click to see the 21 entries
        SourceRuleDescriptionAuthorStrings
        2.2.x.exe.40fd2a0.2.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          2.2.x.exe.40fd2a0.2.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          2.2.x.exe.40fd2a0.2.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          2.2.x.exe.40fd2a0.2.unpackLoki_1Loki Payloadkevoreilly
          • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
          • 0x133fc:$a2: last_compatible_version
          2.2.x.exe.40fd2a0.2.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
          • 0x123ff:$des3: 68 03 66 00 00
          • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
          • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
          Click to see the 32 entries

          System Summary

          barindex
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", ProcessId: 6852, ProcessName: wscript.exe
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 5728, ParentProcessName: x.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 2760, ProcessName: aspnet_compiler.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs", ProcessId: 6852, ProcessName: wscript.exe
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://kbfvzoboss.bid/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.win/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.trade/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.top/alien/fre.phpURL Reputation: Label: malware
          Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: HEUR/AGEN.1323805
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://bertol-metal.site/PWS/fre.php"]}
          Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 37%
          Source: C:\Users\user\AppData\Local\Temp\x.exeVirustotal: Detection: 33%Perma Link
          Source: 6038732).vbsVirustotal: Detection: 13%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
          Source: Binary string: March_PO.pdbXA source: wscript.exe, 00000000.00000003.2142335097.00000286E2164000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2147261887.00000286E3106000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141170460.00000286E2DF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2146556146.00000286E2810000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000002.00000000.2140926311.0000000000CB2000.00000002.00000001.01000000.00000006.sdmp, x.exe.0.dr
          Source: Binary string: March_PO.pdb source: wscript.exe, 00000000.00000003.2142335097.00000286E2164000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2147261887.00000286E3106000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141170460.00000286E2DF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2146556146.00000286E2810000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000002.00000000.2140926311.0000000000CB2000.00000002.00000001.01000000.00000006.sdmp, x.exe.0.dr
          Source: Binary string: BATMAN.pdbxD source: x.exe, 00000002.00000002.2146973436.0000000005580000.00000004.08000000.00040000.00000000.sdmp, x.exe, 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: aspnet_compiler.pdb source: 31437F.exe.3.dr
          Source: Binary string: BATMAN.pdb source: x.exe, 00000002.00000002.2146973436.0000000005580000.00000004.08000000.00040000.00000000.sdmp, x.exe, 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00403D74 FindFirstFileW,3_2_00403D74
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F1285C
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F145F0
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F145E4
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F149C0
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F149B4
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02F13D1D

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
          Source: Malware configuration extractorURLs: https://bertol-metal.site/PWS/fre.php
          Source: Initial file: obj3.SaveToFile obj4.BuildPath(obj5, "x.exe"), 2
          Source: unknownDNS traffic detected: query: bertol-metal.site replaycode: Name error (3)
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00404ED4 recv,3_2_00404ED4
          Source: unknownDNS traffic detected: queries for: bertol-metal.site
          Source: aspnet_compiler.exe, aspnet_compiler.exe, 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

          System Summary

          barindex
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: x.exe PID: 5728, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: Process Memory Space: aspnet_compiler.exe PID: 2760, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: C:\Windows\System32\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}Jump to behavior
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F112D82_2_02F112D8
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F112C92_2_02F112C9
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F15A382_2_02F15A38
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F15C812_2_02F15C81
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F15C432_2_02F15C43
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_0040549C3_2_0040549C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_004029D43_2_004029D4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0041219C appears 45 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00405B6F appears 42 times
          Source: 6038732).vbsInitial sample: Strings found which are bigger than 50
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ntmarta.dllJump to behavior
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: x.exe PID: 5728, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: Process Memory Space: aspnet_compiler.exe PID: 2760, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: x.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: x.exe.0.dr, TQu9uYZqjckwZJ3vo0.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, TQu9uYZqjckwZJ3vo0.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
          Source: classification engineClassification label: mal100.troj.spyw.evad.winVBS@5/5@26/0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,3_2_0040434D
          Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.logJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
          Source: C:\Users\user\AppData\Local\Temp\x.exeMutant created: NULL
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs"
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 6038732).vbsVirustotal: Detection: 13%
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
          Source: Binary string: March_PO.pdbXA source: wscript.exe, 00000000.00000003.2142335097.00000286E2164000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2147261887.00000286E3106000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141170460.00000286E2DF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2146556146.00000286E2810000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000002.00000000.2140926311.0000000000CB2000.00000002.00000001.01000000.00000006.sdmp, x.exe.0.dr
          Source: Binary string: March_PO.pdb source: wscript.exe, 00000000.00000003.2142335097.00000286E2164000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2147261887.00000286E3106000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141170460.00000286E2DF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2146556146.00000286E2810000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000002.00000000.2140926311.0000000000CB2000.00000002.00000001.01000000.00000006.sdmp, x.exe.0.dr
          Source: Binary string: BATMAN.pdbxD source: x.exe, 00000002.00000002.2146973436.0000000005580000.00000004.08000000.00040000.00000000.sdmp, x.exe, 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: aspnet_compiler.pdb source: 31437F.exe.3.dr
          Source: Binary string: BATMAN.pdb source: x.exe, 00000002.00000002.2146973436.0000000005580000.00000004.08000000.00040000.00000000.sdmp, x.exe, 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("C:\Users\user\AppData\Local\Temp\x.exe");
          Source: x.exe.0.dr, cnXxnsKdSMBfecO5Dq.cs.Net Code: dyfPQu9uY System.Reflection.Assembly.Load(byte[])
          Source: x.exe.0.dr, p7Z4bI6upEkiMwFWOe.cs.Net Code: p7Z64bIup System.Reflection.Assembly.Load(byte[])
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, cnXxnsKdSMBfecO5Dq.cs.Net Code: dyfPQu9uY System.Reflection.Assembly.Load(byte[])
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, p7Z4bI6upEkiMwFWOe.cs.Net Code: p7Z64bIup System.Reflection.Assembly.Load(byte[])
          Source: Yara matchFile source: 2.2.x.exe.40fd2a0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x.exe PID: 5728, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 2760, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F16817 push eax; iretd 2_2_02F1681D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00402AC0 push eax; ret 3_2_00402AD4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00402AC0 push eax; ret 3_2_00402AFC
          Source: x.exe.0.drStatic PE information: section name: .text entropy: 7.687058615335892
          Source: x.exe.0.dr, pokF6E8QiVgoyWmgli.csHigh entropy of concatenated method names: 'VcRYM2Tul', 'RL306O7Hx', 'OQQNsddhI', 'AWHE0M7pN', 'sBTeA3fNy', 'yhfc51XlAK1e28gIRo', 'VRXu2XfJiWRHc5y1tc', 'vfBPhP7De2khupuCdR', 'B30opfWFCfkRYHpOUH', 'vsNDYqgCPpAShPOCon'
          Source: x.exe.0.dr, cnXxnsKdSMBfecO5Dq.csHigh entropy of concatenated method names: 'S5Co562Mm', 'dyfPQu9uY', 'CjcdkwZJ3', 'So0XVyODQ', 'LL2JMxtoCsZ0rXae4j', 'itNpoHrMQOa6CHWhjv', 'RFyPVlP25TbL1t0vAx', 'ymELYYmWp4lm75EYJy', 'C51qhDKlsnW26ucsmC'
          Source: x.exe.0.dr, ursq9XwW5VrKV7cRM2.csHigh entropy of concatenated method names: 'QbDMJcw50vt974haecp', 'nhe2HkwiIMUOLNm73Fb', 'H1ELw8f5L', 'sopCKD3Ut', 'k4m3VqoJG', 'jG9Q7mXd9', 'T1CvpGtNt', 'S6sVZDIi7', 'ef8f6WhTl', 'iPqHvs6aT'
          Source: x.exe.0.dr, p7Z4bI6upEkiMwFWOe.csHigh entropy of concatenated method names: 'p7Z64bIup', 'AkipMwFWO', 'AU1S1VMUo', 'jj2cKNRYR', 'qRAaXURMjSOT2eRSKT', 'noGtjAQvFemSTJVGpq', 'sZMRuOs5m8e1gqS6QK', 'Ssk6fXYAWUV4n8cJW8', 'TC0pPl4sF8xcfKZCs0', 'jlr80tTviDJDxEKSa9'
          Source: x.exe.0.dr, Form1.csHigh entropy of concatenated method names: 'Dispose', 'S7lKQWBcg', 'zypwrD66v458RbShBs', 'F52ohqAAiwULb9FLDc', 'v6J4XxlCproaK1iJIt', 'C8E6b7S0UAnLqEvdTx', 'cEbdT0ZZo9VmXHV9MM', 'k9MFjUHUM7yMg1PjnA', 'ajqOrOFNmi0numsETc', 'NFsoJtVJQSid4X1Yrf'
          Source: x.exe.0.dr, TQu9uYZqjckwZJ3vo0.csHigh entropy of concatenated method names: 'SQ5UH35HE', 'FjDR6xrcH', 'j3HF4WnFG', 'clLkBH8Cg', 'nVGswmRCb', 'gYxwb0wusxj0SL9r3G9', 'qMkCyev4esGXNqaYIw', 'vHUKfSzOmWMsMVYKnD', 'Wp2IMKwwVk0d8F78JYG', 'oF9UZowb9MPNvQS3aMd'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, pokF6E8QiVgoyWmgli.csHigh entropy of concatenated method names: 'VcRYM2Tul', 'RL306O7Hx', 'OQQNsddhI', 'AWHE0M7pN', 'sBTeA3fNy', 'yhfc51XlAK1e28gIRo', 'VRXu2XfJiWRHc5y1tc', 'vfBPhP7De2khupuCdR', 'B30opfWFCfkRYHpOUH', 'vsNDYqgCPpAShPOCon'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, cnXxnsKdSMBfecO5Dq.csHigh entropy of concatenated method names: 'S5Co562Mm', 'dyfPQu9uY', 'CjcdkwZJ3', 'So0XVyODQ', 'LL2JMxtoCsZ0rXae4j', 'itNpoHrMQOa6CHWhjv', 'RFyPVlP25TbL1t0vAx', 'ymELYYmWp4lm75EYJy', 'C51qhDKlsnW26ucsmC'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, ursq9XwW5VrKV7cRM2.csHigh entropy of concatenated method names: 'QbDMJcw50vt974haecp', 'nhe2HkwiIMUOLNm73Fb', 'H1ELw8f5L', 'sopCKD3Ut', 'k4m3VqoJG', 'jG9Q7mXd9', 'T1CvpGtNt', 'S6sVZDIi7', 'ef8f6WhTl', 'iPqHvs6aT'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, p7Z4bI6upEkiMwFWOe.csHigh entropy of concatenated method names: 'p7Z64bIup', 'AkipMwFWO', 'AU1S1VMUo', 'jj2cKNRYR', 'qRAaXURMjSOT2eRSKT', 'noGtjAQvFemSTJVGpq', 'sZMRuOs5m8e1gqS6QK', 'Ssk6fXYAWUV4n8cJW8', 'TC0pPl4sF8xcfKZCs0', 'jlr80tTviDJDxEKSa9'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, Form1.csHigh entropy of concatenated method names: 'Dispose', 'S7lKQWBcg', 'zypwrD66v458RbShBs', 'F52ohqAAiwULb9FLDc', 'v6J4XxlCproaK1iJIt', 'C8E6b7S0UAnLqEvdTx', 'cEbdT0ZZo9VmXHV9MM', 'k9MFjUHUM7yMg1PjnA', 'ajqOrOFNmi0numsETc', 'NFsoJtVJQSid4X1Yrf'
          Source: 0.2.wscript.exe.286e28990e0.1.raw.unpack, TQu9uYZqjckwZJ3vo0.csHigh entropy of concatenated method names: 'SQ5UH35HE', 'FjDR6xrcH', 'j3HF4WnFG', 'clLkBH8Cg', 'nVGswmRCb', 'gYxwb0wusxj0SL9r3G9', 'qMkCyev4esGXNqaYIw', 'vHUKfSzOmWMsMVYKnD', 'Wp2IMKwwVk0d8F78JYG', 'oF9UZowb9MPNvQS3aMd'
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile created: C:\Users\user\AppData\Roaming\188E93\31437F.exeJump to dropped file
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2E00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2E00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeWindow / User API: threadDelayed 989Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 2056Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 1936Thread sleep count: 989 > 30Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 1936Thread sleep time: -59340000s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00403D74 FindFirstFileW,3_2_00403D74
          Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60000Jump to behavior
          Source: x.exe, 00000002.00000002.2146095944.00000000042D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: `hGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKg
          Source: x.exe, 00000002.00000002.2146095944.000000000431B000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000002.00000002.2146095944.0000000004363000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %9ThGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKg
          Source: x.exe, 00000002.00000002.2146095944.000000000413A000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000002.00000002.2146095944.000000000420F000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000002.00000002.2146095944.0000000004271000.00000004.00000800.00020000.00000000.sdmp, x.exe, 00000002.00000002.2146095944.00000000041B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: `hGfs79njrfh4rlW/g/ELQPl2byr
          Source: x.exe, 00000002.00000002.2146095944.00000000040B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %vL+o+HIpxflaQUFdyuioERPAot/W4EM5/xTa5gjxAAAAAGFXntLKgBbAfHB9ThGfs79njrfh4rlW/g/ELQPl2byrAAAAAGFXntLKgBbAvotC0B06uz5XPhM/Q42Rw/ZmRbohjLNQAAAAAGFXntLKgBbA55VlonSSerVyzUKNGzyf6daF/3B3nIS/AAAAAEz4eZtavaLAAAAAADd5O
          Source: aspnet_compiler.exe, 00000003.00000002.3419197360.0000000000C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

          Anti Debugging

          barindex
          Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 2_2_02F147E8 CheckRemoteDebuggerPresent,2_2_02F147E8
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_0040317B mov eax, dword ptr fs:[00000030h]3_2_0040317B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 3_2_00402B7C GetProcessHeap,RtlAllocateHeap,3_2_00402B7C
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\wscript.exeFile created: x.exe.0.drJump to dropped file
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, BATMAN.csReference to suspicious API methods: WriteProcessMemory_API(processInformation.HasanHandle, num9 + 8, bytes, 4, ref bytesWritten)
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, BATMAN.csReference to suspicious API methods: ReadProcessMemory_API(processInformation.HasanHandle, num9 + 8, ref buffer, 4, ref bytesWritten)
          Source: 2.2.x.exe.30c98dc.1.raw.unpack, BATMAN.csReference to suspicious API methods: VirtualAllocEx_API(processInformation.HasanHandle, 0, length, 12288, 64)
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 415000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 41A000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 4A0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 9ED008Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
          Source: x.exe, 00000002.00000002.2145896824.0000000003104000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: x.exe, 00000002.00000002.2145896824.0000000003104000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
          Source: x.exe, 00000002.00000002.2145896824.0000000003104000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndt-
          Source: x.exe, 00000002.00000002.2145896824.0000000003104000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progmant-
          Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x.exe PID: 5728, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 2760, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: PopPassword3_2_0040D069
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: SmtpPassword3_2_0040D069
          Source: Yara matchFile source: 2.2.x.exe.30c98dc.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.x.exe.40fd2a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information221
          Scripting
          Valid Accounts1
          Native API
          221
          Scripting
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services11
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Exploitation for Client Execution
          1
          DLL Side-Loading
          312
          Process Injection
          11
          Deobfuscate/Decode Files or Information
          2
          Credentials in Registry
          13
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)5
          Obfuscated Files or Information
          Security Account Manager221
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
          Software Packing
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput Capture11
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets41
          Virtualization/Sandbox Evasion
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Masquerading
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
          Virtualization/Sandbox Evasion
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job312
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          6038732).vbs5%ReversingLabsWin32.Dropper.Generic
          6038732).vbs13%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\x.exe100%AviraHEUR/AGEN.1323805
          C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\x.exe38%ReversingLabsWin32.Trojan.CrypterX
          C:\Users\user\AppData\Local\Temp\x.exe33%VirustotalBrowse
          C:\Users\user\AppData\Roaming\188E93\31437F.exe0%ReversingLabs
          C:\Users\user\AppData\Roaming\188E93\31437F.exe0%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          bertol-metal.site3%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://kbfvzoboss.bid/alien/fre.php100%URL Reputationmalware
          http://alphastand.win/alien/fre.php100%URL Reputationmalware
          http://alphastand.trade/alien/fre.php100%URL Reputationmalware
          http://alphastand.top/alien/fre.php100%URL Reputationmalware
          http://www.ibsensoftware.com/0%URL Reputationsafe
          https://bertol-metal.site/PWS/fre.php0%Avira URL Cloudsafe
          https://bertol-metal.site/PWS/fre.php1%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          bertol-metal.site
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          https://bertol-metal.site/PWS/fre.phptrue
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://kbfvzoboss.bid/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          http://alphastand.win/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          http://alphastand.trade/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          http://alphastand.top/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.ibsensoftware.com/aspnet_compiler.exe, aspnet_compiler.exe, 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1419946
          Start date and time:2024-04-04 08:58:15 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 40s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:6038732).vbs
          renamed because original name is a hash value
          Original Sample Name: _(PO_46038732).vbs
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winVBS@5/5@26/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 52
          • Number of non-executed functions: 13
          Cookbook Comments:
          • Found application associated with file extension: .vbs
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          08:59:10API Interceptor991x Sleep call for process: aspnet_compiler.exe modified
          No context
          No context
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Roaming\188E93\31437F.execirby0J3LP.exeGet hashmaliciousAsyncRAT, PureLog Stealer, XWorm, zgRATBrowse
            SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exeGet hashmaliciousPureLog Stealer, XWormBrowse
              SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                  50000PCSPIC12F1501-ESN.exeGet hashmaliciousAgentTeslaBrowse
                    SecuriteInfo.com.Win32.KeyloggerX-gen.6339.24340.exeGet hashmaliciousXWormBrowse
                      Jdxvyx.exeGet hashmaliciousAgentTeslaBrowse
                        SecuriteInfo.com.Win32.TrojanX-gen.11530.1442.exeGet hashmaliciousAgentTeslaBrowse
                          shipping_doc_62085317440.exeGet hashmaliciousAgentTeslaBrowse
                            PRE-ALERT_IOF23-24JPR1298.exeGet hashmaliciousAgentTeslaBrowse
                              Process:C:\Users\user\AppData\Local\Temp\x.exe
                              File Type:CSV text
                              Category:dropped
                              Size (bytes):226
                              Entropy (8bit):5.360398796477698
                              Encrypted:false
                              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                              MD5:3A8957C6382192B71471BD14359D0B12
                              SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                              SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                              SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                              Process:C:\Windows\System32\wscript.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):210432
                              Entropy (8bit):6.700241503730802
                              Encrypted:false
                              SSDEEP:3072:jZhf3Iz6k/gNaJ5QAyem7w8yCgWLUmwrQoGiWorQCFC7ZeJAd4:jX3I6aOs5Q2m7RFgWLUSoGarQfkJA
                              MD5:86428E9EEC10E20491350EBEF66CF118
                              SHA1:72BBC88F3099E66557D571838DD98AA74C103B61
                              SHA-256:0130D1816F3720AED33AE563B0A561C9EA27E24DFEA4DD5501C853DA02C4B851
                              SHA-512:14F15F8115697E40C14F94B46D59FCB68AC751F200CF3AD0CA62999641DB481EF7F085F0BD54D0E26BAFF107F05E6AE6DE8D073392DD8A1D8808A6C83B40387A
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 38%
                              • Antivirus: Virustotal, Detection: 33%, Browse
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...? .f..............0.."..........~A... ...`....@.. ....................................`.................................0A..K....`...............................@............................................... ............... ..H............text....!... ...".................. ..`.rsrc........`.......$..............@..@.reloc...............4..............@..B................`A......H.......TZ..xB.............6...........................................^(....8.....((...8.....*&~.......*...~....*..0..........8t.......E....i...........8d.....(M... .l..(M...%& .l..(M...(....%& .l..(M...%& .l..(M...%&o.... .l..(M...%& .l..(M...%&o....%& .l..(M... .l..(M...%&o....%& .l..(M...%& .l..(M...%&o....(....%&..8.... .l..(M...%&.. ....(....:%...& ....8....(....%&(...... ....(....9....& ....8.....(?...(....%&%.(?......%.(?...~.....%..(?......%..(?.....(?........... ..
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):56368
                              Entropy (8bit):6.120994357619221
                              Encrypted:false
                              SSDEEP:768:fF9E8FLLs2Zokf85d9PTV6Iq8Fnqf7P+WxqWKnz8DH:ffE6EkfOd9PT86dWvKgb
                              MD5:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                              SHA1:19DFD86294C4A525BA21C6AF77681B2A9BBECB55
                              SHA-256:99A2C778C9A6486639D0AFF1A7D2D494C2B0DC4C7913EBCB7BFEA50A2F1D0B09
                              SHA-512:94F0ACE37CAE77BE9935CF4FC8AAA94691343D3B38DE5E16C663B902C220BFF513CD02256C7AF2D815A23DD30439582DDBB0880009C76BBF36FF8FBC1A6DDC18
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 0%, Browse
                              Joe Sandbox View:
                              • Filename: cirby0J3LP.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe, Detection: malicious, Browse
                              • Filename: 3vj5tYFb6a.exe, Detection: malicious, Browse
                              • Filename: 50000PCSPIC12F1501-ESN.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.KeyloggerX-gen.6339.24340.exe, Detection: malicious, Browse
                              • Filename: Jdxvyx.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.TrojanX-gen.11530.1442.exe, Detection: malicious, Browse
                              • Filename: shipping_doc_62085317440.exe, Detection: malicious, Browse
                              • Filename: PRE-ALERT_IOF23-24JPR1298.exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A>.]..............0................. ........@.. ....................................`.................................t...O.......................0B..........<................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......t3..pc.............X...<........................................0..........s.....Y.....(.....Z.....&..(......+....(....o......r...p(....-..r...p(....,.....X....i2..-;(....(..........%.r!..p.(....(....((...(....(....(....( .....-.(7...(.....*.(....-..*.~S...-.~R....S...s!.....~W...o"....~U...o#....~V...o$....o%...~Y...o&...~S...~Q...~T....s'....P...~P...sE...o(............~W....@_,s.....()...r7..p.$(*........o+..........o,....2....... ....37(....(8.........%...o-....
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):49
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3::
                              MD5:884BB48A55DA67B4812805CB8905277D
                              SHA1:6B3D33E00F5B9DEAE2826F80644CB4F6E78B7401
                              SHA-256:78877FA898F0B4C45C9C33AE941E40617AD7C8657A307DB62BC5691F92F4F60E
                              SHA-512:989A38778FC961EB2C79E70621EABFB4B22D6537F08A71359B27AF495646E304EE252A523769F66B75BC2FAF546ACB22A71B358B51221174AC0D964DA7A62821
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:.................................................
                              File type:ASCII text, with very long lines (65294), with CRLF line terminators
                              Entropy (8bit):5.370097670545895
                              TrID:
                                File name:6038732).vbs
                                File size:326'759 bytes
                                MD5:9ccb8c031d05f56b6f480305f2ab46af
                                SHA1:46b59f675728e4952912e707ad5c2b53d05bd5bf
                                SHA256:679f185b79a90236b1d85ef1fc7716dab2784ef51e0d3a0e36b9f0772aa6bb32
                                SHA512:e770c40e9853a2f5e12df60ec6322251c2161632d9fe877b6b27cc2484ddb05ee994ac87746528078ce4f3099c67c354e5ae58305c678d48d5bd323f41a76fe2
                                SSDEEP:3072:CVyjR8xVe3LPd80Cn4oCpE6v3bwis9Tx5ivFeV/QO+uS7IB3WXvN20ZRw19qLQUW:/vNDbwh7yqQrcBsl2L19EQaQGSm1WD
                                TLSH:6E64F5B36E321DE11CE688834EC32EE55A502CDB4251567279F9B58C233E0E215F9EED
                                File Content Preview:Dim x, y, z..x = "MSXML2.DOMDocument"..y = "text"..z = "bin.base64"....Set obj1 = CreateObject(x)..Set obj2 = obj1.createElement(y)..obj2.DataType = z....' Replace "yourbase64strjbg" with your actual base64 encoded content..Dim base64String..base64String
                                Icon Hash:68d69b8f86ab9a86
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 4, 2024 08:59:11.595223904 CEST6434153192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:11.723458052 CEST53643411.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:16.264236927 CEST5918753192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:16.392632008 CEST53591871.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:21.396836996 CEST5662053192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:21.524950981 CEST53566201.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:26.272829056 CEST5645753192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:26.400492907 CEST53564571.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:31.320167065 CEST5566853192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:31.445250988 CEST53556681.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:36.293565989 CEST5349853192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:36.421109915 CEST53534981.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:41.708070040 CEST6126753192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:41.836364985 CEST53612671.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:46.364387035 CEST5356353192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:46.489454985 CEST53535631.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:51.347932100 CEST5242553192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:51.475878954 CEST53524251.1.1.1192.168.2.6
                                Apr 4, 2024 08:59:56.379745007 CEST6089053192.168.2.61.1.1.1
                                Apr 4, 2024 08:59:56.505444050 CEST53608901.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:01.319024086 CEST6336753192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:01.446587086 CEST53633671.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:06.289778948 CEST6093753192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:06.417781115 CEST53609371.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:11.301804066 CEST5485153192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:11.427706003 CEST53548511.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:16.256481886 CEST5719853192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:16.385822058 CEST53571981.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:21.332794905 CEST5257153192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:21.457876921 CEST53525711.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:26.286606073 CEST6545753192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:26.412065983 CEST53654571.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:31.745275974 CEST6049153192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:31.872632980 CEST53604911.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:36.256928921 CEST5346153192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:36.382585049 CEST53534611.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:41.272965908 CEST5790653192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:41.400171041 CEST53579061.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:46.327703953 CEST5492553192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:46.453105927 CEST53549251.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:51.306715965 CEST6103753192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:51.433093071 CEST53610371.1.1.1192.168.2.6
                                Apr 4, 2024 09:00:56.265233994 CEST6542153192.168.2.61.1.1.1
                                Apr 4, 2024 09:00:56.392962933 CEST53654211.1.1.1192.168.2.6
                                Apr 4, 2024 09:01:01.271718979 CEST6035153192.168.2.61.1.1.1
                                Apr 4, 2024 09:01:01.399383068 CEST53603511.1.1.1192.168.2.6
                                Apr 4, 2024 09:01:06.249789953 CEST6078953192.168.2.61.1.1.1
                                Apr 4, 2024 09:01:06.375431061 CEST53607891.1.1.1192.168.2.6
                                Apr 4, 2024 09:01:11.287098885 CEST4939753192.168.2.61.1.1.1
                                Apr 4, 2024 09:01:11.412417889 CEST53493971.1.1.1192.168.2.6
                                Apr 4, 2024 09:01:16.288484097 CEST5196853192.168.2.61.1.1.1
                                Apr 4, 2024 09:01:16.413330078 CEST53519681.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 4, 2024 08:59:11.595223904 CEST192.168.2.61.1.1.10x8afaStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:16.264236927 CEST192.168.2.61.1.1.10x4f9fStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:21.396836996 CEST192.168.2.61.1.1.10xa8a5Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:26.272829056 CEST192.168.2.61.1.1.10x8fa1Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:31.320167065 CEST192.168.2.61.1.1.10x9562Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:36.293565989 CEST192.168.2.61.1.1.10xa402Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:41.708070040 CEST192.168.2.61.1.1.10xea69Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:46.364387035 CEST192.168.2.61.1.1.10x9ee4Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:51.347932100 CEST192.168.2.61.1.1.10x7c23Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:56.379745007 CEST192.168.2.61.1.1.10xe8d3Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:01.319024086 CEST192.168.2.61.1.1.10x5cfbStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:06.289778948 CEST192.168.2.61.1.1.10xd9d1Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:11.301804066 CEST192.168.2.61.1.1.10xafd1Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:16.256481886 CEST192.168.2.61.1.1.10xe9aStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:21.332794905 CEST192.168.2.61.1.1.10x4c45Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:26.286606073 CEST192.168.2.61.1.1.10x59d2Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:31.745275974 CEST192.168.2.61.1.1.10x3ffaStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:36.256928921 CEST192.168.2.61.1.1.10x683bStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:41.272965908 CEST192.168.2.61.1.1.10x3ff6Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:46.327703953 CEST192.168.2.61.1.1.10xa8a5Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:51.306715965 CEST192.168.2.61.1.1.10xb789Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:56.265233994 CEST192.168.2.61.1.1.10x9b9dStandard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:01.271718979 CEST192.168.2.61.1.1.10x9db2Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:06.249789953 CEST192.168.2.61.1.1.10x4ce5Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:11.287098885 CEST192.168.2.61.1.1.10x6b81Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:16.288484097 CEST192.168.2.61.1.1.10xe609Standard query (0)bertol-metal.siteA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 4, 2024 08:59:11.723458052 CEST1.1.1.1192.168.2.60x8afaName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:16.392632008 CEST1.1.1.1192.168.2.60x4f9fName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:21.524950981 CEST1.1.1.1192.168.2.60xa8a5Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:26.400492907 CEST1.1.1.1192.168.2.60x8fa1Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:31.445250988 CEST1.1.1.1192.168.2.60x9562Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:36.421109915 CEST1.1.1.1192.168.2.60xa402Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:41.836364985 CEST1.1.1.1192.168.2.60xea69Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:46.489454985 CEST1.1.1.1192.168.2.60x9ee4Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:51.475878954 CEST1.1.1.1192.168.2.60x7c23Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 08:59:56.505444050 CEST1.1.1.1192.168.2.60xe8d3Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:01.446587086 CEST1.1.1.1192.168.2.60x5cfbName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:06.417781115 CEST1.1.1.1192.168.2.60xd9d1Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:11.427706003 CEST1.1.1.1192.168.2.60xafd1Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:16.385822058 CEST1.1.1.1192.168.2.60xe9aName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:21.457876921 CEST1.1.1.1192.168.2.60x4c45Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:26.412065983 CEST1.1.1.1192.168.2.60x59d2Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:31.872632980 CEST1.1.1.1192.168.2.60x3ffaName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:36.382585049 CEST1.1.1.1192.168.2.60x683bName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:41.400171041 CEST1.1.1.1192.168.2.60x3ff6Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:46.453105927 CEST1.1.1.1192.168.2.60xa8a5Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:51.433093071 CEST1.1.1.1192.168.2.60xb789Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:00:56.392962933 CEST1.1.1.1192.168.2.60x9b9dName error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:01.399383068 CEST1.1.1.1192.168.2.60x9db2Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:06.375431061 CEST1.1.1.1192.168.2.60x4ce5Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:11.412417889 CEST1.1.1.1192.168.2.60x6b81Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false
                                Apr 4, 2024 09:01:16.413330078 CEST1.1.1.1192.168.2.60xe609Name error (3)bertol-metal.sitenonenoneA (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:08:59:06
                                Start date:04/04/2024
                                Path:C:\Windows\System32\wscript.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6038732).vbs"
                                Imagebase:0x7ff649820000
                                File size:170'496 bytes
                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:08:59:08
                                Start date:04/04/2024
                                Path:C:\Users\user\AppData\Local\Temp\x.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                Imagebase:0xcb0000
                                File size:210'432 bytes
                                MD5 hash:86428E9EEC10E20491350EBEF66CF118
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.2145896824.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.2146095944.00000000040FD000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 38%, ReversingLabs
                                • Detection: 33%, Virustotal, Browse
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:08:59:09
                                Start date:04/04/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                Imagebase:0x620000
                                File size:56'368 bytes
                                MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                Reputation:moderate
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:26%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:4.2%
                                  Total number of Nodes:72
                                  Total number of Limit Nodes:2
                                  execution_graph 2709 2f174b1 2710 2f17516 2709->2710 2711 2f1752b Wow64SetThreadContext 2709->2711 2710->2711 2712 2f17574 2711->2712 2725 2f12311 2726 2f12342 2725->2726 2728 2f12720 4 API calls 2726->2728 2727 2f1265f 2728->2727 2719 2f17175 2720 2f1720d CreateProcessW 2719->2720 2722 2f17374 2720->2722 2722->2722 2631 2f176d8 VirtualAllocEx 2632 2f17797 2631->2632 2639 2f17180 2640 2f1720d CreateProcessW 2639->2640 2642 2f17374 2640->2642 2642->2642 2643 2f12320 2644 2f12342 2643->2644 2647 2f12720 2644->2647 2645 2f1265f 2648 2f1274c 2647->2648 2649 2f1275e 2648->2649 2654 2f12d31 2648->2654 2659 2f1307d 2648->2659 2664 2f130e7 2648->2664 2669 2f12e04 2648->2669 2649->2645 2656 2f12d3b 2654->2656 2655 2f1313a 2655->2649 2656->2655 2677 2f14bb1 2656->2677 2681 2f14bb8 2656->2681 2660 2f1309a 2659->2660 2662 2f14bb1 EnumWindows 2660->2662 2663 2f14bb8 EnumWindows 2660->2663 2661 2f131a0 2661->2649 2662->2661 2663->2661 2666 2f13067 2664->2666 2665 2f1313a 2665->2649 2666->2665 2667 2f14bb1 EnumWindows 2666->2667 2668 2f14bb8 EnumWindows 2666->2668 2667->2665 2668->2665 2670 2f12e18 2669->2670 2671 2f12e93 2670->2671 2672 2f1313a 2670->2672 2685 2f147e1 2670->2685 2689 2f147e8 2670->2689 2675 2f14bb1 EnumWindows 2671->2675 2676 2f14bb8 EnumWindows 2671->2676 2672->2649 2675->2672 2676->2672 2678 2f14bb7 EnumWindows 2677->2678 2680 2f14c63 2678->2680 2680->2655 2682 2f14bfc EnumWindows 2681->2682 2684 2f14c63 2682->2684 2684->2655 2686 2f14831 CheckRemoteDebuggerPresent 2685->2686 2688 2f14888 2686->2688 2688->2670 2690 2f14831 CheckRemoteDebuggerPresent 2689->2690 2692 2f14888 2690->2692 2692->2670 2705 2f148e0 2706 2f148e7 FindCloseChangeNotification 2705->2706 2708 2f14978 2706->2708 2713 2f177e0 2714 2f17851 2713->2714 2715 2f17866 WriteProcessMemory 2713->2715 2714->2715 2716 2f178c8 2715->2716 2717 2f175c0 ReadProcessMemory 2718 2f17687 2717->2718 2723 2f17920 ResumeThread 2724 2f179b0 2723->2724 2697 2f177e8 2698 2f17851 2697->2698 2699 2f17866 WriteProcessMemory 2697->2699 2698->2699 2700 2f178c8 2699->2700 2701 2f175c8 ReadProcessMemory 2702 2f17687 2701->2702 2703 2f17928 ResumeThread 2704 2f179b0 2703->2704

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 168 2f147e8-2f14886 CheckRemoteDebuggerPresent 171 2f14888-2f1488e 168->171 172 2f1488f-2f148d3 168->172 171->172
                                  APIs
                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02F14876
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: CheckDebuggerPresentRemote
                                  • String ID: eD
                                  • API String ID: 3662101638-3392709236
                                  • Opcode ID: 794cdfc1f14d57cc6e485f312fc853ec5fb39a3b0ad303a3f1d48e29d2d82966
                                  • Instruction ID: 8b8b963fb04521f57a4800f41bfc50620ebf12dde1824e52d75ca5ea56bcfd8e
                                  • Opcode Fuzzy Hash: 794cdfc1f14d57cc6e485f312fc853ec5fb39a3b0ad303a3f1d48e29d2d82966
                                  • Instruction Fuzzy Hash: 0E31A9B5D012599FDB10CFAAD980ADEFBF5FB49320F20942AE914B7200C775A945CF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: 401a6df626c677fb9441c8637e58711d189e5d32adcb37581cb97759751b6941
                                  • Instruction ID: 089c0fe03af895b5fde4a002f2d44f28f045f22cd2bfb06bc5e2a80e5e8e8eb6
                                  • Opcode Fuzzy Hash: 401a6df626c677fb9441c8637e58711d189e5d32adcb37581cb97759751b6941
                                  • Instruction Fuzzy Hash: 60510FB1E003199FDB14CFA8C984BDEBBF1BB49304F10916AE515BB290DB759849CF45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: 7e569a6d87279e46ccbccf342f197bbcc50515d3a894efc2a94687f12d73942a
                                  • Instruction ID: 0debba14f7a209ef58c067ee71ab9b0ef5cfa82c4fdc54b766ba73e268bb64df
                                  • Opcode Fuzzy Hash: 7e569a6d87279e46ccbccf342f197bbcc50515d3a894efc2a94687f12d73942a
                                  • Instruction Fuzzy Hash: 31510FB0E003199FDB14CFA9C984B9EBBF1BB49304F10916AE915BB390DB759849CF85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 32 2f17175-2f1720b 33 2f17222-2f17230 32->33 34 2f1720d-2f1721f 32->34 35 2f17232-2f17244 33->35 36 2f17247-2f17283 33->36 34->33 35->36 37 2f17285-2f17294 36->37 38 2f17297-2f17372 CreateProcessW 36->38 37->38 42 2f17374-2f1737a 38->42 43 2f1737b-2f17444 38->43 42->43 52 2f17446-2f1746f 43->52 53 2f1747a-2f17485 43->53 52->53 57 2f17486 53->57 57->57
                                  APIs
                                  • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02F1735F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID: eD
                                  • API String ID: 963392458-3392709236
                                  • Opcode ID: 07ce368d9cd70ad373dbedb6960300dac11bf4d56ac3958bb913dccd6132a75e
                                  • Instruction ID: 11f2cce5e651f9708f2c555158821cbf288dd0dce70eb38e6b8b4b9dafa618d4
                                  • Opcode Fuzzy Hash: 07ce368d9cd70ad373dbedb6960300dac11bf4d56ac3958bb913dccd6132a75e
                                  • Instruction Fuzzy Hash: 2681BE74D00269DFDB25CFA9D980BDEBBF1AB49304F0094AAE548B7220DB709A85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 2f17180-2f1720b 59 2f17222-2f17230 58->59 60 2f1720d-2f1721f 58->60 61 2f17232-2f17244 59->61 62 2f17247-2f17283 59->62 60->59 61->62 63 2f17285-2f17294 62->63 64 2f17297-2f17372 CreateProcessW 62->64 63->64 68 2f17374-2f1737a 64->68 69 2f1737b-2f17444 64->69 68->69 78 2f17446-2f1746f 69->78 79 2f1747a-2f17485 69->79 78->79 83 2f17486 79->83 83->83
                                  APIs
                                  • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02F1735F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID: eD
                                  • API String ID: 963392458-3392709236
                                  • Opcode ID: a498755b6f42ad934ffeb061d91b421e05ef0a3c2de5c09a77354df6fe931ba9
                                  • Instruction ID: f2c5ccd70df1f55665abe8dcf19b445a993bdc10fd21d40efac4aefad899caa3
                                  • Opcode Fuzzy Hash: a498755b6f42ad934ffeb061d91b421e05ef0a3c2de5c09a77354df6fe931ba9
                                  • Instruction Fuzzy Hash: E281AE74D0026DDFDB25CFA9C980BDEBBF1AB49304F0094AAE548B7220DB749A85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 84 2f177e0-2f1784f 85 2f17851-2f17863 84->85 86 2f17866-2f178c6 WriteProcessMemory 84->86 85->86 87 2f178c8-2f178ce 86->87 88 2f178cf-2f1790d 86->88 87->88
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F178B6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID: eD
                                  • API String ID: 3559483778-3392709236
                                  • Opcode ID: 4d8fb52548198fd647b4a84cad0bb0c1fb76f5d7f49170d45c8dbd1d37a31ce6
                                  • Instruction ID: a2b428e2887776227b751701722650f1ca3eb9c8e353ee284b82140347d7335f
                                  • Opcode Fuzzy Hash: 4d8fb52548198fd647b4a84cad0bb0c1fb76f5d7f49170d45c8dbd1d37a31ce6
                                  • Instruction Fuzzy Hash: 884178B5D002589FDB10CFA9D984AEEFBF1BB49314F24902AE918B7210D375AA45CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 91 2f177e8-2f1784f 92 2f17851-2f17863 91->92 93 2f17866-2f178c6 WriteProcessMemory 91->93 92->93 94 2f178c8-2f178ce 93->94 95 2f178cf-2f1790d 93->95 94->95
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F178B6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID: eD
                                  • API String ID: 3559483778-3392709236
                                  • Opcode ID: a45a3b8913f97e6f4327f1caab4cef8af0cfd3346f0089ffc40f3abdb1825d44
                                  • Instruction ID: 255590b14727cfc572da53d82131f057a179c2f6e0478d192aa60d414b793f0a
                                  • Opcode Fuzzy Hash: a45a3b8913f97e6f4327f1caab4cef8af0cfd3346f0089ffc40f3abdb1825d44
                                  • Instruction Fuzzy Hash: 204188B5D002589FDF00CFA9D984AEEFBF1BB49314F24902AE918B7210D375AA45CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 98 2f175c0-2f17685 ReadProcessMemory 99 2f17687-2f1768d 98->99 100 2f1768e-2f176cc 98->100 99->100
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F17675
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID: eD
                                  • API String ID: 1726664587-3392709236
                                  • Opcode ID: 2bda1047136000e1cd4606c0de33c4dc353973a23e0b9f6987f763d37af56e97
                                  • Instruction ID: b4309c8aeb0b4750e690c7635e72393909545e70f9353de45cbfcf8e03705895
                                  • Opcode Fuzzy Hash: 2bda1047136000e1cd4606c0de33c4dc353973a23e0b9f6987f763d37af56e97
                                  • Instruction Fuzzy Hash: 984178B9D04258DFCF10CFAAD984ADEFBB1BB49310F14906AE918B7210D335A945CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 103 2f175c8-2f17685 ReadProcessMemory 104 2f17687-2f1768d 103->104 105 2f1768e-2f176cc 103->105 104->105
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02F17675
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID: eD
                                  • API String ID: 1726664587-3392709236
                                  • Opcode ID: b3e42d0e3916eb147f71c878b362ad33e11d25548bb140b8563a038a0e84c14a
                                  • Instruction ID: 4879710bf17d5119e05c1fb2aa81b878f0a8d92425c411a1913ac62d0568c489
                                  • Opcode Fuzzy Hash: b3e42d0e3916eb147f71c878b362ad33e11d25548bb140b8563a038a0e84c14a
                                  • Instruction Fuzzy Hash: FC3168B9D04258DFCF10CFAAD984ADEFBB5BB09310F10906AE918B7210D375A945CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 108 2f176d8-2f17795 VirtualAllocEx 109 2f17797-2f1779d 108->109 110 2f1779e-2f177d4 108->110 109->110
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02F17785
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID: eD
                                  • API String ID: 4275171209-3392709236
                                  • Opcode ID: 929871ee12d851ac7a91df78547c8550e25a74161959e8b6869c1d9fc2467afc
                                  • Instruction ID: b0cb718065a58402e02e02db6bfb4c6d101f9abbf96efb932df7f2c3d58a6735
                                  • Opcode Fuzzy Hash: 929871ee12d851ac7a91df78547c8550e25a74161959e8b6869c1d9fc2467afc
                                  • Instruction Fuzzy Hash: 923187B9D042589FCF10CFA9E980ADEFBB1BB59310F20902AE918B7310D335A905CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 113 2f176e0-2f17795 VirtualAllocEx 114 2f17797-2f1779d 113->114 115 2f1779e-2f177d4 113->115 114->115
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02F17785
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID: eD
                                  • API String ID: 4275171209-3392709236
                                  • Opcode ID: c059f32919cbb010ca968a7f947164e9cda9658387f84dfc09b4b39ebe813a77
                                  • Instruction ID: e6ad0b726f0c7e0cd641f19771b88bc4824b51d290cca55affde7a3d0481e934
                                  • Opcode Fuzzy Hash: c059f32919cbb010ca968a7f947164e9cda9658387f84dfc09b4b39ebe813a77
                                  • Instruction Fuzzy Hash: 3B3176B9D042589FCF10CFA9D980A9EFBB5BB09310F10A02AE918B7310D335A945CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 118 2f14bb1-2f14bb5 119 2f14c13-2f14c15 118->119 120 2f14bb7-2f14c0b 118->120 121 2f14c18-2f14c61 EnumWindows 119->121 120->121 124 2f14c0d 120->124 125 2f14c63-2f14c69 121->125 126 2f14c6a-2f14cb6 121->126 124->119 125->126
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: EnumWindows
                                  • String ID: eD
                                  • API String ID: 1129996299-3392709236
                                  • Opcode ID: 34d674a53971ba6b84f21780189478981ffe6f5720e5df065d86fb07e20ded85
                                  • Instruction ID: 5cd589fb57de799434b347e1923a00d1ddebc17027556e36e16fb1716c8f337c
                                  • Opcode Fuzzy Hash: 34d674a53971ba6b84f21780189478981ffe6f5720e5df065d86fb07e20ded85
                                  • Instruction Fuzzy Hash: 8831EBB4D05219DFDB14CFA9D980AEEFBB1BF89310F20902AE805B7210C775A941CF68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 132 2f174b1-2f17514 133 2f17516-2f17528 132->133 134 2f1752b-2f17572 Wow64SetThreadContext 132->134 133->134 135 2f17574-2f1757a 134->135 136 2f1757b-2f175b3 134->136 135->136
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 02F17562
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID: eD
                                  • API String ID: 983334009-3392709236
                                  • Opcode ID: dc66ba68d8f97e425b0ad3fcfa6dea00c328875ed97987609ed3dce368d241ce
                                  • Instruction ID: 6a18a772d9db0b789d9f6697c81aab1f44bb1abd84577f867c7c6ef4b6a475d1
                                  • Opcode Fuzzy Hash: dc66ba68d8f97e425b0ad3fcfa6dea00c328875ed97987609ed3dce368d241ce
                                  • Instruction Fuzzy Hash: E33198B5D012589FCB10CFA9D984AEEFBF1AB49314F24806AE518B7350D378AA45CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 139 2f174b8-2f17514 140 2f17516-2f17528 139->140 141 2f1752b-2f17572 Wow64SetThreadContext 139->141 140->141 142 2f17574-2f1757a 141->142 143 2f1757b-2f175b3 141->143 142->143
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 02F17562
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID: eD
                                  • API String ID: 983334009-3392709236
                                  • Opcode ID: 3c7576aac738e2ef3966689790ef9ab29a2dde081d5a522d2bd3b00838b6a82e
                                  • Instruction ID: 776cbdfe4e66a84e86059355e4e3a0402b38b48802fc36333cdd8df7b9abde3d
                                  • Opcode Fuzzy Hash: 3c7576aac738e2ef3966689790ef9ab29a2dde081d5a522d2bd3b00838b6a82e
                                  • Instruction Fuzzy Hash: A831A7B5D012589FCB10CFAAD984ADEFBF1BB48314F24802AE518B7350D378AA45CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 146 2f14bb8-2f14c0b 148 2f14c18-2f14c61 EnumWindows 146->148 149 2f14c0d-2f14c15 146->149 152 2f14c63-2f14c69 148->152 153 2f14c6a-2f14cb6 148->153 149->148 152->153
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: EnumWindows
                                  • String ID: eD
                                  • API String ID: 1129996299-3392709236
                                  • Opcode ID: ae7341d1b015ca7a4216c3719a830ca6d233a9b13756db73c4fc53704fa4a6db
                                  • Instruction ID: 88eb235ab5400a096d0f7237af974a6c7fd9fff2126ff8d4875a9795b4af5911
                                  • Opcode Fuzzy Hash: ae7341d1b015ca7a4216c3719a830ca6d233a9b13756db73c4fc53704fa4a6db
                                  • Instruction Fuzzy Hash: 8231D9B4D05219DFDB14CFA9D980AEEFBB1BF89310F20942AE405B7210C775A941CFA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 159 2f147e1-2f14886 CheckRemoteDebuggerPresent 162 2f14888-2f1488e 159->162 163 2f1488f-2f148d3 159->163 162->163
                                  APIs
                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02F14876
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: CheckDebuggerPresentRemote
                                  • String ID: eD
                                  • API String ID: 3662101638-3392709236
                                  • Opcode ID: 2adfa45a4f8847db9a4ebdbee876ad01d80f74d6788557ce4bee0e2b5c6b776e
                                  • Instruction ID: 55806b1728fdfce62f95216fffcff93c493c1356c8cea9792fdb8666aff678e2
                                  • Opcode Fuzzy Hash: 2adfa45a4f8847db9a4ebdbee876ad01d80f74d6788557ce4bee0e2b5c6b776e
                                  • Instruction Fuzzy Hash: B731B7B4D012589FDB10CFA9D980ADEFBF0BB49320F20842AE904B7210C775A945CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02F14966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID: eD
                                  • API String ID: 2591292051-3392709236
                                  • Opcode ID: 705d463445d0f915d9d31480fe3cc9f94c725d81c0ddec91b22df168327629dd
                                  • Instruction ID: dcd4f8d4f8cd503774d91346095c4e94f139913f0510362e5fa7737bc3b2301a
                                  • Opcode Fuzzy Hash: 705d463445d0f915d9d31480fe3cc9f94c725d81c0ddec91b22df168327629dd
                                  • Instruction Fuzzy Hash: 3431C9B5D042489FDB10CFA9E594AEEFBF0BB89360F24905AE818B7314D335A941CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02F14966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID: eD
                                  • API String ID: 2591292051-3392709236
                                  • Opcode ID: 66f38a9ea63a35ac8915b487e7c5f61e3a5c901437d57dd8a305d799efb72138
                                  • Instruction ID: b957fd7c5f3fe031dcfd34e99c516c0b66857e0d4f49b0762c55d8bf54501ced
                                  • Opcode Fuzzy Hash: 66f38a9ea63a35ac8915b487e7c5f61e3a5c901437d57dd8a305d799efb72138
                                  • Instruction Fuzzy Hash: 2B21A8B8D002189FDB10CFA9D584ADEFBF4BB49320F20905AE918B7310D335A941CFA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 02F1799E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID: eD
                                  • API String ID: 947044025-3392709236
                                  • Opcode ID: 42880fb90274d350fd89c365af2901073ffd6ee13789f23985cf963c43493fc6
                                  • Instruction ID: 40b13dade8c4010321ea813f63b42456e95afef590691464b188a3add31622c0
                                  • Opcode Fuzzy Hash: 42880fb90274d350fd89c365af2901073ffd6ee13789f23985cf963c43493fc6
                                  • Instruction Fuzzy Hash: 9D21B5B9D042189FCF10CFA9D584ADEFBF0AB49320F24906AE918B7310D375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 02F1799E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID: eD
                                  • API String ID: 947044025-3392709236
                                  • Opcode ID: 14f728533f208c3fdb405985ac28bfe750badf7680bcfb57b461f669f48382ec
                                  • Instruction ID: 4e2b65f0585de36d49ecf47dc27526a79f36f91bc66b0cc2d132c4cad1684f0e
                                  • Opcode Fuzzy Hash: 14f728533f208c3fdb405985ac28bfe750badf7680bcfb57b461f669f48382ec
                                  • Instruction Fuzzy Hash: FF21B7B8D042089FCF10CFA9D584ADEFBF4AB49320F24905AE918B7310D335A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145331571.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_15cd000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93400640ce1dd0383a022945b42c66a4c2f062694684d43242b7a38bcb996b29
                                  • Instruction ID: 8d00ffedc27652b872d9b874ef92cac4e639743800dc7ae04ecfbf4a5aabe01f
                                  • Opcode Fuzzy Hash: 93400640ce1dd0383a022945b42c66a4c2f062694684d43242b7a38bcb996b29
                                  • Instruction Fuzzy Hash: 7121F271604244DFDB14DFA8D584B2ABBB5FB84B14F20C97DE9099F242D33AD847C6A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145331571.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_15cd000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 280a822da978a7cf6d75c460037deca91b90bbecdaeef27421a460c589b3d673
                                  • Instruction ID: a4b490d7dab1b20e90fb6150d4f13925df09c2f96999bedb929d43b95944c3c9
                                  • Opcode Fuzzy Hash: 280a822da978a7cf6d75c460037deca91b90bbecdaeef27421a460c589b3d673
                                  • Instruction Fuzzy Hash: D821A1755093808FC712DF68C594B15BFB1BB46614F28C5EED849CF6A3D33A980ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: 5306154e1ae973450e8d9b1ce26c78b07320423d5c36c8194e3f54b796df123d
                                  • Instruction ID: 666000ea2b059d6a3b91496fd2b59196cfb37fea1f02f8c729d17de693930ed2
                                  • Opcode Fuzzy Hash: 5306154e1ae973450e8d9b1ce26c78b07320423d5c36c8194e3f54b796df123d
                                  • Instruction Fuzzy Hash: 3C51FF70E00258CFDB14CFA8C884BDEBBF1BF8A304F14912AD815AB250DB749845CF45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: f4197880f706f71296985db01ea2e21e0fd357478bf8b54935b1ea1e211e3919
                                  • Instruction ID: a54b610c8aa00065efc467c404fe1022ed4ad864172d1487967b77bd409d5b70
                                  • Opcode Fuzzy Hash: f4197880f706f71296985db01ea2e21e0fd357478bf8b54935b1ea1e211e3919
                                  • Instruction Fuzzy Hash: A851FEB4D00258CFDB14CFA9C984BDEBBB1FF89344F20912AE915AB290DB749845CF85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: 180b93c807dcf027e81af40f1e7bef73a3c7c5d4c5e3d2efbf141d6e956cc213
                                  • Instruction ID: 3020cd68b12078ff0cdaa12f641decac4c6d1a46cc991726c8c54b8890296bfa
                                  • Opcode Fuzzy Hash: 180b93c807dcf027e81af40f1e7bef73a3c7c5d4c5e3d2efbf141d6e956cc213
                                  • Instruction Fuzzy Hash: B451FE70D00258DFDB14DFA9C984B9EFBF1BF8A304F20912AE915AB250DB749845CF85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: eD $eD
                                  • API String ID: 0-423000286
                                  • Opcode ID: ab2d7133e2eac90176263b8570684799b2f611f11d29b9c9a6519377ec5cc8b5
                                  • Instruction ID: de4df753b1a566379a1d6686b6ecca0c1d8cc55418f4c6ae5f62cc8126a2a6f2
                                  • Opcode Fuzzy Hash: ab2d7133e2eac90176263b8570684799b2f611f11d29b9c9a6519377ec5cc8b5
                                  • Instruction Fuzzy Hash: 4151FFB4D003588FDB14CFA9C984B9EBBB1BB89304F20912AE515AB290DB749845CF49
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b31d09c51ce4ec58604d4196f57cf0e7923f388720e66a02150b1c7395f46c9
                                  • Instruction ID: 0de2c2351d934e1cf34f5702df3900435c6d0df7d872567249d4a1ea77290fc7
                                  • Opcode Fuzzy Hash: 2b31d09c51ce4ec58604d4196f57cf0e7923f388720e66a02150b1c7395f46c9
                                  • Instruction Fuzzy Hash: 3B711771E056298BDB68CF2AC9457DAF7F2AFC9300F54C5EA820DA7254EB305A958F40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 626958b60e9f44ae26af7d089869b3f421dec1f6e9ce805b45e8989fe5effca4
                                  • Instruction ID: 68231ce99faea6a904049a25c17b57b0de2abca8dd77faeb4a45a0f753d90ab7
                                  • Opcode Fuzzy Hash: 626958b60e9f44ae26af7d089869b3f421dec1f6e9ce805b45e8989fe5effca4
                                  • Instruction Fuzzy Hash: BA511974E056298FCB68DF25C9856DAB7F2EF89340F5085EAC10DA7250EB309F958F40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c65ca6f65228cd406bada62c03f0d3cb2523a69159045dad75fda8d1b1816e6
                                  • Instruction ID: 52b968854e3ea05d1f764ad2f239759c17ae4775e8a27ea01212b1e4f370cca3
                                  • Opcode Fuzzy Hash: 6c65ca6f65228cd406bada62c03f0d3cb2523a69159045dad75fda8d1b1816e6
                                  • Instruction Fuzzy Hash: 1641F974E056298FCBA8CF25C9856DAB7F2EF89740F5085EA810DAB250DB309E958F41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f84515f7695a101d0fbf12cb1a8d7386e641a2c84ad3201f2e8bd9e24a1da13
                                  • Instruction ID: a9ebfe5ec7e63cd78cf53f1aff1f767a59ee8f81caebd06cea2727b81f762c64
                                  • Opcode Fuzzy Hash: 6f84515f7695a101d0fbf12cb1a8d7386e641a2c84ad3201f2e8bd9e24a1da13
                                  • Instruction Fuzzy Hash: 8B21CA71E016188BEB28CF6BD9446DEFAF7AFC9340F04C0B9D50DA6268DB3009468F40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2145657664.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2f10000_x.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ee51b7268bade6ccd1e8925e38c2f7dc5e42e05398c92a59bdfab6a911df5a7f
                                  • Instruction ID: 3c6fda50f6b37d9333536de3fcb1907d5e60f77292f9502e74eae4fae3fb01d7
                                  • Opcode Fuzzy Hash: ee51b7268bade6ccd1e8925e38c2f7dc5e42e05398c92a59bdfab6a911df5a7f
                                  • Instruction Fuzzy Hash: E721AF71D016588FEB68CF6B99446DEFBF3AFC9310F14C0BAD508AA265DB3409468F41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:29.3%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.7%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:65
                                  execution_graph 8311 409046 8324 413b28 8311->8324 8313 40906d 8315 405b6f 6 API calls 8313->8315 8314 40904e 8314->8313 8316 403fbf 7 API calls 8314->8316 8317 40907c 8315->8317 8316->8313 8318 409092 8317->8318 8328 409408 8317->8328 8320 4090a3 8318->8320 8323 402bab 2 API calls 8318->8323 8322 402bab 2 API calls 8322->8318 8323->8320 8325 413b31 8324->8325 8326 413b38 8324->8326 8327 404056 6 API calls 8325->8327 8326->8314 8327->8326 8329 409413 8328->8329 8330 40908c 8329->8330 8342 409d36 8329->8342 8330->8322 8341 40945c 8448 40a35d 8341->8448 8343 409d43 8342->8343 8344 40a35d 4 API calls 8343->8344 8345 409d55 8344->8345 8346 4031e5 4 API calls 8345->8346 8347 409d8b 8346->8347 8348 4031e5 4 API calls 8347->8348 8349 409dd0 8348->8349 8350 405b6f 6 API calls 8349->8350 8382 409423 8349->8382 8353 409df7 8350->8353 8351 409e1c 8352 4031e5 4 API calls 8351->8352 8351->8382 8354 409e62 8352->8354 8353->8351 8355 402bab 2 API calls 8353->8355 8356 4031e5 4 API calls 8354->8356 8355->8351 8357 409e82 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ea2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409ec2 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409ee2 8362->8363 8364 4031e5 4 API calls 8363->8364 8365 409f02 8364->8365 8366 4031e5 4 API calls 8365->8366 8367 409f22 8366->8367 8368 4031e5 4 API calls 8367->8368 8371 409f42 8368->8371 8369 40a19b 8370 408b2c 4 API calls 8369->8370 8370->8382 8371->8369 8372 409fa3 8371->8372 8373 405b6f 6 API calls 8372->8373 8372->8382 8375 409fbd 8373->8375 8374 40a02c 8376 4031e5 4 API calls 8374->8376 8403 40a16d 8374->8403 8375->8374 8377 402bab 2 API calls 8375->8377 8379 40a070 8376->8379 8378 409fd7 8377->8378 8381 405b6f 6 API calls 8378->8381 8383 4031e5 4 API calls 8379->8383 8380 402bab 2 API calls 8380->8382 8385 409fe5 8381->8385 8382->8341 8404 4056bf 8382->8404 8384 40a090 8383->8384 8387 4031e5 4 API calls 8384->8387 8385->8374 8386 402bab 2 API calls 8385->8386 8388 409fff 8386->8388 8389 40a0b0 8387->8389 8390 405b6f 6 API calls 8388->8390 8392 4031e5 4 API calls 8389->8392 8391 40a00d 8390->8391 8391->8374 8394 40a021 8391->8394 8393 40a0d0 8392->8393 8395 4031e5 4 API calls 8393->8395 8396 402bab 2 API calls 8394->8396 8397 40a0f0 8395->8397 8396->8382 8398 4031e5 4 API calls 8397->8398 8399 40a110 8398->8399 8400 40a134 8399->8400 8401 4031e5 4 API calls 8399->8401 8400->8403 8458 408b2c 8400->8458 8401->8400 8403->8380 8403->8382 8405 402b7c 2 API calls 8404->8405 8407 4056cd 8405->8407 8406 4056d4 8409 408c4d 8406->8409 8407->8406 8408 402b7c 2 API calls 8407->8408 8408->8406 8410 413ba4 6 API calls 8409->8410 8411 408c5c 8410->8411 8412 408f02 8411->8412 8413 408f3a 8411->8413 8416 40903e 8411->8416 8415 405b6f 6 API calls 8412->8415 8414 405b6f 6 API calls 8413->8414 8430 408f51 8414->8430 8417 408f0c 8415->8417 8432 413aca 8416->8432 8417->8416 8421 408f31 8417->8421 8461 40a1b6 8417->8461 8419 405b6f 6 API calls 8419->8430 8420 402bab 2 API calls 8420->8416 8421->8420 8423 409031 8424 402bab 2 API calls 8423->8424 8424->8421 8425 409022 8426 402bab 2 API calls 8425->8426 8427 409028 8426->8427 8428 402bab 2 API calls 8427->8428 8428->8421 8429 402bab GetProcessHeap RtlFreeHeap 8429->8430 8430->8416 8430->8419 8430->8421 8430->8423 8430->8425 8430->8429 8431 40a1b6 15 API calls 8430->8431 8495 4044ee 8430->8495 8431->8430 8433 413ad7 8432->8433 8441 409451 8432->8441 8434 405781 4 API calls 8433->8434 8435 413af0 8434->8435 8436 405781 4 API calls 8435->8436 8437 413afe 8436->8437 8438 405762 4 API calls 8437->8438 8439 413b0e 8438->8439 8440 405781 4 API calls 8439->8440 8439->8441 8440->8441 8442 405695 8441->8442 8443 4056a0 8442->8443 8447 4056b9 8442->8447 8444 402bab 2 API calls 8443->8444 8445 4056b3 8444->8445 8446 402bab 2 API calls 8445->8446 8446->8447 8447->8341 8449 40a39a 8448->8449 8450 40a368 8448->8450 8451 40a3af 8449->8451 8453 4031e5 4 API calls 8449->8453 8456 4031e5 4 API calls 8450->8456 8452 40a3ca 8451->8452 8454 408b2c 4 API calls 8451->8454 8455 40a38a 8452->8455 8457 408b2c 4 API calls 8452->8457 8453->8451 8454->8452 8455->8330 8456->8455 8457->8455 8459 4031e5 4 API calls 8458->8459 8460 408b3e 8459->8460 8460->8403 8462 40a202 8461->8462 8463 40a1c3 8461->8463 8617 405f08 8462->8617 8465 405b6f 6 API calls 8463->8465 8467 40a1d0 8465->8467 8466 40a1fc 8466->8421 8467->8466 8469 40a1f3 8467->8469 8505 40a45b 8467->8505 8470 402bab 2 API calls 8469->8470 8470->8466 8471 402bab 2 API calls 8471->8466 8473 405b6f 6 API calls 8475 40a245 8473->8475 8474 40a25d 8476 405b6f 6 API calls 8474->8476 8475->8474 8477 413a58 14 API calls 8475->8477 8482 40a26b 8476->8482 8478 40a257 8477->8478 8481 402bab 2 API calls 8478->8481 8479 40a28b 8480 405b6f 6 API calls 8479->8480 8487 40a297 8480->8487 8481->8474 8482->8479 8484 40a284 8482->8484 8624 40955b 8482->8624 8483 40a2b7 8488 405b6f 6 API calls 8483->8488 8492 40a333 8483->8492 8494 402bab 2 API calls 8483->8494 8641 4098a7 8483->8641 8486 402bab 2 API calls 8484->8486 8486->8479 8487->8483 8489 40a2b0 8487->8489 8631 40968e 8487->8631 8488->8483 8491 402bab 2 API calls 8489->8491 8491->8483 8492->8471 8494->8483 8496 402b7c 2 API calls 8495->8496 8497 404512 8496->8497 8499 404585 GetLastError 8497->8499 8500 402bab 2 API calls 8497->8500 8503 402b7c 2 API calls 8497->8503 8504 40457c 8497->8504 8896 4044a7 8497->8896 8501 404592 8499->8501 8499->8504 8500->8497 8502 402bab 2 API calls 8501->8502 8502->8504 8503->8497 8504->8430 8650 40642c 8505->8650 8507 40a469 8508 40c4ff 8507->8508 8653 4047e6 8507->8653 8508->8469 8511 4040bb 13 API calls 8512 40bf88 8511->8512 8512->8508 8513 403c90 8 API calls 8512->8513 8514 40bfaa 8513->8514 8515 402b7c 2 API calls 8514->8515 8517 40bfc1 8515->8517 8516 40c4f3 8518 403f9e 5 API calls 8516->8518 8519 40c3aa 8517->8519 8660 40a423 8517->8660 8518->8508 8519->8516 8522 4056bf 2 API calls 8519->8522 8526 40c4e3 8519->8526 8520 402bab 2 API calls 8520->8516 8524 40c3d2 8522->8524 8524->8526 8528 4040bb 13 API calls 8524->8528 8525 405f08 4 API calls 8527 40c005 8525->8527 8526->8520 8530 40c021 8527->8530 8663 40a43f 8527->8663 8529 40c3f3 8528->8529 8532 40c4d1 8529->8532 8720 405a52 8529->8720 8531 4031e5 4 API calls 8530->8531 8534 40c034 8531->8534 8537 413aca 4 API calls 8532->8537 8543 4031e5 4 API calls 8534->8543 8540 40c4dd 8537->8540 8538 40c411 8725 405a87 8538->8725 8539 402bab 2 API calls 8539->8530 8542 405695 2 API calls 8540->8542 8542->8526 8549 40c04d 8543->8549 8544 40c4b3 8545 402bab 2 API calls 8544->8545 8547 40c4cb 8545->8547 8546 405a52 4 API calls 8557 40c423 8546->8557 8548 403f9e 5 API calls 8547->8548 8548->8532 8551 4031e5 4 API calls 8549->8551 8550 405a87 4 API calls 8550->8557 8552 40c085 8551->8552 8554 4031e5 4 API calls 8552->8554 8553 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8553->8557 8555 40c09c 8554->8555 8558 4031e5 4 API calls 8555->8558 8556 402bab 2 API calls 8556->8557 8557->8544 8557->8546 8557->8550 8557->8553 8557->8556 8559 40c0b3 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c0ca 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c0e7 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c100 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c119 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c132 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c14b 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c164 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c17d 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c196 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1af 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1c8 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c1de 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c1f4 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c20d 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c226 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c23f 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c258 8592->8593 8594 4031e5 4 API calls 8593->8594 8595 40c273 8594->8595 8596 4031e5 4 API calls 8595->8596 8597 40c28a 8596->8597 8598 4031e5 4 API calls 8597->8598 8601 40c2d5 8598->8601 8599 40c3a2 8600 402bab 2 API calls 8599->8600 8600->8519 8601->8599 8602 4031e5 4 API calls 8601->8602 8603 40c315 8602->8603 8604 40c38b 8603->8604 8666 404866 8603->8666 8605 403c40 5 API calls 8604->8605 8607 40c397 8605->8607 8609 403c40 5 API calls 8607->8609 8609->8599 8610 40c382 8612 403c40 5 API calls 8610->8612 8612->8604 8614 406c4c 6 API calls 8615 40c355 8614->8615 8615->8610 8690 4126a7 8615->8690 8618 4031e5 4 API calls 8617->8618 8619 405f1d 8618->8619 8620 405f55 8619->8620 8621 402b7c 2 API calls 8619->8621 8620->8466 8620->8473 8620->8474 8620->8492 8622 405f36 8621->8622 8622->8620 8623 4031e5 4 API calls 8622->8623 8623->8620 8625 409673 8624->8625 8630 40956d 8624->8630 8625->8484 8626 408b45 6 API calls 8626->8630 8627 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8627->8630 8628 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8628->8630 8629 402bab GetProcessHeap RtlFreeHeap 8629->8630 8630->8625 8630->8626 8630->8627 8630->8628 8630->8629 8632 4040bb 13 API calls 8631->8632 8636 4096a9 8632->8636 8633 40989f 8633->8489 8634 409896 8635 403f9e 5 API calls 8634->8635 8635->8633 8636->8633 8636->8634 8638 408b45 6 API calls 8636->8638 8639 402bab GetProcessHeap RtlFreeHeap 8636->8639 8640 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8636->8640 8889 4059d8 8636->8889 8638->8636 8639->8636 8640->8636 8642 4040bb 13 API calls 8641->8642 8649 4098c1 8642->8649 8643 4099fb 8643->8483 8644 4099f3 8645 403f9e 5 API calls 8644->8645 8645->8643 8646 402bab GetProcessHeap RtlFreeHeap 8646->8649 8647 4059d8 4 API calls 8647->8649 8648 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8648->8649 8649->8643 8649->8644 8649->8646 8649->8647 8649->8648 8651 4031e5 4 API calls 8650->8651 8652 406441 GetNativeSystemInfo 8651->8652 8652->8507 8654 4031e5 4 API calls 8653->8654 8657 40480a 8654->8657 8655 40485d 8655->8508 8655->8511 8656 4031e5 4 API calls 8656->8657 8657->8655 8657->8656 8658 40484f 8657->8658 8659 403c40 5 API calls 8658->8659 8659->8655 8661 4031e5 4 API calls 8660->8661 8662 40a435 8661->8662 8662->8525 8664 4031e5 4 API calls 8663->8664 8665 40a451 8664->8665 8665->8539 8667 4031e5 4 API calls 8666->8667 8668 40487c 8667->8668 8668->8610 8669 406c4c 8668->8669 8730 4068eb 8669->8730 8671 406e02 8671->8614 8672 406cab 8742 40469b 8672->8742 8673 406c6c 8673->8671 8673->8672 8739 406894 8673->8739 8680 406df1 8681 40469b 4 API calls 8680->8681 8681->8671 8682 406cef 8682->8680 8683 4031e5 4 API calls 8682->8683 8684 406d26 8683->8684 8684->8680 8685 40771e 6 API calls 8684->8685 8689 406d57 8685->8689 8686 406da2 8687 4031e5 4 API calls 8686->8687 8687->8680 8689->8686 8755 4068b0 8689->8755 8691 4126bb 8690->8691 8692 4126d1 8690->8692 8693 412840 8691->8693 8811 40488c 8691->8811 8692->8693 8817 407055 8692->8817 8693->8610 8697 412837 8699 403c40 5 API calls 8697->8699 8699->8693 8701 41281e 8702 4070ff 6 API calls 8701->8702 8702->8697 8703 407055 6 API calls 8704 412742 8703->8704 8704->8701 8705 40719a 6 API calls 8704->8705 8706 41276e 8705->8706 8707 412804 8706->8707 8833 406f4a 8706->8833 8861 4070ff 8707->8861 8710 41279a 8883 405907 8720->8883 8722 405a61 8723 405a76 8722->8723 8724 405907 4 API calls 8722->8724 8723->8538 8724->8722 8726 402b7c 2 API calls 8725->8726 8728 405a99 8726->8728 8729 405ade 8728->8729 8886 40595e 8728->8886 8729->8557 8758 4076a8 8730->8758 8732 406913 8733 406a61 8732->8733 8734 40771e 6 API calls 8732->8734 8733->8673 8735 406949 8734->8735 8735->8733 8736 40771e 6 API calls 8735->8736 8737 404678 4 API calls 8735->8737 8764 4046c2 8735->8764 8736->8735 8737->8735 8740 4031e5 4 API calls 8739->8740 8741 4068a6 8740->8741 8741->8673 8743 4046b4 8742->8743 8744 4046a4 8742->8744 8743->8671 8746 404678 8743->8746 8745 4031e5 4 API calls 8744->8745 8745->8743 8747 4031e5 4 API calls 8746->8747 8748 40468b 8747->8748 8748->8671 8749 40771e 8748->8749 8750 407737 8749->8750 8754 407748 8749->8754 8751 407644 6 API calls 8750->8751 8752 407741 8751->8752 8753 406baa 6 API calls 8752->8753 8753->8754 8754->8682 8756 4031e5 4 API calls 8755->8756 8757 4068c2 8756->8757 8757->8689 8759 4076c1 8758->8759 8763 4076d2 8758->8763 8772 407644 8759->8772 8763->8732 8765 4046d3 8764->8765 8766 4046d9 8764->8766 8807 40464c 8765->8807 8768 404678 4 API calls 8766->8768 8771 4046e9 8766->8771 8768->8771 8769 40469b 4 API calls 8770 404714 8769->8770 8770->8735 8771->8769 8771->8770 8773 407653 8772->8773 8775 407661 8772->8775 8773->8775 8780 406a6b 8773->8780 8776 406baa 8775->8776 8777 406bbb 8776->8777 8779 406bc8 8776->8779 8777->8779 8788 407402 8777->8788 8779->8763 8784 406a81 8780->8784 8781 402b7c 2 API calls 8781->8784 8782 406b8b 8782->8775 8783 406894 4 API calls 8783->8784 8784->8781 8784->8782 8784->8783 8785 406b96 8784->8785 8787 402bab 2 API calls 8784->8787 8786 402bab 2 API calls 8785->8786 8786->8782 8787->8784 8789 407644 6 API calls 8788->8789 8790 407412 8789->8790 8791 402b7c 2 API calls 8790->8791 8798 407450 8790->8798 8792 407483 8791->8792 8793 402b7c 2 API calls 8792->8793 8792->8798 8795 4074ce 8793->8795 8794 4074da 8796 4068cc 2 API calls 8794->8796 8795->8794 8797 402b7c 2 API calls 8795->8797 8796->8798 8801 40751f 8797->8801 8798->8779 8799 40752b 8800 4068cc 2 API calls 8799->8800 8800->8794 8801->8799 8803 4068cc 8801->8803 8804 4068d6 8803->8804 8805 4068e3 8803->8805 8804->8805 8806 402bab GetProcessHeap RtlFreeHeap 8804->8806 8805->8799 8806->8805 8808 404666 8807->8808 8809 404659 8807->8809 8808->8766 8810 4031e5 4 API calls 8809->8810 8810->8808 8812 4047e6 5 API calls 8811->8812 8813 404897 8812->8813 8814 40489c 8813->8814 8869 4047c7 8813->8869 8814->8692 8818 40706f 8817->8818 8819 407084 8817->8819 8818->8819 8820 407644 6 API calls 8818->8820 8824 4070e4 8819->8824 8872 406fd2 8819->8872 8821 40707d 8820->8821 8823 406baa 6 API calls 8821->8823 8823->8819 8824->8697 8825 40719a 8824->8825 8826 4071b0 8825->8826 8827 4071c5 8825->8827 8826->8827 8828 407644 6 API calls 8826->8828 8831 406fd2 4 API calls 8827->8831 8832 407226 8827->8832 8829 4071be 8828->8829 8830 406baa 6 API calls 8829->8830 8830->8827 8831->8832 8832->8701 8832->8703 8834 406f64 8833->8834 8836 406f75 8833->8836 8835 407644 6 API calls 8834->8835 8836->8710 8870 4031e5 4 API calls 8869->8870 8871 4047d9 8870->8871 8871->8692 8873 406fde 8872->8873 8874 407027 8873->8874 8875 4031e5 4 API calls 8873->8875 8874->8824 8876 406ffa 8875->8876 8877 4031e5 4 API calls 8876->8877 8878 407011 8877->8878 8879 4031e5 4 API calls 8878->8879 8879->8874 8884 4031e5 4 API calls 8883->8884 8885 40591a 8884->8885 8885->8722 8887 4031e5 4 API calls 8886->8887 8888 405971 8887->8888 8888->8728 8890 4031e5 4 API calls 8889->8890 8891 4059ed 8890->8891 8892 405a38 8891->8892 8893 402b7c 2 API calls 8891->8893 8892->8636 8894 405a16 8893->8894 8894->8892 8895 4031e5 4 API calls 8894->8895 8895->8892 8897 4031e5 4 API calls 8896->8897 8898 4044b9 8897->8898 8898->8497 8974 408952 8995 40823f 8974->8995 8977 408960 8979 4056bf 2 API calls 8977->8979 8980 40896a 8979->8980 9023 408862 8980->9023 8982 413aca 4 API calls 8983 4089d4 8982->8983 8985 405695 2 API calls 8983->8985 8984 408975 8992 4089c4 8984->8992 9031 4087d6 8984->9031 8987 4089df 8985->8987 8992->8982 8993 402bab 2 API calls 8994 40899d 8993->8994 8994->8992 8994->8993 8996 40824d 8995->8996 8997 40831b 8996->8997 8998 4031e5 4 API calls 8996->8998 8997->8977 9011 4083bb 8997->9011 8999 40826d 8998->8999 9000 4031e5 4 API calls 8999->9000 9001 408289 9000->9001 9002 4031e5 4 API calls 9001->9002 9003 4082a5 9002->9003 9004 4031e5 4 API calls 9003->9004 9005 4082c1 9004->9005 9006 4031e5 4 API calls 9005->9006 9007 4082e2 9006->9007 9008 4031e5 4 API calls 9007->9008 9009 4082ff 9008->9009 9010 4031e5 4 API calls 9009->9010 9010->8997 9059 408363 9011->9059 9014 4056bf 2 API calls 9020 4083f4 9014->9020 9015 408492 9016 413aca 4 API calls 9015->9016 9017 4084a0 9016->9017 9018 405695 2 API calls 9017->9018 9019 4084ab 9018->9019 9019->8977 9020->9015 9062 40815d 9020->9062 9077 40805d 9020->9077 9092 404b8f 9023->9092 9025 408946 9025->8984 9026 4031e5 4 API calls 9028 40887e 9026->9028 9027 40893e 9095 404a39 9027->9095 9028->9025 9028->9026 9028->9027 9030 402b7c 2 API calls 9028->9030 9030->9028 9032 402b7c 2 API calls 9031->9032 9033 4087e7 9032->9033 9034 40885a 9033->9034 9035 4031e5 4 API calls 9033->9035 9043 408749 9034->9043 9038 408802 9035->9038 9036 408853 9037 402bab 2 API calls 9036->9037 9037->9034 9038->9036 9040 40884d 9038->9040 9104 408522 9038->9104 9108 4084b4 9038->9108 9111 4084d4 9040->9111 9044 404b8f 5 API calls 9043->9044 9046 408765 9044->9046 9045 4031e5 4 API calls 9045->9046 9046->9045 9047 4087c7 9046->9047 9048 408522 4 API calls 9046->9048 9050 4087cf 9046->9050 9049 404a39 5 API calls 9047->9049 9048->9046 9049->9050 9051 4085d1 9050->9051 9053 4086c2 9051->9053 9057 4085e9 9051->9057 9053->8994 9054 402bab 2 API calls 9054->9057 9055 4031e5 4 API calls 9055->9057 9057->9053 9057->9054 9057->9055 9117 4089e6 9057->9117 9136 4086c9 9057->9136 9140 4036a3 9057->9140 9060 4031e5 4 API calls 9059->9060 9061 408386 9060->9061 9061->9014 9061->9019 9063 40816f 9062->9063 9064 4081b6 9063->9064 9065 4081fd 9063->9065 9076 4081ef 9063->9076 9067 405872 4 API calls 9064->9067 9066 405872 4 API calls 9065->9066 9068 408213 9066->9068 9069 4081cf 9067->9069 9070 405872 4 API calls 9068->9070 9071 405872 4 API calls 9069->9071 9073 408222 9070->9073 9072 4081df 9071->9072 9074 405872 4 API calls 9072->9074 9075 405872 4 API calls 9073->9075 9074->9076 9075->9076 9076->9020 9078 40808c 9077->9078 9079 4080d2 9078->9079 9080 408119 9078->9080 9091 40810b 9078->9091 9082 405872 4 API calls 9079->9082 9081 405872 4 API calls 9080->9081 9083 40812f 9081->9083 9084 4080eb 9082->9084 9085 405872 4 API calls 9083->9085 9086 405872 4 API calls 9084->9086 9087 40813e 9085->9087 9088 4080fb 9086->9088 9090 405872 4 API calls 9087->9090 9089 405872 4 API calls 9088->9089 9089->9091 9090->9091 9091->9020 9098 404a19 9092->9098 9094 404ba0 9094->9028 9101 4049ff 9095->9101 9097 404a44 9097->9025 9099 4031e5 4 API calls 9098->9099 9100 404a2c RegOpenKeyW 9099->9100 9100->9094 9102 4031e5 4 API calls 9101->9102 9103 404a12 RegCloseKey 9102->9103 9103->9097 9106 408534 9104->9106 9105 4085af 9105->9038 9106->9105 9114 4084ee 9106->9114 9109 4031e5 4 API calls 9108->9109 9110 4084c7 9109->9110 9110->9038 9112 4031e5 4 API calls 9111->9112 9113 4084e7 9112->9113 9113->9036 9115 4031e5 4 API calls 9114->9115 9116 408501 9115->9116 9116->9105 9118 4031e5 4 API calls 9117->9118 9119 408a06 9118->9119 9120 408b21 9119->9120 9121 4031e5 4 API calls 9119->9121 9120->9057 9124 408a32 9121->9124 9122 408b17 9152 403649 9122->9152 9124->9122 9143 403666 9124->9143 9128 4031e5 4 API calls 9129 408a88 9128->9129 9130 4031e5 4 API calls 9129->9130 9135 408b0e 9129->9135 9131 408ac4 9130->9131 9132 405b6f 6 API calls 9131->9132 9133 408aff 9132->9133 9133->9135 9146 408508 9133->9146 9149 40362f 9135->9149 9137 4086e2 9136->9137 9138 408744 9136->9138 9137->9138 9139 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 9137->9139 9138->9057 9139->9137 9141 4031e5 4 API calls 9140->9141 9142 4036b5 9141->9142 9142->9057 9144 4031e5 4 API calls 9143->9144 9145 403679 9144->9145 9145->9128 9145->9135 9147 4031e5 4 API calls 9146->9147 9148 40851b 9147->9148 9148->9135 9150 4031e5 4 API calls 9149->9150 9151 403642 9150->9151 9151->9122 9153 4031e5 4 API calls 9152->9153 9154 40365c 9153->9154 9154->9120 9216 40f561 9219 40f4b6 9216->9219 9220 413b28 6 API calls 9219->9220 9221 40f4bf 9220->9221 9222 405b6f 6 API calls 9221->9222 9223 402bab GetProcessHeap RtlFreeHeap 9221->9223 9224 413a58 14 API calls 9221->9224 9225 40f559 9221->9225 9222->9221 9223->9221 9224->9221 9229 403b64 9230 4031e5 4 API calls 9229->9230 9231 403b77 PathFileExistsW 9230->9231 9258 40f16e 9259 4056bf 2 API calls 9258->9259 9260 40f17b 9259->9260 9261 412093 8 API calls 9260->9261 9262 40f19e 9261->9262 9263 412093 8 API calls 9262->9263 9264 40f1b6 9263->9264 9265 412093 8 API calls 9264->9265 9266 40f1cc 9265->9266 9267 412093 8 API calls 9266->9267 9268 40f1e2 9267->9268 9269 413aca 4 API calls 9268->9269 9270 40f1ef 9269->9270 9271 405695 2 API calls 9270->9271 9272 40f1fa 9271->9272 9273 40ce71 9274 413b28 6 API calls 9273->9274 9275 40ce78 9274->9275 9276 405b6f 6 API calls 9275->9276 9281 40ce83 9276->9281 9277 40cec1 9278 403fbf 7 API calls 9277->9278 9279 40cecc 9278->9279 9280 40cefb 9279->9280 9283 403d74 7 API calls 9279->9283 9281->9277 9282 40ceba 9281->9282 9284 403d74 7 API calls 9281->9284 9285 402bab 2 API calls 9282->9285 9286 40cee7 9283->9286 9287 40cead 9284->9287 9285->9277 9288 40cef4 9286->9288 9289 402bab 2 API calls 9286->9289 9287->9282 9291 402bab 2 API calls 9287->9291 9290 402bab 2 API calls 9288->9290 9289->9288 9290->9280 9291->9282 9292 406472 9293 4031e5 4 API calls 9292->9293 9294 406484 Sleep 9293->9294 9352 403c08 9353 4031e5 4 API calls 9352->9353 9354 403c1a DeleteFileW 9353->9354 9355 410a09 9356 41219c 15 API calls 9355->9356 9357 410a1b 9356->9357 9358 41219c 15 API calls 9357->9358 9359 410a23 9358->9359 9360 41219c 15 API calls 9359->9360 9361 410a2c 9360->9361 9362 41219c 15 API calls 9361->9362 9363 410a38 9362->9363 9364 404b22 6 API calls 9363->9364 9365 410a4c 9364->9365 9366 410a7a 9365->9366 9367 403fbf 7 API calls 9365->9367 9368 410a5c 9367->9368 9369 410a71 9368->9369 9371 413a58 14 API calls 9368->9371 9370 402bab 2 API calls 9369->9370 9370->9366 9372 410a6b 9371->9372 9373 402bab 2 API calls 9372->9373 9373->9369 9374 40c509 9375 412093 8 API calls 9374->9375 9376 40c51e 9375->9376 9383 40910d 9384 404b22 6 API calls 9383->9384 9385 409124 9384->9385 9386 405b6f 6 API calls 9385->9386 9391 40917a 9385->9391 9387 40913e 9386->9387 9388 404b22 6 API calls 9387->9388 9396 409173 9387->9396 9390 409153 9388->9390 9389 402bab 2 API calls 9389->9391 9392 40916a 9390->9392 9393 409408 16 API calls 9390->9393 9394 402bab 2 API calls 9392->9394 9395 409164 9393->9395 9394->9396 9397 402bab 2 API calls 9395->9397 9396->9389 9397->9392 9401 410410 9402 4056bf 2 API calls 9401->9402 9403 41041b 9402->9403 9404 412093 8 API calls 9403->9404 9405 41043c 9404->9405 9406 413aca 4 API calls 9405->9406 9407 410449 9406->9407 9408 405695 2 API calls 9407->9408 9409 410454 9408->9409 9436 40c71a 9437 41219c 15 API calls 9436->9437 9438 40c728 9437->9438 9451 402c1f 9452 4031e5 4 API calls 9451->9452 9453 402c31 LoadLibraryW 9452->9453 9466 405924 9467 4031e5 4 API calls 9466->9467 9468 405937 StrStrW 9467->9468 9524 40f12f 9525 41219c 15 API calls 9524->9525 9526 40f13f 9525->9526 9527 41219c 15 API calls 9526->9527 9528 40f14c 9527->9528 9529 41219c 15 API calls 9528->9529 9530 40f159 9529->9530 9531 41219c 15 API calls 9530->9531 9532 40f166 9531->9532 9539 40ed35 9540 4056bf 2 API calls 9539->9540 9541 40ed42 9540->9541 9542 412093 8 API calls 9541->9542 9543 40ed63 9542->9543 9544 412093 8 API calls 9543->9544 9545 40ed73 9544->9545 9546 413aca 4 API calls 9545->9546 9547 40ed80 9546->9547 9548 405695 2 API calls 9547->9548 9549 40ed8e 9548->9549 8076 40f3c5 8081 41219c 8076->8081 8079 41219c 15 API calls 8080 40f3e1 8079->8080 8082 4121b1 8081->8082 8098 40f3d3 8081->8098 8083 4121be 8082->8083 8086 4121c5 8082->8086 8129 413ba4 8083->8129 8085 4121ca 8099 404056 8085->8099 8086->8085 8092 412210 8086->8092 8088 4121c3 8088->8098 8106 405b6f 8088->8106 8091 41224d 8095 402bab 2 API calls 8091->8095 8091->8098 8092->8098 8134 403fbf 8092->8134 8095->8098 8098->8079 8145 402b7c GetProcessHeap RtlAllocateHeap 8099->8145 8101 404066 8103 404095 8101->8103 8147 4031e5 8101->8147 8103->8088 8105 402bab 2 API calls 8105->8103 8107 405b7d 8106->8107 8108 402b7c 2 API calls 8107->8108 8109 405b99 8108->8109 8110 405c02 8109->8110 8183 4059b8 8109->8183 8110->8091 8119 413a58 8110->8119 8112 405c09 8115 402bab 2 API calls 8112->8115 8113 405bba 8113->8112 8114 402b7c 2 API calls 8113->8114 8116 405bdd 8114->8116 8115->8110 8116->8112 8117 405be4 8116->8117 8118 402bab 2 API calls 8117->8118 8118->8110 8120 413a63 8119->8120 8128 412245 8119->8128 8120->8128 8186 405781 8120->8186 8123 405781 4 API calls 8124 413aa0 8123->8124 8189 4057df 8124->8189 8127 405781 4 API calls 8127->8128 8142 402bab 8128->8142 8130 413bad 8129->8130 8131 404056 6 API calls 8130->8131 8133 413bb8 8130->8133 8132 413bc5 8131->8132 8132->8088 8133->8088 8135 402b7c 2 API calls 8134->8135 8137 403fcf 8135->8137 8136 403ff4 8136->8088 8137->8136 8308 403b98 8137->8308 8140 403ff8 GetLastError 8141 402bab 2 API calls 8140->8141 8141->8136 8143 402bb4 GetProcessHeap RtlFreeHeap 8142->8143 8144 402bc6 8142->8144 8143->8144 8144->8091 8146 402b98 8145->8146 8146->8101 8148 4031f3 8147->8148 8149 403236 8147->8149 8148->8149 8152 403208 8148->8152 8158 4030a5 8149->8158 8151 403224 8153 403258 8151->8153 8155 4031e5 4 API calls 8151->8155 8164 403263 8152->8164 8153->8103 8153->8105 8155->8153 8156 40320d 8156->8153 8157 4030a5 4 API calls 8156->8157 8157->8151 8170 402ca4 8158->8170 8160 4030b0 8161 4030b5 8160->8161 8174 4030c4 8160->8174 8161->8151 8165 40326d 8164->8165 8166 402b7c 2 API calls 8165->8166 8169 4032b7 8165->8169 8167 40328c 8166->8167 8168 402b7c 2 API calls 8167->8168 8168->8169 8169->8156 8171 403079 8170->8171 8172 40307c 8171->8172 8178 40317b GetPEB 8171->8178 8172->8160 8176 4030eb 8174->8176 8175 4030c0 8175->8151 8176->8175 8180 402c03 8176->8180 8179 40319b 8178->8179 8179->8172 8181 4031e5 3 API calls 8180->8181 8182 402c15 GetProcAddress 8181->8182 8182->8175 8184 4031e5 4 API calls 8183->8184 8185 4059cb 8184->8185 8185->8113 8204 405797 8186->8204 8188 405792 8188->8123 8190 405832 8189->8190 8191 4057eb 8189->8191 8190->8127 8190->8128 8191->8190 8214 4040bb 8191->8214 8194 405839 8195 405853 8194->8195 8241 405627 8194->8241 8252 405762 8195->8252 8196 40582c 8238 403f9e 8196->8238 8203 403f9e 5 API calls 8203->8190 8205 4057a1 8204->8205 8206 4057bd 8204->8206 8205->8206 8208 4056fc 8205->8208 8206->8188 8209 405714 8208->8209 8210 402b7c 2 API calls 8209->8210 8211 405730 8210->8211 8212 402bab 2 API calls 8211->8212 8213 405752 8211->8213 8212->8213 8213->8206 8215 4031e5 4 API calls 8214->8215 8216 4040d5 CreateFileW 8215->8216 8217 4040f8 8216->8217 8218 40418d 8216->8218 8219 4031e5 4 API calls 8217->8219 8220 404183 8218->8220 8258 403c90 8218->8258 8226 404105 8219->8226 8220->8190 8220->8194 8220->8196 8223 40416d 8255 403c40 8223->8255 8225 4041b3 8228 4040bb 10 API calls 8225->8228 8231 4041c8 8225->8231 8226->8223 8230 4031e5 4 API calls 8226->8230 8228->8231 8229 402bab 2 API calls 8229->8220 8232 404131 VirtualAlloc 8230->8232 8231->8229 8232->8223 8233 404142 8232->8233 8234 4031e5 4 API calls 8233->8234 8235 40414f ReadFile 8234->8235 8235->8223 8236 404160 8235->8236 8237 4031e5 4 API calls 8236->8237 8237->8223 8239 4031e5 4 API calls 8238->8239 8240 403fb1 VirtualFree 8239->8240 8240->8190 8242 4031e5 4 API calls 8241->8242 8243 40563a 8242->8243 8244 405872 8243->8244 8246 405881 8244->8246 8245 4058bc 8248 405797 4 API calls 8245->8248 8249 4058af 8245->8249 8246->8245 8305 4058d4 8246->8305 8248->8249 8249->8195 8251 405781 4 API calls 8251->8245 8253 405781 4 API calls 8252->8253 8254 405770 8253->8254 8254->8203 8256 4031e5 4 API calls 8255->8256 8257 403c52 FindCloseChangeNotification 8256->8257 8257->8220 8259 403ca3 8258->8259 8262 403caa 8258->8262 8285 405dc5 8259->8285 8261 404056 6 API calls 8263 403cbe 8261->8263 8262->8261 8264 403d3a 8262->8264 8265 403d2e 8263->8265 8266 403d17 8263->8266 8267 403ccf 8263->8267 8264->8220 8281 403c59 8264->8281 8265->8264 8268 402bab 2 API calls 8265->8268 8269 405b6f 6 API calls 8266->8269 8270 405b6f 6 API calls 8267->8270 8268->8264 8272 403d14 8269->8272 8271 403cdd 8270->8271 8273 405b6f 6 API calls 8271->8273 8274 402bab 2 API calls 8272->8274 8275 403cee 8273->8275 8274->8265 8275->8272 8290 403d4d 8275->8290 8278 403d0b 8280 402bab 2 API calls 8278->8280 8280->8272 8282 403c21 8281->8282 8283 4031e5 4 API calls 8282->8283 8284 403c33 CopyFileW 8283->8284 8284->8225 8299 406799 8285->8299 8287 405dd5 8288 402b7c 2 API calls 8287->8288 8289 405dfe 8288->8289 8289->8262 8302 403bb7 8290->8302 8292 403cfe 8292->8278 8293 403c62 8292->8293 8294 403d4d 5 API calls 8293->8294 8295 403c6d 8294->8295 8296 403c72 8295->8296 8297 4031e5 4 API calls 8295->8297 8296->8278 8298 403c87 CreateDirectoryW 8297->8298 8298->8278 8300 4031e5 4 API calls 8299->8300 8301 4067ad 8300->8301 8301->8287 8303 4031e5 4 API calls 8302->8303 8304 403bc9 GetFileAttributesW 8303->8304 8304->8292 8306 405797 4 API calls 8305->8306 8307 4058a8 8306->8307 8307->8249 8307->8251 8309 4031e5 4 API calls 8308->8309 8310 403baa 8309->8310 8310->8136 8310->8140 8908 410cd1 8913 412093 8908->8913 8911 412093 8 API calls 8912 410cff 8911->8912 8915 4120a5 8913->8915 8934 410cf1 8913->8934 8914 4120b3 8916 404056 6 API calls 8914->8916 8915->8914 8919 412100 8915->8919 8917 4120ba 8916->8917 8918 405b6f 6 API calls 8917->8918 8920 412152 8917->8920 8917->8934 8921 412125 8918->8921 8923 403fbf 7 API calls 8919->8923 8919->8934 8935 403d74 8920->8935 8921->8920 8926 412139 8921->8926 8927 41214d 8921->8927 8923->8917 8925 41218c 8931 402bab 2 API calls 8925->8931 8925->8934 8930 402bab 2 API calls 8926->8930 8929 402bab 2 API calls 8927->8929 8928 402bab 2 API calls 8928->8925 8929->8920 8932 41213e 8930->8932 8931->8934 8933 402bab 2 API calls 8932->8933 8933->8934 8934->8911 8936 403d87 8935->8936 8937 403ea3 8936->8937 8938 405b6f 6 API calls 8936->8938 8939 405b6f 6 API calls 8937->8939 8940 403da3 8938->8940 8941 403eb9 8939->8941 8940->8937 8943 4031e5 4 API calls 8940->8943 8942 4031e5 4 API calls 8941->8942 8947 403f6f 8941->8947 8944 403ed3 FindFirstFileW 8942->8944 8945 403dbc 8943->8945 8961 403ee8 8944->8961 8964 403f8d 8944->8964 8949 4031e5 4 API calls 8945->8949 8952 403e96 8945->8952 8953 405b6f 6 API calls 8945->8953 8959 403e9c 8945->8959 8965 403d74 6 API calls 8945->8965 8966 402bab 2 API calls 8945->8966 8967 403f63 8945->8967 8946 402bab 2 API calls 8946->8947 8947->8925 8947->8928 8948 402bab 2 API calls 8948->8937 8949->8945 8950 4031e5 4 API calls 8950->8961 8951 405b6f 6 API calls 8951->8961 8971 403bef 8952->8971 8953->8945 8954 403f75 8957 402bab 2 API calls 8954->8957 8956 403f87 8958 403bef 4 API calls 8956->8958 8960 403f7b 8957->8960 8958->8964 8959->8948 8962 403bef 4 API calls 8960->8962 8961->8950 8961->8951 8961->8954 8961->8956 8963 402bab 2 API calls 8961->8963 8962->8947 8963->8961 8964->8946 8965->8945 8966->8945 8968 402bab 2 API calls 8967->8968 8969 403f69 8968->8969 8970 403bef 4 API calls 8969->8970 8970->8947 8972 4031e5 4 API calls 8971->8972 8973 403c01 8972->8973 8973->8959 9160 4049dc 9161 4031e5 4 API calls 9160->9161 9162 4049ef 9161->9162 9163 40ecde 9164 412093 8 API calls 9163->9164 9165 40ecfd 9164->9165 9166 412093 8 API calls 9165->9166 9167 40ed0d 9166->9167 9171 40e8df 9172 412093 8 API calls 9171->9172 9173 40e8f8 9172->9173 9174 412093 8 API calls 9173->9174 9175 40e908 9174->9175 9182 404b22 9175->9182 9177 40e91c 9178 40e936 9177->9178 9181 40e93d 9177->9181 9189 40e944 9177->9189 9180 402bab 2 API calls 9178->9180 9180->9181 9183 402b7c 2 API calls 9182->9183 9184 404b33 9183->9184 9185 404b66 9184->9185 9198 4049b3 9184->9198 9185->9177 9188 402bab 2 API calls 9188->9185 9190 4056bf 2 API calls 9189->9190 9191 40e952 9190->9191 9192 40e976 9191->9192 9193 4057df 14 API calls 9191->9193 9192->9178 9194 40e966 9193->9194 9195 413aca 4 API calls 9194->9195 9196 40e970 9195->9196 9197 405695 2 API calls 9196->9197 9197->9192 9199 4031e5 4 API calls 9198->9199 9200 4049c6 9199->9200 9200->9185 9200->9188 9201 4139de 9210 413855 9201->9210 9211 4031e5 4 API calls 9210->9211 9212 413864 9211->9212 9212->9212 9232 4094e7 9233 404b22 6 API calls 9232->9233 9234 4094fe 9233->9234 9235 409554 9234->9235 9236 405b6f 6 API calls 9234->9236 9237 409514 9236->9237 9239 404b22 6 API calls 9237->9239 9244 40954d 9237->9244 9238 402bab 2 API calls 9238->9235 9240 40952d 9239->9240 9241 409408 16 API calls 9240->9241 9246 409544 9240->9246 9243 40953e 9241->9243 9242 402bab 2 API calls 9242->9244 9245 402bab 2 API calls 9243->9245 9244->9238 9245->9246 9246->9242 9255 4058ea 9256 4031e5 4 API calls 9255->9256 9257 4058fd StrStrA 9256->9257 9295 404df3 WSAStartup 9299 4091f6 9300 404b22 6 API calls 9299->9300 9301 40920b 9300->9301 9302 409222 9301->9302 9303 409408 16 API calls 9301->9303 9304 40921c 9303->9304 9305 402bab 2 API calls 9304->9305 9305->9302 9309 40e880 9310 41219c 15 API calls 9309->9310 9311 40e88e 9310->9311 9312 41219c 15 API calls 9311->9312 9313 40e89c 9312->9313 9410 410390 9411 404b22 6 API calls 9410->9411 9412 4103a5 9411->9412 9413 410409 9412->9413 9414 405b6f 6 API calls 9412->9414 9417 4103ba 9414->9417 9415 402bab 2 API calls 9415->9413 9416 402bab 2 API calls 9418 410402 9416->9418 9417->9418 9419 403d74 7 API calls 9417->9419 9422 4103fb 9417->9422 9418->9415 9420 4103ee 9419->9420 9421 402bab 2 API calls 9420->9421 9420->9422 9421->9422 9422->9416 9429 410c98 9430 41219c 15 API calls 9429->9430 9431 410ca8 9430->9431 9432 41219c 15 API calls 9431->9432 9433 410cb5 9432->9433 9434 412093 8 API calls 9433->9434 9435 410cc9 9434->9435 10120 41289a 10121 4128af 10120->10121 10122 402b7c 2 API calls 10121->10122 10126 4128bc 10122->10126 10123 412b19 10124 402bab 2 API calls 10123->10124 10125 412b22 10124->10125 10126->10123 10127 402bab 2 API calls 10126->10127 10128 4128f5 10127->10128 10128->10123 10129 402b7c 2 API calls 10128->10129 10132 412906 10129->10132 10130 412b13 10131 402bab 2 API calls 10130->10131 10131->10123 10132->10130 10135 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10132->10135 10137 40648b 9 API calls 10132->10137 10138 402bab GetProcessHeap RtlFreeHeap 10132->10138 10139 4067c9 11 API calls 10132->10139 10140 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10132->10140 10141 412f8f 10132->10141 10145 413c87 10132->10145 10167 413003 10132->10167 10135->10132 10137->10132 10138->10132 10139->10132 10140->10132 10142 412fa4 10141->10142 10144 412fa0 10141->10144 10143 402b7c 2 API calls 10142->10143 10142->10144 10143->10144 10144->10132 10184 413d97 10145->10184 10148 404056 6 API calls 10150 413cad 10148->10150 10149 413c9f 10149->10132 10150->10149 10151 405b6f 6 API calls 10150->10151 10152 413d10 10151->10152 10153 403c62 6 API calls 10152->10153 10155 413d7b 10152->10155 10154 413d1f 10153->10154 10154->10155 10157 413d5a 10154->10157 10158 413d2c 10154->10158 10156 402bab 2 API calls 10155->10156 10156->10149 10159 405b6f 6 API calls 10157->10159 10160 405dc5 4 API calls 10158->10160 10161 413d55 10159->10161 10162 413d33 10160->10162 10163 402bab 2 API calls 10161->10163 10162->10161 10164 405b6f 6 API calls 10162->10164 10163->10155 10165 413d48 10164->10165 10166 402bab 2 API calls 10165->10166 10166->10161 10168 4056bf 2 API calls 10167->10168 10171 413016 10168->10171 10169 413828 10169->10132 10171->10169 10172 4137c4 10171->10172 10247 412feb 10171->10247 10291 414325 10172->10291 10174 4137d7 10175 405695 2 API calls 10174->10175 10176 4137e2 10175->10176 10177 4056bf 2 API calls 10176->10177 10178 4137f2 10177->10178 10178->10169 10179 412feb 36 API calls 10178->10179 10180 41380a 10179->10180 10181 414325 32 API calls 10180->10181 10182 41381d 10181->10182 10183 405695 2 API calls 10182->10183 10183->10169 10185 413da0 10184->10185 10188 413c96 10184->10188 10190 4065a2 10185->10190 10188->10148 10188->10149 10189 405dc5 4 API calls 10189->10188 10205 404a52 10190->10205 10192 4065c0 10198 406638 10192->10198 10217 40393f 10192->10217 10195 406631 10196 402bab 2 API calls 10195->10196 10196->10198 10197 4059d8 4 API calls 10199 4065e9 10197->10199 10198->10188 10198->10189 10200 40662a 10199->10200 10202 402b7c 2 API calls 10199->10202 10201 402bab 2 API calls 10200->10201 10201->10195 10203 4065f8 10202->10203 10204 402bab 2 API calls 10203->10204 10204->10200 10206 402b7c 2 API calls 10205->10206 10208 404a65 10206->10208 10207 404ac6 10207->10192 10208->10207 10209 4031e5 4 API calls 10208->10209 10210 404a8a RegOpenKeyExA 10209->10210 10211 404aa0 10210->10211 10212 404aca 10210->10212 10213 4031e5 4 API calls 10211->10213 10214 402bab 2 API calls 10212->10214 10215 404ab1 RegQueryValueExA 10213->10215 10214->10207 10216 404a39 5 API calls 10215->10216 10216->10207 10224 403843 10217->10224 10221 403961 10222 402bab 2 API calls 10221->10222 10223 403969 10222->10223 10223->10195 10223->10197 10225 403861 10224->10225 10226 402b7c 2 API calls 10225->10226 10228 403875 10226->10228 10227 403923 10227->10223 10243 403aef 10227->10243 10228->10227 10229 4031e5 4 API calls 10228->10229 10230 40389b 10229->10230 10230->10227 10231 4031e5 4 API calls 10230->10231 10232 4038c5 10231->10232 10233 40392a 10232->10233 10235 403666 4 API calls 10232->10235 10234 403649 4 API calls 10233->10234 10234->10227 10236 4038e7 10235->10236 10236->10233 10237 4031e5 4 API calls 10236->10237 10238 403901 10237->10238 10238->10233 10239 403911 10238->10239 10240 40362f 4 API calls 10239->10240 10241 403919 10240->10241 10242 403649 4 API calls 10241->10242 10242->10227 10244 403afc 10243->10244 10245 402b7c 2 API calls 10244->10245 10246 403b16 10245->10246 10246->10221 10248 412ff4 10247->10248 10249 412fff 10247->10249 10271 413ba4 6 API calls 10248->10271 10402 40f980 10248->10402 10417 41127e 10248->10417 10428 40e97c 10248->10428 10453 41163a 10248->10453 10456 40db78 10248->10456 10459 40cff8 10248->10459 10470 409a77 10248->10470 10520 40f775 10248->10520 10535 410d75 10248->10535 10544 411333 10248->10544 10547 40d231 10248->10547 10558 4113f0 10248->10558 10561 4109ae 10248->10561 10566 407d6e 10248->10566 10572 40f32e 10248->10572 10583 40f56d 10248->10583 10592 40cc6d 10248->10592 10595 40dcea 10248->10595 10642 410aa9 10248->10642 10653 40dc28 10248->10653 10658 411165 10248->10658 10661 407aa2 10248->10661 10668 4114e0 10248->10668 10677 4115a1 10248->10677 10680 40c5df 10248->10680 10689 41145e 10248->10689 10692 411f1c 10248->10692 10701 40ccdd 10248->10701 10704 411954 10248->10704 10707 40eb53 10248->10707 10718 40d5d0 10248->10718 10721 40e60d 10248->10721 10730 40d3cd 10248->10730 10739 4092cc 10248->10739 10775 412406 10248->10775 10778 410e86 10248->10778 10781 40e506 10248->10781 10784 410f84 10248->10784 10795 40c9c2 10248->10795 10828 40cf01 10248->10828 10249->10171 10271->10249 11039 4145d7 10291->11039 10294 4056bf 2 API calls 10295 414350 10294->10295 11055 413db7 10295->11055 10299 4143b3 10301 4058d4 4 API calls 10299->10301 10300 414374 10300->10299 11140 40472d 10300->11140 10302 4143c9 10301->10302 10304 4058d4 4 API calls 10302->10304 10306 4143d1 10304->10306 10307 405872 4 API calls 10306->10307 10308 4143e0 10307->10308 11060 40632f 10308->11060 10309 402bab 2 API calls 10309->10299 10312 4143f5 10314 405872 4 API calls 10312->10314 10313 414409 10315 405872 4 API calls 10313->10315 10316 4143fc 10314->10316 10317 414404 10315->10317 10318 402bab 2 API calls 10316->10318 11067 406130 10317->11067 10318->10317 10321 414425 10323 405872 4 API calls 10321->10323 10322 414439 10324 405872 4 API calls 10322->10324 10325 41442c 10323->10325 10326 414434 10324->10326 10327 402bab 2 API calls 10325->10327 11074 4061c3 10326->11074 10327->10326 10400 4145b5 10400->10174 10403 413c87 11 API calls 10402->10403 10406 40f993 10403->10406 10404 40fa19 10404->10249 10405 402bab 2 API calls 10405->10404 10406->10404 10411 40fa08 10406->10411 10831 40429b 10406->10831 10411->10405 10414 412093 8 API calls 10415 40f9f6 10414->10415 10416 412093 8 API calls 10415->10416 10416->10411 10418 4056bf 2 API calls 10417->10418 10419 4112b7 10418->10419 10420 411300 10419->10420 10421 412093 8 API calls 10419->10421 10420->10249 10422 4112d9 10421->10422 10423 412093 8 API calls 10422->10423 10424 4112e8 10423->10424 10425 413aca 4 API calls 10424->10425 10426 4112f5 10425->10426 10427 405695 2 API calls 10426->10427 10427->10420 10429 41219c 15 API calls 10428->10429 10430 40e993 10429->10430 10431 404b22 6 API calls 10430->10431 10432 40e9b6 10431->10432 10433 404b22 6 API calls 10432->10433 10439 40ea55 10432->10439 10434 40e9d2 10433->10434 10435 404b22 6 API calls 10434->10435 10436 40e9e3 10435->10436 10868 404ada 10436->10868 10438 40e9f5 10438->10439 10440 4056bf 2 API calls 10438->10440 10439->10249 10441 40ea14 10440->10441 10442 405872 4 API calls 10441->10442 10443 40ea21 10442->10443 10444 405872 4 API calls 10443->10444 10445 40ea2e 10444->10445 10446 405872 4 API calls 10445->10446 10447 40ea39 10446->10447 10448 405781 4 API calls 10447->10448 10449 40ea42 10448->10449 10450 413aca 4 API calls 10449->10450 10451 40ea4c 10450->10451 10452 405695 2 API calls 10451->10452 10452->10439 10454 412093 8 API calls 10453->10454 10455 4116de 10454->10455 10455->10249 10457 41219c 15 API calls 10456->10457 10458 40dc1e 10457->10458 10458->10249 10460 4056bf 2 API calls 10459->10460 10461 40d00a 10460->10461 10462 404cbf 8 API calls 10461->10462 10463 40d032 10462->10463 10464 404cbf 8 API calls 10463->10464 10465 40d043 10464->10465 10466 413aca 4 API calls 10465->10466 10467 40d052 10466->10467 10468 405695 2 API calls 10467->10468 10469 40d05d 10468->10469 10469->10249 10471 404b22 6 API calls 10470->10471 10472 409a96 10471->10472 10473 409aa3 10472->10473 10474 409b6e 10472->10474 10476 405b6f 6 API calls 10473->10476 10475 404b22 6 API calls 10474->10475 10477 409b7b 10475->10477 10478 409ab3 10476->10478 10479 409c30 10477->10479 10481 405b6f 6 API calls 10477->10481 10492 409c29 10478->10492 10871 40946c 10478->10871 10479->10249 10480 402bab 2 API calls 10480->10479 10483 409b94 10481->10483 10486 40946c 4 API calls 10483->10486 10483->10492 10485 404b22 6 API calls 10487 409ad8 10485->10487 10488 409ba7 10486->10488 10491 413ba4 6 API calls 10487->10491 10497 409c22 10487->10497 10509 409b64 10487->10509 10489 404b22 6 API calls 10488->10489 10493 409bb6 10489->10493 10490 402bab 2 API calls 10490->10492 10494 409afc 10491->10494 10492->10480 10493->10497 10498 409d36 6 API calls 10493->10498 10493->10509 10496 405b6f 6 API calls 10494->10496 10495 402bab 2 API calls 10495->10497 10503 409b07 10496->10503 10497->10490 10499 409bd7 10498->10499 10500 409c0f 10499->10500 10502 4056bf 2 API calls 10499->10502 10501 40a35d 4 API calls 10500->10501 10501->10509 10504 409be9 10502->10504 10505 409b58 10503->10505 10508 4056bf 2 API calls 10503->10508 10503->10509 10507 408c4d 16 API calls 10504->10507 10506 402bab 2 API calls 10505->10506 10506->10509 10510 409bf7 10507->10510 10511 409b24 10508->10511 10509->10495 10512 413aca 4 API calls 10510->10512 10513 403d74 7 API calls 10511->10513 10514 409c04 10512->10514 10515 409b40 10513->10515 10516 405695 2 API calls 10514->10516 10517 413aca 4 API calls 10515->10517 10516->10500 10518 409b4d 10517->10518 10519 405695 2 API calls 10518->10519 10519->10505 10521 4056bf 2 API calls 10520->10521 10522 40f78b 10521->10522 10523 404cbf 8 API calls 10522->10523 10524 40f7c8 10523->10524 10525 404cbf 8 API calls 10524->10525 10526 40f7d7 10525->10526 10527 404cbf 8 API calls 10526->10527 10528 40f7e7 10527->10528 10529 404cbf 8 API calls 10528->10529 10530 40f7f3 10529->10530 10531 413aca 4 API calls 10530->10531 10532 40f805 10531->10532 10533 405695 2 API calls 10532->10533 10534 40f810 10533->10534 10534->10249 10536 4056bf 2 API calls 10535->10536 10537 410d85 10536->10537 10538 412093 8 API calls 10537->10538 10543 410e52 10537->10543 10539 410e3a 10538->10539 10540 413aca 4 API calls 10539->10540 10541 410e47 10540->10541 10542 405695 2 API calls 10541->10542 10542->10543 10543->10249 10545 41219c 15 API calls 10544->10545 10546 4113e7 10545->10546 10546->10249 10548 403fbf 7 API calls 10547->10548 10549 40d390 10548->10549 10550 40d3c2 10549->10550 10551 405b6f 6 API calls 10549->10551 10550->10249 10552 40d3a1 10551->10552 10554 413a58 14 API calls 10552->10554 10557 40d3b9 10552->10557 10553 402bab 2 API calls 10553->10550 10555 40d3b3 10554->10555 10556 402bab 2 API calls 10555->10556 10556->10557 10557->10553 10877 4122a4 10558->10877 10562 412093 8 API calls 10561->10562 10563 4109ef 10562->10563 10564 412093 8 API calls 10563->10564 10565 4109fe 10564->10565 10565->10249 10567 407d9d 10566->10567 10568 413ba4 6 API calls 10567->10568 10569 407deb 10568->10569 10571 407e16 10569->10571 10925 4079b8 10569->10925 10571->10249 10573 4056bf 2 API calls 10572->10573 10574 40f340 10573->10574 10575 404cbf 8 API calls 10574->10575 10576 40f36a 10575->10576 10577 404cbf 8 API calls 10576->10577 10578 40f37b 10577->10578 10579 413aca 4 API calls 10578->10579 10580 40f38a 10579->10580 10581 405695 2 API calls 10580->10581 10582 40f395 10581->10582 10582->10249 10584 4056bf 2 API calls 10583->10584 10585 40f57f 10584->10585 10586 404cbf 8 API calls 10585->10586 10587 40f5a8 10586->10587 10588 413aca 4 API calls 10587->10588 10589 40f5b7 10588->10589 10590 405695 2 API calls 10589->10590 10591 40f5c2 10590->10591 10591->10249 10593 412093 8 API calls 10592->10593 10594 40ccd6 10593->10594 10594->10249 10596 4056bf 2 API calls 10595->10596 10597 40e07f 10596->10597 10598 40e47d 10597->10598 10599 404b22 6 API calls 10597->10599 10598->10249 10600 40e0a3 10599->10600 10601 40e141 10600->10601 10603 404b22 6 API calls 10600->10603 10602 404b22 6 API calls 10601->10602 10604 40e379 10602->10604 10605 40e0c6 10603->10605 10607 404b22 6 API calls 10604->10607 10641 40e41c 10604->10641 10606 404b22 6 API calls 10605->10606 10609 40e0d9 10606->10609 10611 40e3a2 10607->10611 10608 40e460 10610 413aca 4 API calls 10608->10610 10613 404b22 6 API calls 10609->10613 10616 40e472 10610->10616 10617 404b22 6 API calls 10611->10617 10612 405781 4 API calls 10614 40e44c 10612->10614 10615 40e0ed 10613->10615 10618 404cbf 8 API calls 10614->10618 10619 405781 4 API calls 10615->10619 10620 405695 2 API calls 10616->10620 10621 40e3b5 10617->10621 10618->10608 10622 40e0fc 10619->10622 10620->10598 10623 404ada 4 API calls 10621->10623 10624 405872 4 API calls 10622->10624 10625 40e3cc 10623->10625 10626 40e10c 10624->10626 10627 405781 4 API calls 10625->10627 10628 405872 4 API calls 10626->10628 10629 40e3db 10627->10629 10630 40e11e 10628->10630 10631 405872 4 API calls 10629->10631 10633 405872 4 API calls 10630->10633 10632 40e3eb 10631->10632 10634 405872 4 API calls 10632->10634 10635 40e131 10633->10635 10636 40e3fd 10634->10636 10637 405872 4 API calls 10635->10637 10638 405872 4 API calls 10636->10638 10637->10601 10639 40e410 10638->10639 10640 405781 4 API calls 10639->10640 10640->10641 10641->10608 10641->10612 10643 4056bf 2 API calls 10642->10643 10644 410abb 10643->10644 10645 404cbf 8 API calls 10644->10645 10646 410ae3 10645->10646 10647 404cbf 8 API calls 10646->10647 10648 410af4 10647->10648 10649 413aca 4 API calls 10648->10649 10650 410b03 10649->10650 10651 405695 2 API calls 10650->10651 10652 410b0e 10651->10652 10652->10249 10654 41219c 15 API calls 10653->10654 10655 40dcd1 10654->10655 10656 41219c 15 API calls 10655->10656 10657 40dcdd 10656->10657 10657->10249 10659 41219c 15 API calls 10658->10659 10660 411274 10659->10660 10660->10249 10662 404056 6 API calls 10661->10662 10664 407d1a 10662->10664 10663 407d64 10663->10249 10664->10663 10665 4079b8 14 API calls 10664->10665 10666 407d5e 10664->10666 10665->10664 10667 402bab 2 API calls 10666->10667 10667->10663 10669 412093 8 API calls 10668->10669 10670 411559 10669->10670 10671 412093 8 API calls 10670->10671 10672 41156b 10671->10672 10673 412093 8 API calls 10672->10673 10674 41157e 10673->10674 10675 412093 8 API calls 10674->10675 10676 411594 10675->10676 10676->10249 10678 4122a4 28 API calls 10677->10678 10679 411633 10678->10679 10679->10249 10681 4056bf 2 API calls 10680->10681 10682 40c5f1 10681->10682 10683 404cbf 8 API calls 10682->10683 10684 40c61a 10683->10684 10685 413aca 4 API calls 10684->10685 10686 40c629 10685->10686 10687 405695 2 API calls 10686->10687 10688 40c634 10687->10688 10688->10249 10690 412093 8 API calls 10689->10690 10691 4114d9 10690->10691 10691->10249 10693 404056 6 API calls 10692->10693 10694 411f7a 10693->10694 10695 411faa 10694->10695 10696 403d74 7 API calls 10694->10696 10695->10249 10697 411f96 10696->10697 10698 411fa3 10697->10698 10699 402bab 2 API calls 10697->10699 10700 402bab 2 API calls 10698->10700 10699->10698 10700->10695 10702 412093 8 API calls 10701->10702 10703 40cdd3 10702->10703 10703->10249 10705 404cbf 8 API calls 10704->10705 10706 4119ac 10705->10706 10706->10249 10708 4056bf 2 API calls 10707->10708 10709 40eb65 10708->10709 10710 404cbf 8 API calls 10709->10710 10711 40eb8f 10710->10711 10712 404cbf 8 API calls 10711->10712 10713 40eba0 10712->10713 10714 413aca 4 API calls 10713->10714 10715 40ebaf 10714->10715 10716 405695 2 API calls 10715->10716 10717 40ebba 10716->10717 10717->10249 10719 41219c 15 API calls 10718->10719 10720 40d6b3 10719->10720 10720->10249 10722 41219c 15 API calls 10721->10722 10723 40e84d 10722->10723 10724 41219c 15 API calls 10723->10724 10725 40e859 10724->10725 10726 41219c 15 API calls 10725->10726 10727 40e867 10726->10727 10728 41219c 15 API calls 10727->10728 10729 40e873 10728->10729 10729->10249 10731 4056bf 2 API calls 10730->10731 10732 40d3dd 10731->10732 10733 404cbf 8 API calls 10732->10733 10738 40d4dd 10732->10738 10734 40d4c3 10733->10734 10735 413aca 4 API calls 10734->10735 10736 40d4d2 10735->10736 10737 405695 2 API calls 10736->10737 10737->10738 10738->10249 10740 404b22 6 API calls 10739->10740 10742 4092e8 10740->10742 10741 4093fd 10741->10249 10742->10741 10743 409312 10742->10743 10744 4093b6 10742->10744 10745 405b6f 6 API calls 10743->10745 10746 405b6f 6 API calls 10744->10746 10747 409317 10745->10747 10748 4093bb 10746->10748 10750 40946c 4 API calls 10747->10750 10759 4093f6 10747->10759 10749 404b79 6 API calls 10748->10749 10748->10759 10752 4093d4 10749->10752 10753 40932a 10750->10753 10751 402bab 2 API calls 10751->10741 10755 408c4d 16 API calls 10752->10755 10762 4093b1 10752->10762 10754 404b79 6 API calls 10753->10754 10756 40933f 10754->10756 10758 4093e7 10755->10758 10761 4056bf 2 API calls 10756->10761 10756->10762 10757 402bab 2 API calls 10757->10759 10760 402bab 2 API calls 10758->10760 10759->10751 10760->10762 10763 409356 10761->10763 10762->10757 10764 409d36 6 API calls 10763->10764 10765 409377 10764->10765 10766 409387 10765->10766 10767 408c4d 16 API calls 10765->10767 10768 413aca 4 API calls 10766->10768 10767->10766 10769 409399 10768->10769 10770 405695 2 API calls 10769->10770 10771 4093a4 10770->10771 10772 40a35d 4 API calls 10771->10772 10773 4093ab 10772->10773 10774 402bab 2 API calls 10773->10774 10774->10762 10776 412093 8 API calls 10775->10776 10777 412494 10776->10777 10777->10249 10779 41219c 15 API calls 10778->10779 10780 410f7a 10779->10780 10780->10249 10782 41219c 15 API calls 10781->10782 10783 40e603 10782->10783 10783->10249 10785 4056bf 2 API calls 10784->10785 10786 410f94 10785->10786 10787 41110a 10786->10787 10788 412093 8 API calls 10786->10788 10787->10249 10789 4110dd 10788->10789 10790 412093 8 API calls 10789->10790 10791 4110f2 10790->10791 10792 413aca 4 API calls 10791->10792 10793 4110ff 10792->10793 10794 405695 2 API calls 10793->10794 10794->10787 10796 404b22 6 API calls 10795->10796 10797 40c9dc 10796->10797 10798 40caf4 10797->10798 10799 413ba4 6 API calls 10797->10799 10798->10249 10800 40c9f2 10799->10800 10801 405b6f 6 API calls 10800->10801 10804 40c9fd 10801->10804 10802 40caed 10803 402bab 2 API calls 10802->10803 10803->10798 10804->10802 10806 405b6f 6 API calls 10804->10806 10810 40cae3 10804->10810 10805 402bab 2 API calls 10805->10802 10807 40ca23 10806->10807 10809 403c90 8 API calls 10807->10809 10807->10810 10812 40cadb 10807->10812 10808 402bab 2 API calls 10808->10810 10811 40ca4f 10809->10811 10810->10805 10811->10812 10813 405b6f 6 API calls 10811->10813 10812->10808 10814 40ca68 10813->10814 10815 40cad4 10814->10815 10995 4041e6 10814->10995 10817 402bab 2 API calls 10815->10817 10817->10812 10818 40ca7d 10820 4056bf 2 API calls 10818->10820 10827 40cac3 10818->10827 10819 402bab 2 API calls 10819->10815 10821 40ca9e 10820->10821 11005 40cafe 10821->11005 10824 413aca 4 API calls 10825 40cab8 10824->10825 10826 405695 2 API calls 10825->10826 10826->10827 10827->10819 10829 41219c 15 API calls 10828->10829 10830 40cfee 10829->10830 10830->10249 10832 4042a5 10831->10832 10853 4042cf 10832->10853 10835 4060bd 10836 4031e5 4 API calls 10835->10836 10837 4060dd 10836->10837 10838 406126 10837->10838 10839 4031e5 4 API calls 10837->10839 10838->10411 10842 40650a 10838->10842 10840 40610f CheckTokenMembership 10839->10840 10865 40604f 10840->10865 10843 4060ac 4 API calls 10842->10843 10844 406519 10843->10844 10845 4031e5 4 API calls 10844->10845 10846 406529 10845->10846 10847 406599 10846->10847 10848 4031e5 4 API calls 10846->10848 10847->10414 10849 406544 10848->10849 10850 4031e5 4 API calls 10849->10850 10852 40657f 10849->10852 10850->10852 10851 403c40 5 API calls 10851->10847 10852->10851 10854 4031e5 4 API calls 10853->10854 10855 4042e7 CreateFileW 10854->10855 10856 404302 10855->10856 10864 4042ca 10855->10864 10857 4031e5 4 API calls 10856->10857 10858 40430f SetFilePointer 10857->10858 10859 40431b 10858->10859 10860 40433e 10858->10860 10861 4031e5 4 API calls 10859->10861 10862 403c40 5 API calls 10860->10862 10863 404328 WriteFile 10861->10863 10862->10864 10863->10860 10864->10835 10866 4031e5 4 API calls 10865->10866 10867 406062 10866->10867 10867->10838 10869 4031e5 4 API calls 10868->10869 10870 404afd 10869->10870 10870->10438 10872 40947b 10871->10872 10873 402b7c 2 API calls 10872->10873 10874 409494 10873->10874 10875 402bab 2 API calls 10874->10875 10876 40949c 10874->10876 10875->10876 10876->10485 10879 4122b7 10877->10879 10887 411457 10877->10887 10878 4122c8 10880 404056 6 API calls 10878->10880 10879->10878 10883 412315 10879->10883 10881 4122cf 10880->10881 10882 405b6f 6 API calls 10881->10882 10881->10887 10888 41233d 10882->10888 10886 403fbf 7 API calls 10883->10886 10883->10887 10884 4123f2 10885 402bab 2 API calls 10884->10885 10885->10887 10886->10881 10887->10249 10888->10884 10889 4123ec 10888->10889 10891 403c90 8 API calls 10888->10891 10890 402bab 2 API calls 10889->10890 10890->10884 10892 41238a 10891->10892 10892->10889 10893 412393 10892->10893 10906 40434d 10893->10906 10895 402bab 2 API calls 10896 4123eb 10895->10896 10896->10889 10897 41239a 10898 4056bf 2 API calls 10897->10898 10900 4123d8 10897->10900 10899 4123b5 10898->10899 10899->10900 10901 4057df 14 API calls 10899->10901 10900->10895 10902 4123c7 10901->10902 10903 413aca 4 API calls 10902->10903 10904 4123d2 10903->10904 10905 405695 2 API calls 10904->10905 10905->10900 10922 403b7e 10906->10922 10909 404363 10909->10897 10910 40429b 8 API calls 10911 40438b CoInitialize CoCreateInstance 10910->10911 10912 4043b7 10911->10912 10913 404498 CoUninitialize 10911->10913 10912->10913 10914 4043c0 VariantInit SysAllocString 10912->10914 10913->10909 10915 4043dd 10914->10915 10916 404486 SysFreeString 10915->10916 10917 40440a VariantInit SysAllocString 10915->10917 10916->10913 10918 404426 10917->10918 10919 40442d VariantInit 10917->10919 10918->10919 10920 404462 10919->10920 10921 404474 SysFreeString 10920->10921 10921->10916 10923 4031e5 4 API calls 10922->10923 10924 403b91 10923->10924 10924->10909 10924->10910 10926 405b6f 6 API calls 10925->10926 10931 4079cc 10926->10931 10927 407a4e 10928 4056bf 2 API calls 10927->10928 10939 407a91 10927->10939 10929 407a6c 10928->10929 10950 407ed8 10929->10950 10931->10927 10933 402bab 2 API calls 10931->10933 10935 4079ea 10933->10935 10934 413aca 4 API calls 10936 407a86 10934->10936 10937 405b6f 6 API calls 10935->10937 10938 405695 2 API calls 10936->10938 10941 4079fa 10937->10941 10938->10939 10940 407a9e 10939->10940 10942 402bab 2 API calls 10939->10942 10940->10569 10941->10927 10943 402bab 2 API calls 10941->10943 10942->10940 10944 407a14 10943->10944 10945 405b6f 6 API calls 10944->10945 10946 407a24 10945->10946 10946->10927 10947 402bab 2 API calls 10946->10947 10948 407a3e 10947->10948 10949 405b6f 6 API calls 10948->10949 10949->10927 10951 4040bb 13 API calls 10950->10951 10953 407ef3 10951->10953 10952 407a77 10952->10934 10953->10952 10954 407f6d 10953->10954 10964 405381 10953->10964 10955 403f9e 5 API calls 10954->10955 10955->10952 10958 407f72 10960 405260 4 API calls 10958->10960 10959 407f57 10969 405260 10959->10969 10960->10954 10963 402bab 2 API calls 10963->10954 10974 40515f 10964->10974 10966 40538f 10967 4053a1 10966->10967 10980 405076 10966->10980 10967->10958 10967->10959 10972 40526d 10969->10972 10970 405377 10970->10963 10972->10970 10973 402bab 2 API calls 10972->10973 10990 404f0f 10972->10990 10973->10972 10975 405184 10974->10975 10976 402b7c 2 API calls 10975->10976 10977 405190 10976->10977 10978 402bab 2 API calls 10977->10978 10979 4051e1 10977->10979 10978->10979 10979->10966 10981 405085 10980->10981 10982 402b7c 2 API calls 10981->10982 10983 40508e 10982->10983 10984 40513d 10983->10984 10985 402b7c 2 API calls 10983->10985 10984->10967 10989 4050b5 10985->10989 10986 402bab 2 API calls 10987 405137 10986->10987 10987->10984 10988 402bab 2 API calls 10987->10988 10988->10984 10989->10986 10991 402b7c 2 API calls 10990->10991 10993 404f32 10991->10993 10992 404fc0 10992->10972 10993->10992 10994 402bab 2 API calls 10993->10994 10994->10992 10996 4041f5 10995->10996 10997 404257 10995->10997 10999 4031e5 4 API calls 10996->10999 10998 4031e5 4 API calls 10997->10998 11001 404251 10998->11001 11000 404227 10999->11000 11000->11001 11002 403c40 5 API calls 11000->11002 11001->10818 11003 404249 11002->11003 11004 403c40 5 API calls 11003->11004 11004->11001 11006 4040bb 13 API calls 11005->11006 11007 40cb17 11006->11007 11008 40caa9 11007->11008 11009 407795 6 API calls 11007->11009 11008->10824 11016 40cb30 11009->11016 11010 40cc5b 11011 403f9e 5 API calls 11010->11011 11011->11008 11012 407795 6 API calls 11012->11016 11013 40cc53 11014 402bab 2 API calls 11013->11014 11014->11010 11016->11010 11016->11012 11016->11013 11017 407851 GetProcessHeap RtlAllocateHeap 11016->11017 11018 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 11016->11018 11019 402bab GetProcessHeap RtlFreeHeap 11016->11019 11020 40c72c 11016->11020 11017->11016 11018->11016 11019->11016 11035 40c94c 11020->11035 11022 40c849 11023 40c942 11022->11023 11024 40374e 6 API calls 11022->11024 11023->11016 11025 40c86e 11024->11025 11026 40c93b 11025->11026 11028 4031e5 4 API calls 11025->11028 11027 402bab 2 API calls 11026->11027 11027->11023 11029 40c8b8 11028->11029 11030 40c92e 11029->11030 11032 402b7c 2 API calls 11029->11032 11031 402bab 2 API calls 11030->11031 11031->11026 11034 40c8f7 11032->11034 11033 4036a3 4 API calls 11033->11030 11034->11033 11036 40c95a 11035->11036 11037 402b7c 2 API calls 11036->11037 11038 40c974 11037->11038 11038->11022 11040 4145eb 11039->11040 11041 414338 11039->11041 11040->11041 11042 413c87 11 API calls 11040->11042 11041->10294 11041->10400 11043 414602 11042->11043 11043->11041 11044 4040bb 13 API calls 11043->11044 11046 414637 11043->11046 11045 414624 11044->11045 11045->11046 11048 404678 4 API calls 11045->11048 11047 4146e2 11046->11047 11049 40464c 4 API calls 11046->11049 11050 402bab 2 API calls 11047->11050 11048->11046 11051 414692 11049->11051 11050->11041 11052 4046c2 4 API calls 11051->11052 11053 4146aa 11052->11053 11053->11047 11054 4042cf 8 API calls 11053->11054 11054->11047 11156 40637b 11055->11156 11058 413de2 11058->10300 11135 405d49 11058->11135 11059 402bab 2 API calls 11059->11058 11061 402b7c 2 API calls 11060->11061 11063 406340 _wmemset 11061->11063 11062 406368 11062->10312 11062->10313 11063->11062 11166 406069 11063->11166 11066 402bab 2 API calls 11066->11062 11068 402b7c 2 API calls 11067->11068 11070 406141 _wmemset 11068->11070 11069 406176 11069->10321 11069->10322 11070->11069 11071 4031e5 4 API calls 11070->11071 11072 40616a 11071->11072 11072->11069 11073 402bab 2 API calls 11072->11073 11073->11069 11169 402bf2 11074->11169 11136 406799 4 API calls 11135->11136 11137 405d57 11136->11137 11138 402b7c 2 API calls 11137->11138 11139 405d76 11138->11139 11139->10300 11141 40473e 11140->11141 11142 402b7c 2 API calls 11141->11142 11143 404746 11142->11143 11144 402b7c 2 API calls 11143->11144 11155 404776 11143->11155 11145 404767 11144->11145 11146 404770 11145->11146 11148 40477a 11145->11148 11147 402bab 2 API calls 11146->11147 11147->11155 11149 4047b2 11148->11149 11150 4047a3 11148->11150 11152 402bab 2 API calls 11149->11152 11151 402bab 2 API calls 11150->11151 11153 4047a9 11151->11153 11152->11155 11154 402bab 2 API calls 11153->11154 11154->11155 11155->10299 11155->10309 11157 402b7c 2 API calls 11156->11157 11158 406388 11157->11158 11163 406006 11158->11163 11161 402bab 2 API calls 11162 4063a8 11161->11162 11162->11058 11162->11059 11164 4031e5 4 API calls 11163->11164 11165 406019 11164->11165 11165->11161 11165->11162 11167 4031e5 4 API calls 11166->11167 11168 40607c 11167->11168 11168->11062 11168->11066 11170 4031e5 4 API calls 11169->11170 11171 402c01 11170->11171 11171->11171 9439 40f49e 9440 40f4b6 14 API calls 9439->9440 9441 40f4a8 9440->9441 9442 40929e 9443 413b28 6 API calls 9442->9443 9444 4092a4 9443->9444 9445 405b6f 6 API calls 9444->9445 9446 4092af 9445->9446 9447 4092c5 9446->9447 9448 409408 16 API calls 9446->9448 9449 4092bf 9448->9449 9450 402bab 2 API calls 9449->9450 9450->9447 9487 4090aa 9488 404b22 6 API calls 9487->9488 9489 4090c1 9488->9489 9490 4090d8 9489->9490 9491 409408 16 API calls 9489->9491 9492 404b22 6 API calls 9490->9492 9493 4090d2 9491->9493 9494 4090eb 9492->9494 9495 402bab 2 API calls 9493->9495 9496 408c4d 16 API calls 9494->9496 9499 409104 9494->9499 9495->9490 9497 4090fe 9496->9497 9498 402bab 2 API calls 9497->9498 9498->9499 9506 409cae 9521 404b79 9506->9521 9508 409cc5 9509 409d27 9508->9509 9510 405b6f 6 API calls 9508->9510 9512 409d2f 9508->9512 9511 402bab 2 API calls 9509->9511 9513 409cec 9510->9513 9511->9512 9513->9509 9514 404b79 6 API calls 9513->9514 9515 409d05 9514->9515 9516 409d1e 9515->9516 9517 408c4d 16 API calls 9515->9517 9518 402bab 2 API calls 9516->9518 9519 409d18 9517->9519 9518->9509 9520 402bab 2 API calls 9519->9520 9520->9516 9522 404b22 6 API calls 9521->9522 9523 404b8a 9522->9523 9523->9508 9553 40f6b8 9554 41219c 15 API calls 9553->9554 9555 40f6c7 9554->9555 9556 41219c 15 API calls 9555->9556 9557 40f6d5 9556->9557 9558 41219c 15 API calls 9557->9558 9559 40f6df 9558->9559 9578 40d6bd 9579 4056bf 2 API calls 9578->9579 9580 40d6c9 9579->9580 9591 404cbf 9580->9591 9583 404cbf 8 API calls 9584 40d6f4 9583->9584 9585 404cbf 8 API calls 9584->9585 9586 40d702 9585->9586 9587 413aca 4 API calls 9586->9587 9588 40d711 9587->9588 9589 405695 2 API calls 9588->9589 9590 40d71f 9589->9590 9592 402b7c 2 API calls 9591->9592 9593 404ccd 9592->9593 9594 404ddc 9593->9594 9595 404b8f 5 API calls 9593->9595 9594->9583 9596 404ce4 9595->9596 9597 404dd4 9596->9597 9599 402b7c 2 API calls 9596->9599 9598 402bab 2 API calls 9597->9598 9598->9594 9602 404d04 9599->9602 9600 404dcc 9601 404a39 5 API calls 9600->9601 9601->9597 9602->9600 9603 404dc6 9602->9603 9604 402b7c 2 API calls 9602->9604 9606 404b8f 5 API calls 9602->9606 9607 402bab GetProcessHeap RtlFreeHeap 9602->9607 9608 404a39 5 API calls 9602->9608 9609 405b6f 6 API calls 9602->9609 9610 404cbf 8 API calls 9602->9610 9605 402bab 2 API calls 9603->9605 9604->9602 9605->9600 9606->9602 9607->9602 9608->9602 9609->9602 9610->9602 9611 40f0bf 9612 4056bf 2 API calls 9611->9612 9613 40f0c9 9612->9613 9614 40f115 9613->9614 9616 404cbf 8 API calls 9613->9616 9615 41219c 15 API calls 9614->9615 9617 40f128 9615->9617 9618 40f0ed 9616->9618 9619 404cbf 8 API calls 9618->9619 9620 40f0fb 9619->9620 9621 413aca 4 API calls 9620->9621 9622 40f10a 9621->9622 9623 405695 2 API calls 9622->9623 9623->9614

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 101 403d74-403d90 call 4067c4 104 403d96-403da9 call 405b6f 101->104 105 403ea9-403ec0 call 405b6f 101->105 112 403ea6-403ea8 104->112 113 403daf-403dcb call 4031e5 104->113 110 403f95 105->110 111 403ec6-403ee2 call 4031e5 FindFirstFileW 105->111 115 403f97-403f9d 110->115 119 403ee8-403ef8 call 405d24 111->119 120 403f8e-403f94 call 402bab 111->120 112->105 126 403dd1-403dd8 113->126 127 403e9d-403ea4 call 402bab 113->127 128 403f03-403f0a 119->128 129 403efa-403f01 119->129 120->110 131 403e75-403e90 call 4031e5 126->131 132 403dde-403de2 126->132 127->112 135 403f12-403f2d call 405b6f 128->135 136 403f0c-403f10 128->136 129->128 134 403f41-403f5c call 4031e5 129->134 131->126 155 403e96-403e9c call 403bef 131->155 138 403e12-403e22 call 405d24 132->138 139 403de4-403df9 call 405eff 132->139 162 403f87-403f8d call 403bef 134->162 163 403f5e-403f61 134->163 135->134 153 403f2f-403f33 135->153 136->134 136->135 151 403e30-403e4c call 405b6f 138->151 152 403e24-403e2e 138->152 139->131 149 403dfb-403e10 call 405eff 139->149 149->131 149->138 151->131 168 403e4e-403e6f call 403d74 call 402bab 151->168 152->131 152->151 158 403f75-403f85 call 402bab call 403bef 153->158 159 403f35-403f40 call 402bab 153->159 155->127 158->115 159->134 162->120 163->119 168->131 180 403f63-403f73 call 402bab call 403bef 168->180 180->115
                                  APIs
                                  • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID: %s\%s$%s\*$Program Files$Windows
                                  • API String ID: 1974802433-2009209621
                                  • Opcode ID: 3bbbd6497c60a9077726dfd724fc9ca0dcd642bdcb2d82800ed9682fff8db66d
                                  • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                  • Opcode Fuzzy Hash: 3bbbd6497c60a9077726dfd724fc9ca0dcd642bdcb2d82800ed9682fff8db66d
                                  • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                  • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                  • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                  • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                  • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                  • _wmemset.LIBCMT ref: 00406244
                                  • _wmemset.LIBCMT ref: 00406261
                                  • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _wmemset$ErrorInformationLastToken
                                  • String ID: IDA$IDA
                                  • API String ID: 487585393-2020647798
                                  • Opcode ID: 237076ee3a9b4ea1415c25652d0b6501980df5d44521d3002c06c03fef756dfb
                                  • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                  • Opcode Fuzzy Hash: 237076ee3a9b4ea1415c25652d0b6501980df5d44521d3002c06c03fef756dfb
                                  • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 439 404e17-404e57 getaddrinfo 440 404e59-404e5b 439->440 441 404e5d-404e84 call 402b7c socket 439->441 442 404ecf-404ed3 440->442 445 404e86-404e96 call 402bab freeaddrinfo 441->445 446 404e98-404ea7 connect 441->446 454 404ec7-404ec9 445->454 448 404eb3-404ebe freeaddrinfo 446->448 449 404ea9-404eb1 call 404de5 446->449 452 404ec0-404ec6 call 402bab 448->452 453 404ecb 448->453 449->448 452->454 457 404ecd-404ece 453->457 454->457 457->442
                                  APIs
                                  • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                  • socket.WS2_32(?,?,?), ref: 00404E7A
                                  • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: freeaddrinfogetaddrinfosocket
                                  • String ID:
                                  • API String ID: 2479546573-0
                                  • Opcode ID: 48d55c7a475cf24af0e6b27ac0b0b35998f2ff4cef57853490c59fb148673dc8
                                  • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                  • Opcode Fuzzy Hash: 48d55c7a475cf24af0e6b27ac0b0b35998f2ff4cef57853490c59fb148673dc8
                                  • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 459 4040bb-4040f2 call 4031e5 CreateFileW 462 4040f8-404111 call 4031e5 459->462 463 40418d-404190 459->463 473 404113-404119 462->473 474 40417a 462->474 465 404192-4041a7 call 403c90 463->465 466 404184 463->466 465->466 472 4041a9-4041b8 call 403c59 465->472 468 404186-40418c 466->468 479 4041ba-4041d8 call 4040bb call 403d44 472->479 480 4041db-4041e4 call 402bab 472->480 473->474 478 40411b-404120 473->478 477 40417d-40417e call 403c40 474->477 486 404183 477->486 482 404122 478->482 483 404124-404140 call 4031e5 VirtualAlloc 478->483 479->480 480->468 482->483 483->474 492 404142-40415e call 4031e5 ReadFile 483->492 486->466 492->477 496 404160-404178 call 4031e5 492->496 496->477
                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                  • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AllocCreateReadVirtual
                                  • String ID: .tmp
                                  • API String ID: 3585551309-2986845003
                                  • Opcode ID: 96dd47190825543ab0d2155488efc9e466da80610ec56339a9b7da9a3c2350c6
                                  • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                  • Opcode Fuzzy Hash: 96dd47190825543ab0d2155488efc9e466da80610ec56339a9b7da9a3c2350c6
                                  • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                  • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                  • GetLastError.KERNEL32 ref: 0041399E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Error$CreateLastModeMutex
                                  • String ID:
                                  • API String ID: 3448925889-0
                                  • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                  • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                  • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                  • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                  • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreatePointerWrite
                                  • String ID:
                                  • API String ID: 3672724799-0
                                  • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                  • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                  • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                  • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                    • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                  • _wmemset.LIBCMT ref: 0040634F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateProcess_wmemset
                                  • String ID: CA
                                  • API String ID: 2773065342-1052703068
                                  • Opcode ID: 760dd9ac2145a4063b1baf9615d56f983cb47d5a4e4acf2d59287a1dd03a175e
                                  • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                  • Opcode Fuzzy Hash: 760dd9ac2145a4063b1baf9615d56f983cb47d5a4e4acf2d59287a1dd03a175e
                                  • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationToken
                                  • String ID: IDA
                                  • API String ID: 4114910276-365204570
                                  • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                  • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                  • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                  • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: s1@
                                  • API String ID: 190572456-427247929
                                  • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                  • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                  • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                  • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                    • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                  • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                  • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateOpenProcessQueryValue
                                  • String ID:
                                  • API String ID: 1425999871-0
                                  • Opcode ID: 0d8c0d4c09172e6f5af4db1cb0f7f59eaf3fb33cbb4c04f86baba7e5becde8fb
                                  • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                  • Opcode Fuzzy Hash: 0d8c0d4c09172e6f5af4db1cb0f7f59eaf3fb33cbb4c04f86baba7e5becde8fb
                                  • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                  • RtlFreeHeap.NTDLL(00000000), ref: 00402BC0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                                  • Instruction ID: 8dd5a347e09044be93d5ac0bfd75615970d35e99714971ab129ae27a0189db5c
                                  • Opcode Fuzzy Hash: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                                  • Instruction Fuzzy Hash: 7FC01235000A08EBCB001FD0E90CBE93F6CAB8838AF808020B60C480A0C6B49090CAA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CheckMembershipToken
                                  • String ID:
                                  • API String ID: 1351025785-0
                                  • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                  • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                  • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                  • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateDirectory
                                  • String ID:
                                  • API String ID: 4241100979-0
                                  • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                  • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                  • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                  • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CopyFileW.KERNELBASE(00000000,00000000,004041B3,00000000,F25E823B,00000000,00000000,?,004041B3,00000000,00000000,00000000), ref: 00403C3C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CopyFile
                                  • String ID:
                                  • API String ID: 1304948518-0
                                  • Opcode ID: 5c28da5d626f681fb06662006ab0c2c95d6c94e8822ad681e7d12da421b0949b
                                  • Instruction ID: 708ff4401ac3282b12d7668d94bc51921ab55dbb6f1a62cfe087fe8b706b923f
                                  • Opcode Fuzzy Hash: 5c28da5d626f681fb06662006ab0c2c95d6c94e8822ad681e7d12da421b0949b
                                  • Instruction Fuzzy Hash: 57D0127200860CBFEF016EE59C05C7B3F5EEB04255B008825BD18E5021DA37DE2076E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoNativeSystem
                                  • String ID:
                                  • API String ID: 1721193555-0
                                  • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                  • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                  • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                  • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileMove
                                  • String ID:
                                  • API String ID: 3562171763-0
                                  • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                  • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                  • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                  • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startup
                                  • String ID:
                                  • API String ID: 724789610-0
                                  • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                  • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                  • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                  • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                  • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                  • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                  • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                  • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                  • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                  • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                  • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                  • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                  • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                  • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                  • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                  • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                  • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                  • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                  • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                  • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                  • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                  • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                  • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                  • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                  • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExistsFilePath
                                  • String ID:
                                  • API String ID: 1174141254-0
                                  • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                  • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                  • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                  • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                  • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                  • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                  • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                  • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                  • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                  • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                  • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                  • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                  • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                  • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                  • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                  • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 0040438F
                                  • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                  • VariantInit.OLEAUT32(?), ref: 004043C4
                                  • SysAllocString.OLEAUT32(?), ref: 004043CD
                                  • VariantInit.OLEAUT32(?), ref: 00404414
                                  • SysAllocString.OLEAUT32(?), ref: 00404419
                                  • VariantInit.OLEAUT32(?), ref: 00404431
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitVariant$AllocString$CreateInitializeInstance
                                  • String ID:
                                  • API String ID: 1312198159-0
                                  • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                  • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                  • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                  • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                  • API String ID: 0-2111798378
                                  • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                  • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                  • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                  • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv
                                  • String ID:
                                  • API String ID: 1507349165-0
                                  • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                  • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                  • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                  • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3418744123.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_aspnet_compiler.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                  • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                  • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                  • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                                  Uniqueness

                                  Uniqueness Score: -1.00%